Pages:
Author

Topic: Why Doesnt Satoshi Continue Replying on the Forum? - page 3. (Read 5019 times)

legendary
Activity: 3766
Merit: 1368
I know they are present. Why do they hide like cockroaches?

It is accepted that cockroaches have been around for at least hundreds of thousands of years in basically their present form. Are you calling Satoshi a cockroach?

Smiley
newbie
Activity: 14
Merit: 0
Quote
You think that after SHA 256 being public for how long that not a single person on the planet has been able to figure out some secret cipher? That's VERY unlikely....

It's been eternity before the man invented the wheel. Don't you find strage the fact that the ants to this day haven't done it yet?
sr. member
Activity: 342
Merit: 250
Quote
That's not the point. The point is it's extremely difficult (pretty much impossible) to go backwards once you perform a hash function. Yes you can do the reverse but it might take you 2 million years...

Extremely difficult only for you. The enemy developed the cipher they know better. You are applying the wrong algorithm.

You think that after SHA 256 being public for how long that not a single person on the planet has been able to figure out some secret cipher? That's VERY unlikely... It's ok to wear a tin foil hat buddy, but you're really pushing it on this one..
newbie
Activity: 14
Merit: 0
Quote
"Here is how the lock works, but you still can't unlock it without the key."

I know what public-key encryption scheme is. What I'm telling is that those who created the chipher in the first place have the reverse algorithm that doesn't require the private key to decrypt the message.
donator
Activity: 1218
Merit: 1079
Gerald Davis
2. New system of encryption of messages over the network - private cryptography where the ciphers are unknown to the Secret Government.

Strong cryptography doesn't rely on the cipher being unknown.  That is security through obscurity and results in poor security.  History is littered with examples, WEP, CSS, AACS, A5/1, A5/3, etc.

Strong cryptography involves making the cipher public knowledge.  "Here is how the lock works, but you still can't unlock it without the key."
newbie
Activity: 19
Merit: 0
Quote
Also, the five dollar bills in your wallet have cameras too small to be seen by an electron microscope that watch you constantly.

They aren't small, you're just applying the wrong algorithm.
newbie
Activity: 14
Merit: 0
I know they are present. Why do they hide like cockroaches?
legendary
Activity: 3766
Merit: 1368
The Satoshi group isn't gone. They just aren't using that identity anymore. They are still around trying to advance encryption so that even the NSA can't hack it. Obviously, they need to be very careful (timid) in this whole thing.

Smiley
legendary
Activity: 1386
Merit: 1053
Please do not PM me loan requests!
Quote
That's not the point. The point is it's extremely difficult (pretty much impossible) to go backwards once you perform a hash function. Yes you can do the reverse but it might take you 2 million years...

Extremely difficult only for you. The enemy developed the cipher they know better. You are applying the wrong algorithm.
Okay. It's possible to turn a 64 character digest into a five paragraph book report. You win. Bitcoin is evil. Now go to the pgp forum and tell everyone that they are not safe. After that go to the minecraft forum because notch is now a servant of the devil. Also, the five dollar bills in your wallet have cameras too small to be seen by an electron microscope that watch you constantly.
full member
Activity: 130
Merit: 100
Why did Satoshi disappear completely? He could have stayed on the forums and could reply to our questions on bitcoin.

He should just return. Please. Thank you.

He probably has better things to do with his time than answer dumb questions from noobs.
newbie
Activity: 14
Merit: 0
Quote
If you want to wallow in defeatism, fine.

No, I'm not. What I proposed I already expressed:

1. Alternative Internet (could be decentralized WiFi router based).
2. New system of encryption of messages over the network - private cryptography where the ciphers are unknown to the Secret Government.
3. Arms. You better get yourself a gun in the world that's coming.
newbie
Activity: 10
Merit: 0
Quote
We are using their own control grid to mess up their shit, and they are getting scared.

No, we are not messing up anything, we are playing in the sandbox. The reason they created the Internet was to put all communications at one place for the purpose of achieving perfect surveillance. (it fulfills part of the Cummunist Manifesto - Centralization of the means of communication and transportation in the hands of the State)
Look at "Interception Capabilities 2000" http://www.cyber-rights.org/interception/stoa/ic2kreport.htm
e.g.
Quote
It follows that foreign Internet traffic of communications intelligence interest - consisting of e-mail, file transfers, "virtual private networks" operated over the internet, and some other messages - will form at best a few per cent of the traffic on most US Internet exchanges or backbone links. According to a former employee, NSA had by 1995 installed "sniffer" software to collect such traffic at nine major Internet exchange points (IXPs).(37) The first two such sites identified, FIX East and FIX West, are operated by US government agencies. They are closely linked to nearby commercial locations, MAE East and MAE West (see table). Three other sites listed were Network Access Points originally developed by the US National Science Foundation to provide the US Internet with its initial "backbone".

 Yes, they have a comprehensive surveillance grid. What I'm pointing out is that it is turning out to be a two way street. There have been MANY instances where it has come back to bite them in the ass and will continue to do so.
Benghazi, Syria, Boston... All examples where the system was forced to backpedal in the face of public outcry and criticism.

Of course we are not out of the woods! But there are rays of hope, and it is not a foregone conclusion that the system is gonna win.

If you want to wallow in defeatism, fine. Maybe you should unplug all your electronics and go hide under your bed.

Me, I'm going to use every tool at my disposal to try to win whatever freedom I can.

Even if those tools are not perfect.
member
Activity: 98
Merit: 10
Why did Satoshi disappear completely? He could have stayed on the forums and could reply to our questions on bitcoin.

He should just return. Please. Thank you.

Satoshi was experiencing life threatening time-travel ailments that forced him to return to the future earlier than planned.  

Residual Temporal Drag Syndrome?
legendary
Activity: 2506
Merit: 1030
Twitter @realmicroguy
Why did Satoshi disappear completely? He could have stayed on the forums and could reply to our questions on bitcoin.

He should just return. Please. Thank you.

Satoshi was experiencing life threatening time-travel ailments that forced him to return to the future earlier than planned.  
newbie
Activity: 14
Merit: 0
Quote
We are using their own control grid to mess up their shit, and they are getting scared.

No, we are not messing up anything, we are playing in the sandbox. The reason they created the Internet was to put all communications at one place for the purpose of achieving perfect surveillance. (it fulfills part of the Cummunist Manifesto - Centralization of the means of communication and transportation in the hands of the State http://web.archive.org/web/19990221045304/http://www.geocities.com/Heartland/7006/com-man.html)

Look at "Interception Capabilities 2000" http://www.cyber-rights.org/interception/stoa/ic2kreport.htm
e.g.
Quote
It follows that foreign Internet traffic of communications intelligence interest - consisting of e-mail, file transfers, "virtual private networks" operated over the internet, and some other messages - will form at best a few per cent of the traffic on most US Internet exchanges or backbone links. According to a former employee, NSA had by 1995 installed "sniffer" software to collect such traffic at nine major Internet exchange points (IXPs).(37) The first two such sites identified, FIX East and FIX West, are operated by US government agencies. They are closely linked to nearby commercial locations, MAE East and MAE West (see table). Three other sites listed were Network Access Points originally developed by the US National Science Foundation to provide the US Internet with its initial "backbone".
legendary
Activity: 3612
Merit: 1564
He left because if he had stayed it would have turned into more of a personality cult than it is already.
newbie
Activity: 10
Merit: 0
Quote
It seems to me, that if there are vulnerabilities or potential backdoors, the incentive would be huge for hackers and coders to find these vulnerabilities and exploit them.
There is no backdoors in the official version of the program as far as I know. Only the Gestapo/NKVD will be allowed to fully access to your digital information. Little swindlers will not.

Quote
good thing bitcoins can't be turned off by deactivating a chip...
It's only a matter of time. When the world accepts the cashless system you will be required to wear GPS/Cell tower trackable chip which will be always with you and always online connected to the supercomputer.




I think you place way too much faith in our adversary.

 The powers that be are dangerous and evil, but they are human, they screw up and they can be thwarted.
Case in point... the internet. They underestimated people. They thought we would just use it to look at porn and cat pictures while they could categorize us and identify subversives.

The problem was, people have a hell of a lot more to say than they ever imagined. We are using their own control grid to mess up their shit, and they are getting scared.

They are now looking for ways to reign it in, but they won't be able to. Not without mass revolt.
newbie
Activity: 14
Merit: 0
Quote
That's not the point. The point is it's extremely difficult (pretty much impossible) to go backwards once you perform a hash function. Yes you can do the reverse but it might take you 2 million years...

Extremely difficult only for you. The enemy developed the cipher they know better. You are applying the wrong algorithm.
newbie
Activity: 14
Merit: 0
Quote
It seems to me, that if there are vulnerabilities or potential backdoors, the incentive would be huge for hackers and coders to find these vulnerabilities and exploit them.
There is no backdoor in the official version of the program as far as I know. Only the Gestapo/NKVD will be allowed to fully access to your digital information. Little swindlers will not.

Quote
good thing bitcoins can't be turned off by deactivating a chip...
It's only a matter of time. When the world accepts the cashless system you will be required to wear GPS/Cell tower trackable chip which will be always with you and always online connected to the supercomputer.

legendary
Activity: 4018
Merit: 1299
Why did Satoshi disappear completely? He could have stayed on the forums and could reply to our questions on bitcoin.

He should just return. Please. Thank you.

He doesn't want to be a target like Julian Assange or Edward Snowden etc.  ;-)
Pages:
Jump to: