Hello,
The most important rule in the warfare is:
Never leak information to your opponent(s) in any way.
Satoshi has leaked at least the following information potentially:
1. He/she/they probably programmed version 0.01 or 0.1 or 1.0 something like that.
Every programmer has it's own style, even creating a pizza is a form of expression none will bake it the same ammount of time or mix the same ingredients in the same ammount.
A source code style profiler/detector could be tried and then let loose on all other open source projects. Perhaps Satoshi has worked on other open source projects.
If so his style could be found and then he/she/they be revealed
2. He/she/they also leaked information about their computing speeds as was analyzed on some website which is also kinda interesting.
All kinds of combinations of cpu's and versions of windows or linux could be tried to try and reproduce the published results/blocks to see which machine/software combination fits best and coupling this to sales information may also reveal something though would be more difficult to do.
3. A third source of leaked information could be writing/posting style on forum(s). This could also be tried for an automated searcher
4. Perhaps the same computers were used to try and find more recent bitcoins, perhaps those were spent, by matching computational/output results to earlier ones there might be a match.
5. Compilation speed, and executable instruction order could reveal which compiler was used, perhaps this will lead to other leads, perhaps download information on certain websites, perhaps even an IP for used compiler
6. Perhaps he ordered pizza at regular times like some programmers do
analyzing pizza sales could reveal programmers
combined with other forms of information it could be filtered to find most likely match
(Hypothesis: The more pizzas ordered the better the programmer
most pizza sales most likely Satoshi
) (Come to think of it, somebody did order a pizza for 500 bitcoins or something, maybe he is secretly Satochi !
)
I wonder if idea 1 or 3 has been tried in an automated way ? If not it could be a research project funded by darpa in light of cyberwarfare defense/offensive/search-and-destroy evolution LOL
Bye,
Skybuck.