Author

Topic: The Satoshi's Unmasking is Aimed at Blockstream's Adam Back (Read 1211 times)

sr. member
Activity: 420
Merit: 262

That is a jumbled analysis which doesn't explain well the situation.

I already explained it more clearly:

Remember that Craig Wright had obtained funding for and was running a the largest Supercomputer in Australia. So what Craig has ostensibly done is he is used supercomputer resources to find the inverse of a hash function and then used one of Satoshi old transactions to pretend he has the private key:

The implication is that either Craig Wright has stumbled upon an infinitesimally rare occurrence of an SHA256 collision, or that he had used the signature from block 258 to reverse engineer a hash (the first shown in his blog demonstration) and hoped that nobody would notice. ycombinator user JoukeH noticed.

And with his access to a supercomputer, it is plausible he was able to reverse the hash in order to find a text that matched the signature that was already on the blockchain. Without that explanation, then he must have the private key! You seem to not understand the technology.  Roll Eyes

Let me unpack that more for n00bs. The point is that every Bitcoin signature signs the hash (of a hash) of the transaction. And so if someone can create two transactions that have the same hash, then one can use the same signature for both, i.e. no need to have the private key to generate a new signature.

What Craig did was reuse an existing signature from the block chain which is attributed to Satoshi, and supplied it as the signature for a new transactions. Specifically the new transaction is some text written by Sartre but the key point is that normally it should impossible to find a new set of data which can generate the same hash, because of the preimage resistance security property of the SHA256 cryptographic hash function.

Re-read my post, you didn't seem to understand it. Craig has not said he is Satoshi. Find a quote where he said that. You won't. He has always said it was his colleague.

Listen to the first few minutes of the BBC interview

http://www.bbc.co.uk/news/technology-36191165

"You're going to show me that Satoshi is you?"

Craig - "yes"

Remember Craig is a lawyer. Remember how Bill Clinton explained in court what the meaning of 'is' is.

Craig has consistently claimed he was backing "the persona behind Satoshi" and was part of a group involved with Satoshi, so the above statement is consistent with that, without him actually being the man who developed the code of Bitcoin with his own fingers. The interviewer did not ask Craig "are you going to prove you are the man who wrote the code of Bitcoin?" which obviously can't be proved nor disproved by any signature since Satoshi did not sign the code of Bitcoin.



Is Satoshi after all of Blockstream?

Quote
I have had no communication with Mr Wright at all, let alone signed anything. I understand that there is some information sheet Wright is giving reporters that specifically attacks me, however!

https://www.reddit.com/r/Bitcoin/comments/4hs2ca/can_all_core_developers_confirm_they_havent/



Hey dufus - why don't you look at the BBC article itself: http://www.bbc.com/news/technology-36168863

It says: "Australian entrepreneur Craig Wright has publicly identified himself as Bitcoin creator Satoshi Nakamoto."

Where did they get the information from - they got it from Craig Wright - still going to say he hasn't identified himself as being Satoshi?

You are quoting what a reporter has said, not what Craig has said. I said find a quote where Craig has claimed his is the man who wrote the code for Bitcoin. You will never find that.

Butthurt idiot. Bye.

I see you locked your thread again. You are an emotional basketcase.

I am replying to every topic where my post is relevant. I am not the one who created so many duplicate topics.

It isn't relevant and it is just spamming (you could start your own topic of course).

And if he was saying that he just knew Satoshi and is not Satoshi then why does Gavin come out this "meeting" saying that he is Satoshi (surely he would  have told Gavin it was his friend and not him).

You are just butthurt.

It is very relevant.

Craig has played Gavin. He knows Gavin needs support for his preferences for the block scaling debate.

Butthurt by what exactly?

(perhaps due to seeing your same post spammed in every topic?)

Don't pretend you've forgotten when you closed the technical thread where we were debating and told me in PM that you never wanted to talk to me again.

I don't have time for your melodrama. Bye.



It's increasingly obvious that despite not being able to present actual cryptographic proof Wright is putting a lot of effort into obfuscation and trying to sway the public opinion, whether it's for his business interests or something else.

You do not seem to understand the math. Either Craig broke SHA256 or he has Satoshi's private key.

Also by getting core Bitcoin devs and their tribe to claim that the proof Craig provided is not a proof, he has revealed them as being disingenuous. Very clever political game theory he has concocted.

Craig has astutely accomplished his goal, as only 42% of Bitcoiners conclude he can't be Satoshi. And when and if Craig signs coins from an early block of Bitcoin, the level of confusion will increase. Craig is playing a political game theory.

I think bringing in a dead person into this is just a scapegoat by Craig Wright to confuse spectators. If this is true, why would he pretend being Satoshi by signing a fake message? Until Craig comes up with this extraordinary proof he says, I refuse to believe anything that came from him.

Refusing to believe is not the same as proving he is not. Craig is winning the political game theory. He is a clever lawyer mofo.


One theory that is being floated on Reddit runs like this:

Kleiman is Satoshi, and had the keys to the ~1 million bitcoins. He dies, and his USB stick/computer/whatever went to a relative, who doesn't realize what he is holding. Wright knew Kleiman and knew he was Satoshi. So he invents this crazy story about being Satoshi, but that he can't spend the coins because they are all in a trust that was held by Kleiman.

So now Wright comes public claiming to be Satoshi - and sets himself up to launch a lawsuit against Kleiman's relative to get "his" bitcoins back. If Wright pulls this off, he gains the fabled treasure of 1 million bitcoins off Kleiman's estate.

Thoughts pro and con?



I just came up with another theory though...we might be missing the forest for the trees. Much of what CW has said has proven sketchy, or even downright lies (claiming multiple fake phd's for instance). We do know one thing that's incontrovertible: CW was very interested in high performance computing / supercomputing. Think about that for a minute.

Now what if Kleiman, being the typical computer geek, enjoyed the intellectual challenge of creating the code but had little interest in testing...and asked his friend CW to help test Bitcoin by mining. It's very possible that CW could own Block 1, and even if not, it's still possible that a significant part of Satoshi's stash...actually doesn't belong to Satoshi. What if most/all the coins we thought were Satoshi's were actually CW's?

It's also possible that Kleiman wrote the first version of the Bitcoin code, and that CW took over testing, bug fixing, and future development. Kleiman could have written the code, while CW could have been the "Satoshi" that communicated extensively with Gavin and others...

I think that CSW stumbled upon Bitcoin circa 2013 (late 2012 at the earliest) and started concocting a narrative to fit his long con. Stumbling upon the death of David Kleiman, a person who CSW co-wrote with, Craig saw that the pieces of Dave's life fit nicely in what's known about Satoshi. It was just a matter of creating docs to make it look like he and Dave were partners of sorts which I've demonstrated he's done.
legendary
Activity: 1456
Merit: 1000
Is Satoshi after all of Blockstream?

Quote
I have had no communication with Mr Wright at all, let alone signed anything. I understand that there is some information sheet Wright is giving reporters that specifically attacks me, however!

https://www.reddit.com/r/Bitcoin/comments/4hs2ca/can_all_core_developers_confirm_they_havent/
sr. member
Activity: 420
Merit: 262
No - what Craig did was grab an existing signature used by Satoshi and pretend he had created it to sign a document by Sartre (which is fraud and even Gavin is not sure what on earth to make of that).

And he *is* claiming to be Satoshi (which is why he asked Gavin to come and *verify* his claim).

Also - why are you posting the exact same thing in multiple topics?

Re-read my post, you didn't seem to understand it. Craig has not said he is Satoshi. Find a quote where he said that. You won't. He has always said it was his colleague.

And with his access to a supercomputer, it is plausible he was able to reverse the hash in order to find a text that matched the signature that was already on the blockchain. Without that explanation, then he must have the private key! You seem to not understand the technology.  Roll Eyes

I am replying to every topic where my post is relevant. I am not the one who created so many duplicate topics.

I am replying to every topic where my post is relevant. I am not the one who created so many duplicate topics.

It isn't relevant and it is just spamming (you could start your own topic of course).

And if he was saying that he just knew Satoshi and is not Satoshi then why does Gavin come out this "meeting" saying that he is Satoshi (surely he would  have told Gavin it was his friend and not him).

You are just butthurt.

It is very relevant.

Craig has played Gavin. He knows Gavin needs support for his preferences for the block scaling debate.
sr. member
Activity: 420
Merit: 262
Quote
Craig "Satoshi" Wright said he was going to move them

hahah this guy is so funny lol. He doesn't need to move any coin to prove it, just sign the fcking message if he has the prive keys

Something is weird. He provided a message and a signature, but there's nothing in the message to indicate that he signed it himself, or when it was signed. It could have been signed months or years ago and there's no way to prove otherwise.

To understand what is really going on, you need to read carefully what Craig Wright has always said and continues to reiterate:

In his initial blog post, Wright noted that “Satoshi is dead... but this is only the beginning.” He also said that he would follow up with a more detailed mathematical explanation for the revelation. Now, the world will likely have to wait for “the coming days”—however long that may be—for more clues.

If I sign Craig Wright, it is not the same as if I sign Craig Wright, Satoshi.

I think this is true, but in my heart I wish it wasn’t.

Since those early days, after distancing myself from the public persona that was Satoshi,

Satoshi is dead.

But this is only the beginning.

You need to remember that Craig Wright has never claimed he is Satoshi Nakamoto. Instead, he has claimed that his former colleague (who died) was Satoshi. He claims he was backing his colleague's the development of Bitcoin.

This Australian Says He and His Dead Friend Invented Bitcoin



David Kleiman, Craig Wright's friend more likely Satoshi Nakamoto

OK so this might get a little meandering but I keep finding tidbits of David Kleiman's life that makes him a far more likely candidate for Satoshi than Wright. So here are some in no specific order.

Remember that Craig Wright had obtained funding for and was running a the largest Supercomputer in Australia. So what Craig has ostensibly done is he is used supercomputer resources to find the inverse of a hash function and then used one of Satoshi old transactions to pretend he has the private key:

The implication is that either Craig Wright has stumbled upon an infinitesimally rare occurrence of an SHA256 collision, or that he had used the signature from block 258 to reverse engineer a hash (the first shown in his blog demonstration) and hoped that nobody would notice. ycombinator user JoukeH noticed.

Realize that he has probably promised to endorse Andresen's block chain scaling preferences and thus probably why Gavin wants him to be Satoshi:

Andresen’s only attempt at an explanation for Wright’s bizarre behavior, he says, is an ambivalence about definitively revealing himself after so many years in hiding. “I think the most likely explanation is that … he really doesn’t want to take on the mantle of being the inventor of Bitcoin,” says Andresen, who notes that his own credibility is at stake, too. “Maybe he wants things to be really weird and unclear, which would be bad for me.”

That uncertainty, Andresen says, seemed to be evident in Wright’s manner at the time of their demonstration. Andresen describes Wright as seeming “sad” and “overwhelmed” by the decision to come forward. “His voice was breaking.

Remember that after his death, David Kleiman's family recovered his USB flash drive and gave it to Craig Wright. Thus likely Craig Wright may have an unpublished transaction but not the actual private key. So he may be about to fool the world into thinking he is Satoshi, or making some proof that he was the man behind the man who was the real Satoshi.
jr. member
Activity: 33
Merit: 2
Yeah, it's looking like this guy might really be satoshi. But he does need to provide better public proof and dispel the rumors and mass conspiracy theories already, seriously.

You mean better public proof other than the now debunked proof he has already provided? Ask yourself if this was truly Satoshi Nakamoto, the man credited with the creation of Bitcoin, why would he offer up proof that he knew would be debunked in a matter of hours, if not minutes, after if was published in the first place?

There is no way this is Satoshi, it is simply Craig's feeble attempt number 2 at fooling the gullible. Perhaps he will get it right the next time, after all "the third time's the charm."
member
Activity: 83
Merit: 17
You can't view the source code of the site.
There is nothing on earth that can stop me from viewing the html source of a webpage.

Code:









Jean-Paul Sartre, Signing and Significance - Dr. Craig Wright BlogDr. Craig Wright Blog



























































    
    

















Analysis

Jean-Paul Sartre, Signing and Significance



May 2, 2016




jeanpaulsarte-blogpost





“If I sign myself Jean-Paul Sartre it is not the same thing as if I sign myself Jean-Paul Sartre, Nobel Prizewinner”

– Jean-Paul Sartre, 1964

 


I remember reading that quote many years ago, and I have carried it with me uncomfortably ever since. However, after many years, and having experienced the ebb and flow of life those years have brought, I think I am finally at peace with what he meant. If I sign Craig Wright, it is not the same as if I sign Craig Wright, Satoshi.


I think this is true, but in my heart I wish it wasn’t.


IFdyaWdodCwgaXQgaXMgbm90IHRoZSBzYW1lIGFzIGlmIEkgc2lnbiBDcmFpZyBXcmlnaHQsIFNh 
dG9zaGkuCgo=

 


I have been staring at my screen for hours, but I cannot summon the words to express the depth of my gratitude to those that have supported the bitcoin project from its inception – too many names to list. You have dedicated vast swathes of your time, committed your gifts, sacrificed relationships and REM sleep for years to an open source project that could have come to nothing. And yet still you fought. This incredible community’s passion and intellect and perseverance has taken my small contribution and nurtured it, enhanced it, breathed life into it. You have given the world a great gift. Thank you.


Be assured, just as you have worked, I have not been idle during these many years. Since those early days, after distancing myself from the public persona that was Satoshi, I have poured every measure of myself into research. I have been silent, but I have not been absent. I have been engaged with an exceptional group and look forward to sharing our remarkable work when they are ready.


Satoshi is dead.


But this is only the beginning.


Key Verification


In the remainder of this post, I will explain the process of verifying a set of cryptographic keys.


To ensure that we can successfully sign and validate messages using the correct elliptic curve parameters in OpenSSL, it is necessary to ensure that the secp256k1 curve is loaded. This is not the default on Centos Linux. I will not detail this process here. I do point out that RPMForge maintains binaries that have already been patched. My recommendation would be to download both the source files from the OpenSSL website and the patch, if, like me you’re running Centos.


I will also point the reader to the following websites for some preliminary reading:



The first stage of this exercise will be to explain hash functions. In the figure below we’re displaying a file called “sn7-message.txt”.


Script fragment regarding hash functions

Script fragment


The series of hexadecimal values displayed in the figure above represents the SHA256 hash of an input value. A good hash algorithm will produce a large string of values that cannot be determined in advance. The amount of information and possible permutations always exceeds the range of imitations that can be output from any hash function and as a result, collisions will always exist. What makes a hash function such as SHA256 useful and considered “secure” is that it is infeasible given the current state of technology to determine and find a set of input values to the hash function that collides with the same value that is returned as output.


The SHA256 algorithm provides for a maximum message size of bits of information whilst returning 32 bytes or 256 bits as an output value. The number of possible messages that can be input into the SHA256 hash function totals possible input values ranging in size from 0 bits through to the maximal acceptable range that we noted above.


In determining the possible range of collisions that would be available on average, we have a binomial coefficient that determines the permutations through a process known as combinatorics [1].


I will leave it to a later post to detail the mathematics associated with collision detection. It is important to note though that there are an incredibly large number of colliding values associated with each hash but that the probability of finding two colliding values or determining them in advance is infinitesimally small. Next week, I will follow-up with a post based on combinatorics and probability theory demonstrating the likelihood of finding collisions for “secure” hashing algorithms.


Hashing


Hash functions are relatively simple and can be done by hand. This of course belies the complexity that is required to reverse them. A good hash function is simple to use and yet is infeasible to reverse. In the figure below we have run the Linux hash routine “sha256sum”. This simple program will return a unique value that corresponds to a set and fixed input.


Script fragment

Script fragment


In the figure above, we have run this on several files including one that we are using for this OpenSSL signature exercise. The particular file that we will be using is one that we have called Sartre. The contents of this file have been displayed in the figure below.


Script output

Script output


Digital signature algorithms sign the hash of the message. It is possible to sign the message itself but in signing the hash it is possible to ensure the integrity of the message and validate that the message has not changed. If even a single space or “.” was to be altered, the hash will be radically different to the value returned initially.


In order write this value and save it to a file, we can use the Linux command, xxd. This will write the ASCII values into a hexadecimal binary file. In the command below we would be writing a string of zeros into a file called “file.name”.


echo '000...000' | xxd -r -p > file.name

 


In doing this, we can change the string we received as output from the hashing algorithm into a hex encoded file. This will be the message we can sign and verify. It is important to validate the string of numbers that you are putting into the echo command above. If a single digit has been typed incorrectly then the message will not verify.


Public Keys


In order to verify a digitally signed message we need number of components. These include:



  • The algorithm,

  • the public key of the signing party that we wish to verify,

  • the message that has been signed, and

  • the digital signature file.


The first part of this, the algorithm is obtained through the installation of OpenSSL with the incorporation of the secp256k1 curve patch. In the step above we covered the creation of a hashed message. In the next section we will cover the use of ECDSA public keys.


Script fragment

Script fragment


For this exercise I am using a public-private key pair that is saved is a PEM file in OpenSSL. David Derosa has written an excellent page defining the creation of an elliptic curve key pair in OpenSSL. In the figure above you can see the particular PEM format public key that is associated with the key pair used in signing the message in this exercise. A thorough reading of David’s page will provide all of the information for the reader detailing how a private key pair used in bitcoin transaction can be formatted as a PEM file. This page details the creation of a new private key and not how an existing private key can be imported into OpenSSL. I shall cover this additional process and demonstrate how an existing private key pair based on elliptic curve cryptography can be imported into a ASN.1 format for use with OpenSSL directly.


The command to export our public key is given below.


openssl ec -in sn-pub.pem -pubin -text -noout

0411db93e1dcdb8a016b49840f8c53
bc1eb68a382e97b1482ecad7b148a6
909a5cb2e0eaddfb84ccf9744464f8
2e160bfa9b8b64f9d4c03f999b8643
f656b412a3


The string returned is the public key value used by programs including bitcoin for the verification and addressing of the signing function.


Casascius has developed a nifty tool that will help you decode this public key and return the associated bitcoin address that it maps to. We have a blog on this site that will help you understand the technical aspects of how bitcoin addresses derived from the public and private keys. Several online tools are also available that can calculate the bitcoin address from the public key.


Signing


The process of digitally signing a message using OpenSSL requires that the party signing the message has access to the private key. I will document and cover this process further in a later post. In recent sessions, I have used a total of 10 private keys are associated with bitcoin addresses. These were loaded into Electrum, an SPV wallet. In one of the exercises, I signed messages that I will not detail on this post for a number of individuals. These were not messages that I personally selected, but rather ones that other people had selected. In some instances, we ensure the integrity of the process by downloading a new version of the electrum program, installing it on a fresh laptop that has just been unboxed having been purchased that afternoon and validating the signed messages on the new machine.


The version of electrum that I run is on Centos Linux v7 and runs via Python. For the exercise I noted above we used Windows 7 and Windows 10 on different occurrences.


Signature Verification


The final component that we need to cover is the signature itself. We will be using the following command to convert our base64 format signature into a file format that can be loaded into OpenSSL.


>> base64 --decode signature > sig.asn1 & openssl dgst -verify sn-pub.pem -signature sig.asn1 sn7-message.txt


The signature filed we will be verifying contains the following data.


------------------------- Signature File -------------------------
MEUCIQDBKn1Uly8m0UyzETObUSL4wYdBfd4ejvtoQfVcNCIK4AIgZmMsXNQWHvo6KDd2Tu6euEl1
3VTC3ihl6XUlhcU+fM4=
------------------------- End Signature --------------------------

In the figure below we display the signature file as it is stored on the computer that was used for this process and we see the result of the verification exercise. In saving this file, you could cut-and-paste the encoded signature and insert it into a saved file using an editor program such as vim. Not that I’m looking at getting into a holy war over the choice of editing programs.


Script fragment

Script fragment


There are two possible outputs from this process that concern us. OpenSSL will either return as “Verified OK” where we have validly verified the signature. All of the information that is required to import the public key, the message and the message signature used in this post is available on this post.


I could have simply signed a message in electrum as I did in private sessions. Loading such a message would have been far simpler. I am known for a long history of “being difficult” and disliking being told what “I need to do”. The consequence of all of this is that I will not make it simple.


Some scripts


In order to simplify this process, I have included two shell scripts. For variations on scripts like these, please visit a site such as the one hosted by Enrico Zimuel. This site is not particularly focused on elliptic curve cryptography but it is not too difficult to update his code for the use on a bitcoin based system.


Signing


For you to try and test this at your leisure I have included the signing script below. To use this script, the input consists of the variable <file> which signifies the file that you desire to sign using a selected <private_key> under your control. In this command, the <private_key> variable represents the file containing the private key to be used in signing the message and which will output the signature.


EcDSA.Sign.sh <file> <private_key>


The output from this shell script consists of the signature saved as a Base64 encoded file. This will be saved to your hard drive or other location using Base64 format as a file named <signature.der>.


EcDSA.sign.sh

EcDSA.sign.sh


Verification


We can use a similar process to verify the signature we have created using the script that I have included below.


EcDSA.Verify.sh <file> <signature> <public_key>


In this commandline, the variable <file> is used to signify the name of the file we seek to verify. The variable <signature> represents the file where we have saved the signature (and coded using Base64), and the final variable, <public_key> contains the PEM formatted public key. We use these files together and if they are valid and correct they will allow us to successfully to verify the digital signature.


Shell script

EcDSA.verify.sh


Choices on formatting


The signature format used within bitcoin is based on DER encoding. Other methods have been applied in the original code has changed significantly in the last seven years. The choice of DER encoding for the signatures and other information was based on a desire to ensure that information could be shared between incompatible systems. It is not the most efficient means of storing information but it does allow for disparate systems to communicate efficiently.


Like many open source projects, OpenSSL is poorly documented in many areas. bitcoin addressing and the storage of key pairs could have been far more efficient and the code has been updated to ensure that this is now the case. But like every new system it is far better to have something that is working on something that is not available but is aiming at perfection.


Security is always a risk function and not an absolute.


References


[1]          Lovasz, Laszlo (1979) “Combinatorial Problems and Exercises” North Holand Publishing Co. Amsterdam




























 

You Might Also Like

































                
                
                                    data-cfasync="false"
                    type="text/javascript"
                    src="//s7.addthis.com/js/300/addthis_widget.js#pubid=wp-cbfa21fce47ef9a83c21743f7ccccfb9 "
                    async="async"
                >
                
                
                
























Source: http://www.drcraigwright.net/jean-paul-sartre-signing-significance/
legendary
Activity: 1708
Merit: 1036
Since the muddled/scammy nature of Wright's original claims back in December, he's evidently been hard at work crafting all this stuff. He still doesn't have any real evidence, so he had to rely on the (easily debunked) OpenSSL blog nonsense to distract most people, while figuring out how to arrange a private meeting with folks like Gavin and Andreas under controlled conditions to trick them into believing he was the real deal, and hope that appeal to authority trumped everything else.

Look at the agenda involved in his sudden flood of blog posts and we'll see what is motivating him, directly or indirectly. For someone who had "moved on to other things" and kept mum through all the outrages, scandals and controversy in bitcoinland the last five years, Wright's "Satoshi" suddenly seems to be full of opinions about what ought to be done with bitcoin. And for me, that's another line of evidence against him.
legendary
Activity: 992
Merit: 1000
Yeah, it's looking like this guy might really be satoshi. But he does need to provide better public proof and dispel the rumors and mass conspiracy theories already, seriously.
vip
Activity: 1428
Merit: 1145
Strange that Craig Wright's website has a number of blog posts that have the same date and clearly took weeks to compose:



http://www.drcraigwright.net/consistency-distribution-transactions/

The website also say's its mission statement is to pursue Bitcoin / cryptocurrency projects.

So, this guy is trying to dismiss Blockstream's Adam Back as having any input into the creation of Bitcoin, and instead setting himself up as the leader of a Bitcoin organisation.

What next, seeking an $80m investment into his 'organisation'?

Very cleverly, Craig has flatly refused to accept any prizes that come with a monetary prize.

Very clever, why?  If it is later found out that he is not Satoshi, having taken monetary prizes under false pretenses would likely lead to criminal charges.

Not that I'm saying he isn't Satoshi.  It just smells very fishy.





The site went live for the first time last night (CST).
You can't copy text off any page.
You can't view the source code of the site.

Gavin Andresen, a trusted member of Cryptoland, says that you can trust him.
Jon Matonis says you can trust him.

Ergo, Marshall Long, Chantha Owen Lueung, Leroy Fodor, Paul Vernon, Sonny Vleisides, Josh Zerlan, Joshua Zipkin and John Fitzpatrick are not too far behind themselves in declaring that Craig Steven Wright can be trusted.
legendary
Activity: 1667
Merit: 1008
Stoned & Stranged
That guy is an impostor for sure, I heard the Bitcoin CEO killed himself years ago... lol 

I think it is just a new way to try manipulate the price down before the halving, it won't be new at all.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
Strange that Craig Wright's website has a number of blog posts that have the same date and clearly took weeks to compose:

Not that I'm saying he isn't Satoshi.  It just smells very fishy.


He isnt satoshi.

Those books have probably been pre-made. This is a very complex hoax i think and it seems like he doubles down on the lies.

So far we have 0 proof whatsoever only media scaremongering and sensationalism. This isnt anything factual to base this crap on.

So i`m waiting for real proof.
legendary
Activity: 1456
Merit: 1000
Having listened to the interview with Craig Wright back in Oct '15, he does seem to be very convincing.

https://www.youtube.com/watch?v=xIZWVu6XsO4

So, all he needs to do is do better signing - pgp and genesis block.
hero member
Activity: 699
Merit: 501
Great post. Fortunately, what ever his motive may have been, has fail!

Hopefully any unseen damages this would have caused should have been mitigated.
legendary
Activity: 1456
Merit: 1000
Strange that Craig Wright's website has a number of blog posts that have the same date and clearly took weeks to compose:



http://www.drcraigwright.net/consistency-distribution-transactions/

The website also say's its mission statement is to pursue Bitcoin / cryptocurrency projects.

So, this guy is trying to dismiss Blockstream's Adam Back as having any input into the creation of Bitcoin, and instead setting himself up as the leader of a Bitcoin organisation.

What next, seeking an $80m investment into his 'organisation'?

Very cleverly, Craig has flatly refused to accept any prizes that come with a monetary prize.

Very clever, why?  If it is later found out that he is not Satoshi, having taken monetary prizes under false pretenses would likely lead to criminal charges.

Not that I'm saying he isn't Satoshi.  It just smells very fishy.

Jump to: