Pages:
Author

Topic: Does the NSA know who Satoshi is? - page 3. (Read 8732 times)

full member
Activity: 252
Merit: 100
MARKETPLACE FOR PAID ADVICE LIVE BROADCASTS
July 15, 2013, 05:30:34 AM
#32
Does it matter if the NSA started bitcoin? Even if they did, they really have no more influence than, say, the winklevoss twins on bitcoin. Unless, the NSA starts using their code cracking supercomputers to mine bitcoins and exponentially increase the mining difficulty. After all SHA-256 hashing could be involved in decrypting enemy files or networks which is the unofficial job of the NSA is.

The NSA never started bitcoin. This rumor is (...).
Bitcoin is about anonomous people on internet, decentralized currency: NSA is the opposite!
hero member
Activity: 812
Merit: 1000
July 15, 2013, 12:00:29 AM
#31

Reminds me of "NDAKOTA" anagram of "TANKADO" (Digital Fortress / NSA)  Tongue

That was a great book ahaha
sr. member
Activity: 308
Merit: 250
FlutterCoin Developer
July 14, 2013, 11:51:22 PM
#30
YES.

what if he always routed through an encrypted tunnel to a vpn?
LOL they can still find you, ask some of the best crackers around who were arrested or convicted and sent to prison, one who lived 4 blocks from me that made news around the world
newbie
Activity: 49
Merit: 0
July 14, 2013, 08:59:52 PM
#29
NSA paper, 1996: "How To Make A Mint: The Cryptography of Anonymous Electronic Cash". One referenced crypto expert is named Tatsuaki Okamoto.

http://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm

I can buy it.
sr. member
Activity: 320
Merit: 250
July 02, 2013, 10:10:08 PM
#28
Does it matter if the NSA started bitcoin? Even if they did, they really have no more influence than, say, the winklevoss twins on bitcoin. Unless, the NSA starts using their code cracking supercomputers to mine bitcoins and exponentially increase the mining difficulty. After all SHA-256 hashing could be involved in decrypting enemy files or networks which is the unofficial job of the NSA is.
vip
Activity: 490
Merit: 271
July 01, 2013, 11:11:43 PM
#27
what if he always routed through an encrypted tunnel to a vpn?


The goal of encryption is to prevent an eavesdropper from reading messages, not to prevent them from tracking their source and destination.

Transmission Control Protocol (TCP) – and – as far as I know – any other connection-oriented protocol – connections carrying encrypted Application layer payload are – for content-irrespective tracking purposes – no different than ones carrying unencrypted Application layer payload.

You've made a point that I've made before. Sending encrypted data is sound a horn, hey look at me. That's why you send your grocery lists in encryption. Sending visible encrypted data that appears as non-encrypted data sails by without notice. The down side is the time for encrypting a 'non-ecrypted' message can be lengthy. Time is an enemy of cryptography. If you can't encrypt it fast enough, it's useless usually. Same with decrypting, if it takes you 10 years to decrypt a message, the original message is useless.

Deterministic OTP's can be very useful. The base (any easily ready material, Bible, PowerBall, etc...) can be used as a base for creating an ∞ amount of OTP's

One Time Pads are proven to be uncrackable. Except the Rubber Hose technique, but even then a OTP could decrypt into many messages depending on how it was encrypted. Rubber Hose decryption = "Nixon did it", and the real decryption = "Obama did it". Tongue

member
Activity: 98
Merit: 10
America, land of the free
July 01, 2013, 07:12:28 PM
#26
What do you think?

I highly doubt they care who he is.
full member
Activity: 336
Merit: 140
July 01, 2013, 07:59:04 AM
#25
what if he always routed through an encrypted tunnel to a vpn?


The goal of encryption is to prevent an eavesdropper from reading messages, not to prevent them from tracking their source and destination.

Transmission Control Protocol (TCP) – and – as far as I know – any other connection-oriented protocol – connections carrying encrypted Application layer payload are – for content-irrespective tracking purposes – no different than ones carrying unencrypted Application layer payload.
hero member
Activity: 938
Merit: 500
https://youengine.io/
July 01, 2013, 06:13:13 AM
#24
Because the NSA does not have the authority
The NSA does not need to be authorized do do anything, they can just do what they please. They are effectively above the law, nobody asks them questions and if someone asks they would not need to answer.

Quote
authority to create a currency
One does not need any authorization to create a currency, every kid can do this at home (just see the altcoin forums) and unless you live in North Korea it is perfectly legal to do so, without authorization, without license, without anything.
newbie
Activity: 9
Merit: 0
July 01, 2013, 06:01:49 AM
#23
You do not have the security clearance to know that, or to even ask the question.   
sr. member
Activity: 392
Merit: 250
full member
Activity: 168
Merit: 100
June 28, 2013, 11:00:50 PM
#21
If the NSA created Bitcoin, why did the CIA need Gavin to brief them on what it was?

Because the NSA does not have the authority to create a currency so there can be no inter-agency knowledge that they did so.

The CIA may suspect or even know the NSA created it, but the NSA would never acknowledge it to them, so they had to find out about it from a different source.
full member
Activity: 168
Merit: 100
full member
Activity: 228
Merit: 100
CIYAM - UI/UX design
June 28, 2013, 01:34:19 PM
#19
SATOSHI is actually the code name for the secret cryptocurrency project, started in 2006.

is there any  resource for this info!? Would be interesting?

Quote
simply can not believe one person could do this they had help from a lot of  experts

iam with u

donator
Activity: 294
Merit: 250
June 22, 2013, 12:47:02 AM
#18
The NSA creating Bitcoin would explain why satoshi's mined blocks have never gone anywhere Wink


So would this.   Grin Grin
newbie
Activity: 14
Merit: 0
June 21, 2013, 09:54:14 PM
#17
The NSA creating Bitcoin would explain why satoshi's mined blocks have never gone anywhere Wink
legendary
Activity: 2324
Merit: 1125
June 21, 2013, 01:58:55 PM
#16

Reminds me of "NDAKOTA" anagram of "TANKADO" (Digital Fortress / NSA)  Tongue

It's definitely not an anagram:

S 2 1
A 3 3
T 2 3
O 3 3
H 1 0
I 1 1
N 1 0
K 1 2
M 1 1
U 0 1

Yves Adele Harlow Wink
member
Activity: 91
Merit: 10
June 21, 2013, 11:52:54 AM
#15

Reminds me of "NDAKOTA" anagram of "TANKADO" (Digital Fortress / NSA)  Tongue
legendary
Activity: 2324
Merit: 1125
June 20, 2013, 06:29:10 AM
#14
I suspect they are pärt of a government backed unit, i simply can not believe one person could do this they had help from a lot of  experts.

Lex parsimoniae, the simplest explanation is usually the correct one. Your explanation is far from the simplest one.
donator
Activity: 294
Merit: 250
June 20, 2013, 06:24:16 AM
#13
NSA paper, 1996: "How To Make A Mint: The Cryptography of Anonymous Electronic Cash". One referenced crypto expert is named Tatsuaki Okamoto.

http://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm


Just admit it's you already!!    Tongue


Seriously though thanks for the link... fascinating.
Pages:
Jump to: