Author

Topic: Circumstantial evidence and the search for Satoshi (Read 162 times)

newbie
Activity: 434
Merit: 0
If People find out who is satoshi then it would be life threatning for him. There're many people who are gainst crypto currency and egarly finiding him all the time
newbie
Activity: 266
Merit: 0
My personal opinion is that NSA don't know yet who he is. Yes we the bitcoin enthusiasts are always eager to know more and more about crypto market. Sometime its not easy to find or know everything.
newbie
Activity: 350
Merit: 0
Well, thank you for the informative article. I totally agree with you and I also think that NSA knows who he is.
newbie
Activity: 4
Merit: 0
Every month or two I get the itch to continue on my elusive quest to search for Satoshi. As we all know, your words are your fingerprint, and anything can be traced back to someone or any group of people that originally wrote it. Knowing this, I wanted to use some of my own stylometry to figure out the puzzle, or at least muddy the waters.

We have all heard the story of the phrase “computationally impractical to reverse", and the patent application which uses the same phrase:

 Feb 18, 2010—… the outputs of which are fixed-size strings that are computationally impractical to reverse-map."

Now, I don't have a supercomputer or anything of that matter, and wanted to do some good hard down-home brute-force style work with the original whitepaper, dated Oct 31, 2008.

Before I get to that let me be clear that this is just my musing around looking for clues to the man himself, and am no way giving any facts. This is just an experiment in circumstantial evidence.  Smiley


example 1:
https://i.imgur.com/Hv1RO0G.png

The phrasing of "leave or rejoin the network at will", both used on October 31st 2008.  Now, was Satoshi reading up on P2P articles and used this phrase for his abstract the day of publishing? Could be. This phrase has only been used on or after the whitepapers release, from what I could find on the internet.  I did more digging on this article leading down a rabbit hole to whitepaper references, etc. But I won't get into that.


example 2:
https://link.springer.com/chapter/10.1007/978-3-540-85230-8_25
An Efficient Anonymous Credential System
Taken from
Financial Cryptography and Data Security
12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

I'll let you look at the link and see if any of the names jump out at you.

Another title from the paper at this conference includes
Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash



These two examples show that the hunt for Nakamoto will never end and armchair Bitcoin enthusiasts like me will always be on the lookout, even though the NSA probably already know who he is. Smiley




Jump to: