Pages:
Author

Topic: Why so little talk of Dave Kleiman? - page 6. (Read 16530 times)

sr. member
Activity: 420
Merit: 262
May 05, 2016, 06:51:53 AM
Your thread was deleted because it was utterly moronic, even more so than your usual bullshit. Everyone who had the misfortune to read it is now dumber for having done so. Go ahead and sell your coins, and don't let the door hit you on your way out.

The Bitcoin maximalists are having a heart attack because they don't like the facts.

While there are facts I don't like, I can accept them and I've never suffered a heart attack as a result. Though it's irrelevant since you've never said anything that even remotely resembles a fact.

You are free to present a refutation of anything I've written. So far, I've seen no technical argument from you.

Please do try, so I can REKT you.

Edit: let's go on Skype now. I want to talk some sense into you or at least find out in voice and webcam what sort of idiot trolls me. Are you afraid?
legendary
Activity: 4551
Merit: 3445
Vile Vixen and Miss Bitcointalk 2021-2023
May 05, 2016, 06:45:14 AM
Your thread was deleted because it was utterly moronic, even more so than your usual bullshit. Everyone who had the misfortune to read it is now dumber for having done so. Go ahead and sell your coins, and don't let the door hit you on your way out.

The Bitcoin maximalists are having a heart attack because they don't like the facts.
While there are facts I don't like, I can accept them and I've never suffered a heart attack as a result. Though it's irrelevant since you've never said anything that even remotely resembles a fact.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 06:44:37 AM
Who are you quoting? I never wrote that text.
Yes you did. Either that or you decided to take credit for someone else saying it. Maybe you should go to a doctor and ask for an Alzheimer's screening, considering you've already forgotten something you wrote today.

I did not write that text with bolded phrase and without the context of the caveats that I provided at the deleted thread which was quoted out-of-context and missing the link to the context, as explained already dufus:

Quote
It seems likely that Craig has identified the back door that was placed in Bitcoin as explained above, and used his supercomputer access to find a preimage of SHA256.

Who are you quoting? I never wrote that text.

Liars and spin masters rephrase the wording to present someone's argument out-of-context (and delete entire threads where the caveats where disclaimed by myself which you are failing to mention).

Is that the best you retards can do?

P.S. the context at the deleted thread which LauraM didn't even link to, contained bolded and red caveats similar to my reexplanation as follows (which I was forced to repeat after your leader gmaxwell vaporized an entire thread):

What I stated in that thread is that this is all presuming that Craig will be able to tell us which portion of the Sartre text hashes the hash output that was signed as proof on his blog. If Craig doesn't ever do that, then he is a fraud. But if he does it, then it means there is some cryptographic breakage in Bitcoin. And I am identifying the double hash as the greatest potential weakness.

1. The more I think about it, the more I realize that if it is true, then it means who ever can do this, could potentially spend other people's coins. So maybe this is how Craig will spend coins from an early block of Bitcoin (although he might have mined then also depending how early the block is he moves coins from). And the only fix I think would be to have everyone respend their coins with a fixed block chain and fixed wallets. And for lost or inactive coins, they would remain vulnerable. You may or may not need a super computer depending on the cryptographic breakage. I am not sure if an ASIC miner would help or if having access to a miner in China with 30% of Bitcoin's hashrate would help or be necessary. I can't really speculate on the exact metrics of any cryptographic breakage since this would have I assume required a lot of research on his part.

2. Yes it would apply to clones which copies the double hashing.

I repeat this is conjecture that hinges on two speculations:

a) That Craig can present the portion of the Sartre text which hashes correctly.

b) That the cryptographic breakage that allowed #a, is a break in the SHA256 presumably due to the double hashing.

You continue following gmaxwell. He will lead you to failure.



I did not write that text with bolded phrase and without the context of the caveats that I provided at the deleted thread which was quoted out-of-context and missing the link to the context

Regardless of whether the context is provided, trying to deny you wrote the text is a lie. Granted the meaning changes somewhat when context is provided, however it doesn't change the fact.

I denied writing the text without the context. Where is the lie? Are you pulling my words out of my context again! Disingenuous fuckers you all are.

I don't understand what this thread's point is. Are you complaining that the staff deleted your post, or just trying to spread your 'facts' around the forum further to cause unnecessary panic?

Yeah you don't understand. Probably because you don't want to understand. Enjoy.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 06:12:00 AM
Okay now we are starting to get some evidence that there might be a coordinated attack to hide the facts I have presented (note the following thread move to Meta is not the thread that Gmaxwell deleted):

Your thread was deleted because it was utterly moronic, even more so than your usual bullshit. Everyone who had the misfortune to read it is now dumber for having done so. Go ahead and sell your coins, and don't let the door hit you on your way out.

The Bitcoin maximalists are having a heart attack because they don't like the facts.



Okay now we are starting to get some evidence that there might be a coordinated attack to hide the facts I have presented (note the following thread move to Meta is not the thread that Gmaxwell deleted)

It's likely not a coordinated attack but a manifestation of collective conscience of bitcoin holders who don't want a sell panic to start.

Well let them be the last one out the door. Much better they can trample each other on the way out.  Grin



Quote
It seems likely that Craig has identified the back door that was placed in Bitcoin as explained above, and used his supercomputer access to find a preimage of SHA256.

Who are you quoting? I never wrote that text.

Liars and spin masters rephrase the wording to present someone's argument out-of-context (and delete entire threads where the caveats where disclaimed by myself which you are failing to mention).

You should be thankful that you are not banned (yet) due to the amount of spam that you've posted in the recent days.

Dude they know they can't ban me. I have too much political clout here. You should be careful with your words.

If they do ban me, it will only only make me stronger, because so many people will see the forum as a farce.

Besides my posting here on this forum is irrelevant to my work. I donate my time and effort as a public service.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 06:02:54 AM
Can someone explain how he signed the 'Satre' quote WITHOUT having to break SHA256 (finding a collision) ?

It's pretty important, as if he did do that, Bitcoin is broken.

He never used the hash of any Sartre quote (that was just misdirection) - the double hash that he used was simply that used in Satoshi's tx along with the signature that was used in the tx.

(basically he just copied and pasted from the blockchain then put together an elaborate pretense that he had somehow managed to sign something else using a private key known to belong to Satoshi)

Even the silly BBC report has been corrected once they finally worked out that they had been tricked.


Oh.. I see.. thanks.

How can 'big boys' like Gavin and Matonis have fallen for this.. !? That shows very poor skills..  Embarrassed ( ..too poor if you ask me.. )

No one has presented a script which hashes all portions of the Sartre text to verify whether it does or does not hash to the correct value.

Until someone does that, they can't be sure that Craig won't reveal the Sartre text which does hash to the correct value, thus proving that he broke the cryptography. Since the SHA-256 was already broken to 46 - 52 rounds of the 64 rounds (for a single hash), then doubling the hash as Bitcoin does could potentially break it for all 64 rounds, because ostensibly collision resistance gets worse when doubling a hash (as I had explained in detail upthread). No one knows why Satoshi designed Bitcoin with a double hash. I am positing it might be a back door.

CIYAM is misleading you. Follow an idiot if you want to be one.



I'm sorry for my lack of technical understanding, but if there were a back door in btc.

1. Could this be fixed easily before it could be used in a way to hurt btc? i.e do you need a super computer to utilize this back door?
2. would this same issue be there in all alts that were essentially cloned from btc code or does using a different algo or POS help to nullify this backdoor?

I am not sure if you thread was deleted since you didn't receive a PM about it. Does one receive a personal message when a thread is moved?

No when a thread is moved they don't receive a PM, but there is no "Moved: ....." thread message remaining the Bitcoin Technical Discussion subforum. And I also checked Off-topic and it hasn't been moved there afaics. Also normally the link doesn't stop functioning even when it is moved. Clearly Gmaxwell is trying to hide it.

Gmaxwell might try to claim he banned me from that sub-forum, yet he had mentioned in our last communications that I am not banned from that forum. And also smooth and I recently posted in the thread in that sub-forum on one of the SegWit threads and afaik my post hadn't been deleted the last time I looked. He didn't just delete my posts in the thread but also posts from several other forum members who posted in that thread. The entire thread has been vaporized afaics. I presume Gmaxwell is formulating his plan now how to try to make me look like a fool. We know what happened the last time he tried to do that, I embarrassed him technically.

What I stated in that thread is that this is all presuming that Craig will be able to tell us which portion of the Sartre text hashes the hash output that was signed as proof on his blog. If Craig doesn't ever do that, then he is a fraud. But if he does it, then it means there is some cryptographic breakage in Bitcoin. And I am identifying the double hash as the greatest potential weakness.

1. The more I think about it, the more I realize that if it is true, then it means who ever can do this, could potentially spend other people's coins. So maybe this is how Craig will spend coins from an early block of Bitcoin (although he might have mined then also depending how early the block is he moves coins from). And the only fix I think would be to have everyone respend their coins with a fixed block chain and fixed wallets. And for lost or inactive coins, they would remain vulnerable. You may or may not need a super computer depending on the cryptographic breakage. I am not sure if an ASIC miner would help or if having access to a miner in China with 30% of Bitcoin's hashrate would help or be necessary. I can't really speculate on the exact metrics of any cryptographic breakage since this would have I assume required a lot of research on his part.

2. Yes it would apply to clones which copies the double hashing.

I repeat this is conjecture that hinges on two speculations:

a) That Craig can present the portion of the Sartre text which hashes correctly.

b) That the cryptographic breakage that allowed #a, is a break in the SHA256 presumably due to the double hashing.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 04:28:18 AM


The tweets of this account might be worth reading. Cheesy

Craig also has training in law. Remember how Bill Clinton explained in court what the meaning of "is" is.

Note he did not write "Satoshi Nakamoto". He wrote #SatoshiNakamoto" meaning he is the real hashtag, not the person or persona.

Meanwhile, we have a bigger problem of Bitcoin core (Blockstream) developer Gmaxwell deleted my thread into a black hole (normally threads get moved some where) about the potential technical back door in Bitcoin illuminated by Craig's recent actions.

Note last time he did this, he moved my thread to Off-topic, but I checked there and nothing there.



Can someone explain how he signed the 'Satre' quote WITHOUT having to break SHA256 (finding a collision) ?

It's pretty important, as if he did do that, Bitcoin is broken.

He never used the hash of any Sartre quote (that was just misdirection) - the double hash that he used was simply that used in Satoshi's tx along with the signature that was used in the tx.

(basically he just copied and pasted from the blockchain then put together an elaborate pretense that he had somehow managed to sign something else using a private key known to belong to Satoshi)

You don't know that he didn't. He hasn't yet revealed which portion of the Sartre text he claims hashes to the same hash. That was what I explained and discussed in the thread I created which Gmaxwell has apparently sent to the ether.

You don't know that he didn't. He hasn't yet revealed which portion of the Sartre text he claims hashes to the same hash. That was the point of the thread I created which Gmaxwell has apparently sent to the ether (against forum rules).

And you really believe that the double hash of some Sartre document just happens to be identical to the hash of the first (or one of the first) txs in the blockchain?

Am guessing you have a very strong belief in the tooth fairy as well. Wink

CIYAM I would never work with you as programmer because you aren't very smart.

Surely you should understand that the permutation of portions of the Sartre text covers a combinatorial explosion of possible preimages. Craig didn't specify which portion he signed. We can presume that might be forthcoming. He is playing a game with idiots like you.

He is playing a game with idiots like you.

The only idiot here is you - and I'm glad you keep on posting your belief in this CW guy as it is just going to make you look even more idiotic as it pans out that he is the fraud that he is.

I have stated (in the thread that Gmaxwell apparently deleted entirely, that if CW does not reveal the Sartre text that hashes correctly, then he is a fraud.

But if he does, then there is something broken in Bitcoin's cryptography. That is why I think Gmaxwell deleted my thread. He apparently doesn't want the truth to be known.

Idiot is factual in this context, as evident by your inability to refute my refutation.



Idiot is factual in this context, as evident by your inability to refute my refutation.

Your ideas about facts are far removed from the rest of the world and are again off-topic (so I am not going to waste my time bothering to refute such off-topic snide remarks from you).

You didn't rebut my point that a portion of the Sartre text (and especially if permutation combinations of portions) is a combinatorial explosion of possible preimages and thus your entire claim was erroneous.

Now please stop making incorrect statements.



Here's another worthwhile article if it hasn't been mentioned before:

https://www.cryptocoinsnews.com/technical-proof-craig-wright-not-satoshi-nakamoto/

I rebutted that article in the thread that Gmaxwell deleted and is hiding from the readers.

I basically pointed out that until CW reveals which portion of the Sartre text he claims to have signed, we can't conclude anything.

Now please stop making incorrect statements.

Please name me one single SHA256 collision - idiot!

And now work out for me the odds of CW having found such a collision (and it happening to come from whatever Sartre document).

The entire point of the thread I created is that the double hashing that Satoshi put in Bitcoin (and nobody knows why) can make the collision resistance twice as bad. SHA256 is already broken for 46 - 52 of the 64 rounds. So thus doubling the hash may have been enough to break it given also that Craig apparently had access to a supercomputer.

Dude I am more expert about cryptographic hashes than you are. I designed my own already. I have done a lot of research in that area in 2013.



My guess is that you are going to offer your amazing cryptographic hash algo (which I am guessing has been peer reviewed by many experts all over the world) to Bitcoin?

Refute the facts in the prior post.

2011 attack breaks preimage resistance for 57 out of 80 rounds of SHA-512, and 52 out of 64 rounds for SHA-256.[1]
Pseudo-collision attack against up to 46 rounds of SHA-256.[2]

Now explain to the readers Mr. Know-It-All what happens when the hash is doubled.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 03:53:41 AM
Does anyone know what black hole Bitcoin core (Blockstream) developer Gmaxwell moved the quoted thread to?

I can't find it any more and I have no deleted messages from that thread in my PM box.


Wholly shit! I am contemplating the possibility that Craig has revealed that who ever created Bitcoin put a backdoor in it!

As I already explained, the signature Craig has provided proves either he has cracked something about the way Bitcoin uses SHA256 or he has Satoshi's private key. Afaics, there are no other mathematical possibilities.

But note this small detail:

You'll note that Bitcoin, for reasons known only to Satoshi, takes the signature of hash of a hash to generate the scriptSig. Quoting Ryan:

Well that isn't so insignificant of a detail when you think more about it in this context.

A cryptographic hash function has a property named collision resistance. Collision resistance is related to preimage resistance in that if we have a way to quickly find collisions, then if the preimage is collision then we also break the preimage resistance for that particular hash value.

Collision resistance is normally stated as the number of hash attempts required to find a collision or the number of rounds to break collision resistance with reasonable hardware. Normally this is exponentially less than computing the SHA256 hash function 2256 times. For SHA256, there are collision resistance attacks up to 46 of the 64 rounds of SHA256 (and 52 of 64 rounds for preimage attack).

So what happens to collision (and preimage in this context) resistance when we hash the hash? Well all the collisions from the first application of hash become collisions in the second hash, plus the new collisions in the second application of the hash thus increasing the number of rounds that can be attacked.

It seems likely that Craig has identified the back door that was placed in Bitcoin as explained above, and used his supercomputer access to find a preimage of SHA256.

If am correct, this is major news and Bitcoin could crash.

I urge immediately peer review of my statements by other experts. I have not really thought deeply about this. This is just written very quickly off the top of my head. I am busy working on other things and can't put much time into this.
legendary
Activity: 1148
Merit: 1000
May 05, 2016, 02:38:13 AM
#99
Damn you and your investigations Gleb.... So interesting I can't keep out of this thread waiting for more finds.


Good job, wish I had your drive to find the truth!
AGD
legendary
Activity: 2070
Merit: 1164
Keeper of the Private Key
May 05, 2016, 02:32:51 AM
#98

http://mpb.floridaweekly.com/news/2013-05-16/Community/Father_friends_mourn_a_sons_life_cut_short.html#.VyrwnoQrLrd

Quote
“He was strong as a bull, David. He was six feet tall, 200-plus pounds and he was a handsome devil, if ever there was one,” his father said.

https://www.documentcloud.org/documents/2644005-DAVID-KLEIMAN-13-0467.html

Quote
5' 10"; 230 lbs

Amazing how an assumed improper diet causes a man to shrink two inches and gain thirty pounds.

Quote
“I think it was until his last stay in the hospital, that lasted 2½ to three years, that he lost a lot of body mass. He lost a lot of strength, going through five or six surgeries,” Mr. Paige said.

................

Quote
He became well-known in that field, said one of his business partners, Patrick Paige.

Their company, Computer Forensics LLC, has an office on Northlake Boulevard.

http://search.sunbiz.org/Inquiry/CorporationSearch/ConvertTiffToPDF?storagePath=COR%5C2014%5C0331%5C58356362.tif&documentNumber=L11000019904



Note the Northlake Boulevard address. I'm surprised that Paige hasn't come out and call foul.

Paige looks like he can be a
Quote
5' 10"; 230 lbs
: https://www.youtube.com/watch?v=Bb5ODYaPynU

found on http://www.davekleiman.com/

edit:

http://www.davekleiman.com/experts-florida-miami-palm-beach-lauderdale-about.php

Quote
Computer Forensics LLC’s Principals

Click on each Computer Forensics Experts name to download a full CV

Carter Conrad – Carter brings more than 25 years of experience in information security and risk management. He has been qualified as an Expert Witness in Florida Circuit & Criminal Court, Federal Bankruptcy and Federal Criminal Court. He has many relevant industry certifications including the CCE, CISSP, Q/SA, Security+, and as a Langevin Learning Systems Technical Trainer. Carter is veteran trainer and has taught more than 25 classes across the United States, including Applied Computer Forensics, A+ & Security+ Bootcamps, and CISSP Prep Classes, assisting organizations to become DoD Directive 8570 compliant. Carter has vast experience in fraud mitigation and detection, with extensive training in compliance legislation, including: USA PATRIOT Act, Sarbanes-Oxley, Fair Credit Reporting Act, Driver’s Privacy Protection Act, and Gramm-Leach-Bliley Act. He has dealt with both Public and Private Sector clients providing solutions in both logical and physical security domains.

Patrick Paige – Patrick brings more than 25 years of law enforcement investigation experience, including more than 10 year as a computer crimes detective. He has performed computer forensic examinations for the FBI, U.S. Customs, FDLE, Secret Service, ATF, and was a member of the South Florida ICAC taskforce for 10 years. In 2009 he was assigned to supervise the law enforcement operations for the Palm Beach County Sexual Predator Enforcement (SPE) at the located in Boca Raton FL. Patrick has extensive knowledge of undercover online investigations including online enticement and Peer-to-Peer networks. He has been involved with hundreds of cases and has testified in State,Federal, Appellate, and Military courts as a computer expert including testifying as an expert in the functionality of Encase® at a murder trial. Patrick has many forensic certifications including EnCE, and SCERS, additionally he is an EnCase® certified instructor and has taught many forensic analysts around the country. Patrick has earned many awards including Detective of the Month, U.S. Customs Service Unit Commendation Citation Award for computer forensic work, and has twice earned the Outstanding Law Enforcement Officer of the Year citation awarded by the United States Justice Department.
vip
Activity: 1428
Merit: 1145
May 05, 2016, 02:18:56 AM
#97

http://mpb.floridaweekly.com/news/2013-05-16/Community/Father_friends_mourn_a_sons_life_cut_short.html#.VyrwnoQrLrd

Quote
“He was strong as a bull, David. He was six feet tall, 200-plus pounds and he was a handsome devil, if ever there was one,” his father said.

https://www.documentcloud.org/documents/2644005-DAVID-KLEIMAN-13-0467.html

Quote
5' 10"; 230 lbs

Amazing how an assumed improper diet causes a man to shrink two inches and gain thirty pounds.

Quote
“I think it was until his last stay in the hospital, that lasted 2½ to three years, that he lost a lot of body mass. He lost a lot of strength, going through five or six surgeries,” Mr. Paige said.

................

Quote
He became well-known in that field, said one of his business partners, Patrick Paige.

Their company, Computer Forensics LLC, has an office on Northlake Boulevard.

http://search.sunbiz.org/Inquiry/CorporationSearch/ConvertTiffToPDF?storagePath=COR%5C2014%5C0331%5C58356362.tif&documentNumber=L11000019904



Note the Northlake Boulevard address. I'm surprised that Paige hasn't come out and call foul.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 01:56:06 AM
#96
Ok but that's the stuff of reality shows like undercover boss. I would expect Satoshi to be above it.

Huh Huh

Satoshi was about trustless systems, not reputation. So the only valid answer is in the cryptography. Talk is cheap, show me the code.

Satoshi is the ultimate undercover story.

The issue here is not whether Craig is really Satoshi (for all we know Satoshi was never a person but rather a working group).

Rather this is a battle over concepts and what is the meaning of cryptography in this brave new world.

If Bitcoin was planted with a double hash for apparently no reason and it comes to be that it is possible to create undecidability of signatures of user chosen text, this speaks to something about Satoshi.

Ah I see that I am spot on with where Craig is headed with this. Kudos to myself:

http://www.drcraigwright.net/extraordinary-claims-require-extraordinary-proof/
http://arstechnica.com/business/2016/05/purported-bitcoin-creator-loses-an-ally-but-says-hell-show-more-proof/

Ostensibly Craig wants to prove that no one can prove they are Satoshi beyond any doubt, while also making it impossible to attack his claims that he was "the man behind the persona of Satoshi" in some form. That is a nebulous statement, as it could even mean he was mining Bitcoin early and thus being one of the testers "behind" the project in some sense. Remember afaik he has never claimed to be the Satoshi who coded Bitcoin. You will never find that direct quote. Rather he has claimed some relationship with Dave Kleiman and that being some important relationship involved in the inception of Bitcoin (perhaps just mining?).

Also if it turns out that he does reveal some Sartre text which hashes correctly, then this may implicate the double-hash which then implicates Satoshi, because no one can find any reason for why Satoshi chose double hashing. And I think double hashing is less secure as I explained in the OP. Surely Satoshi knew this also.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 12:58:39 AM
#95
Lol. I doubt that.

Your whole argument is based on something that hasn't even been performed publicly yet.
Your theory is based on a few pieces of code on CSW's blog and other people's word.
We still have to wait to see how CSW will actually sign the keys.

Your theory is based purely on speculation of what we think happened, instead of what we know.
If we know the signature (in theory) and the address (according to BBC), then what was the message?

Quoted as documentation of your ignorance of the technical details.

Eventually you trolls will learn not to fuck with me.

Yes, you were the first to discover that CSW discovered a "backdoor" in Bitcoin.
Your understanding of the technical details here is greatest over all others.  Roll Eyes

And the first to:

1. Explain to Gmaxwell (in his CoinJoin thread from 2013) that he couldn't use a blacklist to fix jamming of CoinJoin
2. Solve the jamming problem of decentralized exchange.
3. Design a technical solution to the inherent centralization in Satoshi's proof-of-work.
4. Which included being the first to explain technically why Satoshi didn't solve the Byzantine Generals Problem.
5. The first to explain why Z.cash's Equihash is likely not ASIC resistant.
6. First to solve a decades old unsolved fundamental problem of computer science programming language theory.

Get off my lawn you jealous troll. You are wasting my and the readers' time.
legendary
Activity: 3808
Merit: 7912
May 05, 2016, 12:54:43 AM
#94
I have now reviewed your analysis and have concluded you are talking out of your ass.

Please provide technical justification.

It's increasingly obvious that despite not being able to present actual cryptographic proof Wright is putting a lot of effort into obfuscation and trying to sway the public opinion, whether it's for his business interests or something else.

You do not seem to understand the math. Either Craig broke SHA256 or he has Satoshi's private key.

You do not seem to understand that linking to your own post doesn't prove anything. Can you post the public key, the message Wright signed, and the signature for everyone to see and verify?

The analysis was provided by others already. The review of that is ongoing here.

You, my friend are peerless; there can be no review of your work.

Do you enjoy being a troll?

You trolls can eat your words now.

As much as you enjoy quoting yourself.
I'm as much a troll as you are an investigator.

I empathize as I know jealously is an affliction of the incapable.

Enjoy your life.

 You'd better look up the word empathize; you might have confused it with sympathize or maybe you're trying to be funny? 
 Thank you.  I do enjoy my life.
sr. member
Activity: 420
Merit: 262
May 05, 2016, 12:38:08 AM
#93
I have now reviewed your analysis and have concluded you are talking out of your ass.

Please provide technical justification.

It's increasingly obvious that despite not being able to present actual cryptographic proof Wright is putting a lot of effort into obfuscation and trying to sway the public opinion, whether it's for his business interests or something else.

You do not seem to understand the math. Either Craig broke SHA256 or he has Satoshi's private key.

You do not seem to understand that linking to your own post doesn't prove anything. Can you post the public key, the message Wright signed, and the signature for everyone to see and verify?

The analysis was provided by others already. The review of that is ongoing here.

You, my friend are peerless; there can be no review of your work.

Do you enjoy being a troll?

You trolls can eat your words now.

As much as you enjoy quoting yourself.
I'm as much a troll as you are an investigator.

I empathize as I know jealously is an affliction of the incapable.

Enjoy your life.
sr. member
Activity: 392
Merit: 250
May 05, 2016, 12:34:23 AM
#92
This is how Craig Steven Wright con everybody into believing that he and David Kleiman were partners.

http://search.sunbiz.org/Inquiry/CorporationSearch/SearchResultDetail?inquirytype=EntityName&directionType=Initial&searchNameOrder=WKINFODEFENSERESEARCH%20L110000199040&aggregateId=flal-l11000019904-dce79b55-176a-4442-93a7-3c8896316aa2&searchTerm=w%26k%20info&listNameOrder=WKINFODEFENSERESEARCH%20L110000199040



02/16/2011 -- Florida Limited Liability was most likely created by David Kleiman himself. The following two images depicts the contents of the PDF: http://search.sunbiz.org/Inquiry/CorporationSearch/ConvertTiffToPDF?storagePath=COR%5C2011%5C0216%5C90321539.tif&documentNumber=L11000019904





That's the extent of the W&K INFO DEFENSE RESEARCH LLC corporation under David's control, he letting the entity lapse.

Now that it's lapsed, anybody can pick it up and reinstate it, which is exactly what somebody did.

03/28/2014 -- REINSTATEMENT: http://search.sunbiz.org/Inquiry/CorporationSearch/ConvertTiffToPDF?storagePath=COR%5C2014%5C0331%5C58356362.tif&documentNumber=L11000019904



The address in the red box is where David Kleiman lived and was found dead close to a year prior to the reinstatement of the org. The green box contains the new address of the biz. And the purple box contains the address associated with David Kleiman long before the advent of Bitcoin. Dave's signature is not on the doc because he was dead when the biz was reinstated. Ms Uyen T Nguyen is the person who signed the electronic filing.

What does it mean? Some explenation would be usefu. Who is Ms Uyen T Nguyen?
legendary
Activity: 3808
Merit: 7912
May 05, 2016, 12:19:35 AM
#91
I have now reviewed your analysis and have concluded you are talking out of your ass.

Please provide technical justification.

It's increasingly obvious that despite not being able to present actual cryptographic proof Wright is putting a lot of effort into obfuscation and trying to sway the public opinion, whether it's for his business interests or something else.

You do not seem to understand the math. Either Craig broke SHA256 or he has Satoshi's private key.

You do not seem to understand that linking to your own post doesn't prove anything. Can you post the public key, the message Wright signed, and the signature for everyone to see and verify?

The analysis was provided by others already. The review of that is ongoing here.

You, my friend are peerless; there can be no review of your work.

Do you enjoy being a troll?

You trolls can eat your words now.

 As much as you enjoy quoting yourself.
I'm as much a troll as you are an investigator.


hero member
Activity: 784
Merit: 500
sr. member
Activity: 420
Merit: 262
May 05, 2016, 12:08:32 AM
#89
Analysis of what? Please post the facts being analyzed, i.e. the public key, the message Wright signed, and the signature. The thread you linked to doesn't have that.

Your laziness isn't my fault. You find all the links if you click the link I provided to you upthread:

The three things that I asked for are nowhere to be found in the link you provided. There is only your own speculation.

So just to establish the facts - you DON'T have one or more of the following: the public key, the message Wright signed, the signature. Your claims that Wright cracked SHA256 are baseless.

Are you fucking blind?

If you click any of these links in the link I provided to you several times, you will end up finding the links to the analysis done by others which has all the information you asked for:


....

Craig Wright’s chosen source material (an article in which Jean-Paul Sartre explains his refusal of the Nobel Prize), surprisingly, generates the exact same signature as can be found in a bitcoin transaction associated with Satoshi Nakamoto.

The likelihood that a private key will generate two identical signatures when signing two different sources – a Bitcoin transaction on the one hand, and a Sartre text on the other – is so infinitesimally small that it is unlikely.

The only contention remaining is whether the Sartre text hashes to the hash Craig signed. Apparently no one has bothered to check that, even they are so damn quick to declare him a fraud without checking it.
vip
Activity: 1428
Merit: 1145
May 04, 2016, 11:35:02 PM
#88
Lol. I doubt that.

Your whole argument is based on something that hasn't even been performed publicly yet.
Your theory is based on a few pieces of code on CSW's blog and other people's word.
We still have to wait to see how CSW will actually sign the keys.

Your theory is based purely on speculation of what we think happened, instead of what we know.
If we know the signature (in theory) and the address (according to BBC), then what was the message?

Quoted as documentation of your ignorance of the technical details.

Eventually you trolls will learn not to fuck with me.

Yes, you were the first to discover that CSW discovered a "backdoor" in Bitcoin.
Your understanding of the technical details here is greatest over all others.  Roll Eyes



Paul Vernon discovered a backdoor of all of Cryptsy's users, evidence being the blood stains in the backside of their underwear.
hero member
Activity: 784
Merit: 500
Pages:
Jump to: