in , , ,

Craig Wright´s Post Compilation in Alphabetical order.

Craig Wright´s Post Compilation in Alphabetical order.

Nº         Title                           – Date

1 A Bitcoin Smart Risk Contract 30/10/2018
2 A call to arms 10/06/2018
3 A codification scheme for state machines 16/10/2018
4 A comparative study of attacks against Corporate IIS and Apache Web Servers” Sans, USA 01/12/2011
5 A diatribe on Bitcoin, Trust and the economy of security (redux) 07/09/2018
6 A Distribution Protocol for Dealerless Secret Distribution 04/11/2018
7 A distribution protocol for dealer-less secret distribution 17/10/2018
8 A Fundamental Misunderstanding 05/11/2019
9 A house divided 24/09/2018
10 A house divided 24/11/2018
11 A Preamble into Aligning Systems Engineering and Information Security Risk – October 11, 2011 11/10/2011
12 A preamble into aligning Systems engineering and Information security risk measures” ICBIFE, HK 24/08/2011
13 A Proof of Turing completeness in Bitcoin Script 12/10/2018
14 A Proof of Turing Completeness in Bitcoin Script 04/11/2018
15 A Quantitative Analysis into the Economics of Correcting Software Bugs. CISIS Spain 2010 08/01/2011
16 A QUANTITATIVE TIME SERIES ANALYSIS OF MALWARE AND VULNERABILITY TRENDS 01/10/2006
17 A story of apples 03/01/2020
18 A Taxonomy of Information Systems Audits, Assessments and Reviews 16/07/2007
19 Account and Transfer Systems 22/12/2018
20 An anti-forensics dd primer 13/04/2010
21 An immutable file and data store 06/01/2019
22 An invitation to treat 08/11/2018
23 Analysis of a serial based digital voice recorder 2005
24 Analysis of a Serial Based Digital Voice Recorder 03/09/2006
25 Anarchy and the Foolish Belief in Assassination Markets. 06/01/2020
26 Angel Funding Project 1 05/05/2018
27 Are Anonymous and LulzSec about to hack PayPal for WikiLeaks? 29/07/2011
28 Are the Poor Exploited? 17/09/2018
29 Attacks, Slander, and Censorship 20/05/2017
30 Bank Lending Decisions, Asymmetric Information, Adverse Selection, and Moral Hazard. 24/06/2017
31 Banking on Bitcoin 02/09/2018
32 Banks versus markets. 29/06/2017
33 Beyond automated tools and Frameworks – the shellcode injection process. Hakin9 01/01/2007
34 Beyond Automated Tools and Frameworks: The Shellcode Injection Process 17/04/2018
35 Beyond Godel 28/04/2018
36 Beyond Godel :: SSRN-id3147440 28/03/2018
37 Bit Gold Is Not BitCoin 08/04/2019
38 Bitcoin 10/09/2015
39 Bitcoin (BCH) Vending machine 10/10/2018
40 Bitcoin and banking… part 1 10/06/2018
41 Bitcoin and Contract Jurisdiction 11/04/2019
42 Bitcoin and Contracts 29/09/2018
43 Bitcoin and Quantum Computing 03/04/2018
44 Bitcoin and Quantum Computing 23/01/2019
45 Bitcoin and the Connection to Contracting 1/5 11/07/2017
46 Bitcoin and the Connection to Contracting 2/5 13/07/2017
47 Bitcoin and the Connection to Contracting 3/5 15/07/2017
48 Bitcoin and the Connection to Contracting 4/5 17/07/2017
49 Bitcoin and the connection to contracting 4/5 21/06/2019
50 Bitcoin and the Connection to Contracting 5/5 19/07/2017
51 Bitcoin and the connection to contracting 5/5 21/06/2019
52 Bitcoin and the costs of consumption 28/04/2016
53 Bitcoin and the long term 12/11/2018
54 Bitcoin as a Notary 01/10/2018
55 Bitcoin as the base layer 01/11/2018
56 Bitcoin Fights Corruption 23/10/2019
57 Bitcoin in law 18/12/2018
58 Bitcoin is a commodity 12/12/2018
59 Bitcoin is all about incentives 06/11/2018
60 Bitcoin Is Anything BUT Anonymous. 01/09/2019
61 Bitcoin is evolution, not revolution 03/05/2018
62 Bitcoin is for business 20/11/2018
63 Bitcoin is not against banks 14/04/2019
64 Bitcoin is not Anti State – it is Pro Honest government 09/11/2018
65 Bitcoin Mining: Consistency and the Distribution of Transactions 28/04/2016
66 Bitcoin vs The Anti-Capitalistic Mentality 17/05/2017
67 Bitcoin: A Total Turing Machine 12/10/2018
68 Bitcoin: A Total Turing Machine 04/11/2018
69 Bitcoin: SEIR-C Propagation Models of Block and Transaction Dissemination 02/04/2018
70 Bitcoin’s privacy model 11/12/2018
71 Black Mirror 01/09/2018
72 BLOCKCHAIN Based Accounting: General Ledger Posting 14/12/2018
73 Blockchain-Based Decentralised Autonomous Corporations: An Overview 17/10/2018
74 Breach of contract – remedies for breach 27/12/2018
75 BTC and Censorship 15/04/2019
76 Building a UNIX/Linux Incident response / Forensic Disk 09/03/2010
77 Building data 13/11/2018
78 Burning and why it matters that it is stopped 27/10/2018
79 Buy now, pay later 07/11/2018
80 Capitalism 15/11/2018
81 Careful what you wish for… 08/02/2019
82 Check Point NGX R65 Security Administration 31/08/2011
83 Clickwrap smart contracts 03/03/2019
84 Code skills make better Forensic Analysts 24/04/2009
85 Coin burning for dummies 04/11/2018
86 Commodity and security 19/11/2018
87 Contract Law and Smart Contracts 28/12/2018
88 Contradictions 30/07/2019
89 Copyright terms © 17/03/2019
90 Corporate activism 10/11/2018
91 Creating a Smart Contract Registry 06/10/2018
92 Criminal Specialization as a corollary of Rational Choice.” ICBIFE, HK 28/05/2010
93 Crowd Funding and ICOs 24/12/2018
94 Crypto flim-flam 13/05/2019
95 Currency 18/12/2018
96 Current Issues in DNS” Sans Technology Inst, USA 30/12/2008
97 Custodial standards” 10/05/2019
98 Cyber Security Centre planned to target growing threat. 23/01/2013
99 DAC Decentralized Autonomous Corporation 07/01/2019
100 Data World 20/09/2018
101 Death and taxes, it is time to kill off mythical beasts 04/09/2018
102 Decentralised or just inefficient? 26/04/2019
103 Decentralized planning 03/04/2019
104 Defamation and the diffculties of law on the Internet. 05/03/2008
105 Defining smart contracts 28/09/2018
106 Destruction of adverse documents 15/12/2008
107 Detecting Hydan: Statistical Methods For Classifying The Use Of Hydan Based Stegonagraphy In Executable Files” Sans Technology Inst USA 03/07/2008
108 DFA compilation and execution 19/10/2018
109 Digital Gold. 08/11/2019
110 Digital Rights Management: Serialised Media 24/03/2019
111 Digital signature rules and their relationship to bitcoin 16/10/2018
112 DMCA 19/03/2019
113 DNS Security in AUSTRALIA June 2000
114 Don’t be fooled — Bitcoin is not BTC 08/05/2019
115 Drugs, Fraud and Murder 06/11/2018
116 Dynamic disequilibria and the creation of criminal opportunity 18/09/2018
117 Economic Convergence 22/09/2018
118 Economic Security” 22/05/2019
119 Effective Enforcement in the Vastly Distributed Wild Wild Web 21/10/2018
120 Electronic Contracting in an Insecure World” 01/02/2008
121 Electronic Contracting, New Wine in Old Bottles 09/01/2006
122 Electronic Contracting, New Wine in Old Bottles 24/04/2017
123 Electronic_Contracting_New_Wine_in_Old_Bottles 2007
124 Ensuring honest money 23/01/2019
125 Equality 15/09/2018
126 Erasing drives should be quick and easy 25/01/2011
127 Evidence and Choice of Law 10/05/2018
128 Evidence and law 12/04/2019
129 Expectation of Profits 20/12/2018
130 Exploiting format Strings with Python” Hakin9 24/08/2011
131 Exporting wealth 03/11/2018
132 Extending Control, API Hooking 17/04/2018
133 Extending Control, API Hooking. Hakin9 31/03/2006
134 Fearing Companies 28/06/2017
135 Feign Madness but Keep Your Balance. 11/06/2019
136 Finding out about other users on a Linux system 15/03/2010
137 Finer Points of Find 22/03/2010
138 Finite State Machines in Script 18/03/2019
139 Fixing OP_False 08/11/2018
140 Foreign-exchange considerations & Bitcoin 17/10/2018
141 Forex accounting in script 24/02/2019
142 Forget anonymity. 10/04/2019
143 Forks as a demerger, or a split as a copy? 20/03/2019
144 Free Speech 18/03/2019
145 Free Windows Drive tools 18/02/2009
146 Freedom is a right that must be carefully tended. 01/03/2017
147 From simplicity comes … 09/04/2019
148 From the Bygone Days of Yore — Part 1 03/06/2019
149 Fully Peer-to-Peer 06/06/2019
150 Funding and rights 20/05/2019
151 Generating a Bitcoin address 26/04/2016
152 Generic Thin Operating System for Blockchain IOT Devices 03/02/2019
153 Genesis 22/05/2017
154 GNARLED ROOTS OF A CREATION MYTHOS 10/05/2019
155 Good Title Is Not a Key. 20/08/2019
156 Group Selection and Cyber Terror 24/08/2012
157 Hard Drive Errors and Replacements 29/06/2009
158 Hearsay in the Blockchain world 24/10/2018
159 Hello Dave… 22/02/2019
160 Hidden costs 06/10/2018
161 Hoarding and Bitcoin 24/09/2018
162 How Bitcoin Helps Reduce Poverty 21/09/2018
163 How cyber terror and cyber espionage will change the face of SCADA in the coming decade” National SCADA Conference 2012 (May 2012) 15/01/2015
164 How Digital Signatures Work. 21/01/2020
165 How Keynes Failed To Comprehend Say’s Law 16/08/2019
166 How math can help with forensics 03/09/2008
167 How math can help with forensics 27/10/2008
168 How to make a brain wallet 27/03/2019
169 Human rights and property 01/04/2017
170 Human rights and property 12/09/2018
171 Human Rights and Property. 03/09/2019
172 Hypocrisy 10/02/2019
173 If Gold Turned to Lead. 21/10/2019
174 Immutable evidence 16/02/2019
175 Implementing an Information Security Management System (ISMS) Training process 03/09/2005
176 Instant transactions 09/12/2018
177 Institutional madness” 16/05/2019
178 Investigation of the Potential for Using the Bitcoin Blockchain as the World’s Primary Infrastructure for Internet Commerce 18/11/2017
179 IoT and the coming Toaster-world 19/09/2018
180 IPv6 The secure (Bitcoin) Internet 03/11/2018
181 IPv6 with CGA and Bitcoin 02/11/2018
182 Iron and Steel 09/06/2018
183 Jean-Paul Sartre, signing and significance 02/05/2016
184 Jean-Paul Sartre, Signing and Significance 02/05/2016
185 Keynesian flaws. 01/04/2017
186 Keynesian flaws. 14/09/2018
187 Laisez-nous faire” 09/11/2018
188 Learning Script 18/03/2019
189 Lecture 1: Free Short Course: Programming on Supercomputers 18/06/2015
190 Lecture 2: Free Short Course: Programming on Supercomputers 23/06/2015
191 Lecture 3: Free Short Course: Programming on Supercomputers 01/07/2015
192 Lecture 4: Free Short Course: Programming on Supercomputers 08/07/2015
193 Lecture 5: Free Short Course: Programming on Supercomputers 15/07/2015
194 Lessons in monetary terms 25/02/2019
195 Life, the universe and everything. 10/05/2018
196 Life-cycle Hypothesis 19/06/2017
197 Lightning is malleable… Steel is not 19/06/2018
198 Lightning” Network and the Financial Industry Regulatory Authority (FINRA) 01/02/2019
199 Limited change to bring stability 19/08/2018
200 Linux Programming Tools 13/07/2010
201 Locked transactions for planning 29/03/2019
202 Logical Fallacies and the SCADA Problem 16/07/2019
203 Looking the Other Way. 17/01/2020
204 LulzSec, Anonymous … freedom fighters or the new face of evil? Craig S Wright 09/08/2011
205 Managing Blockchain Automata 21/10/2018
206 Markets and imperfections 04/11/2018
207 Merkle Trees and SPV. 02/11/2019
208 Miners and Property rights 14/11/2018
209 Miners and rational expectations 29/09/2018
210 Miners and rational expectations 29/12/2018
211 Misconceptions surrounding copyright 09/09/2018
212 Misinformation and the myth of Satoshi 25/04/2019
213 Mistakes also Come when You Listen to Others… 15/01/2020
214 Modeling System Audit as a Sequential test with Discovery as a Failure Time Endpoint” ICBIFE, HK 15/02/2011
215 Monetary Law and Blockchains. 12/06/2019
216 Monetary transfer and transmission rules 18/10/2018
217 Money is a measuring stick 14/05/2019
218 Money Must First Be Stable 14/08/2018
219 MSBs and Account-Based Systems 04/06/2019
220 My Mentor 07/04/2019
221 My Past with the UFA 01/05/2017
222 Myth and Reality, Security is Really About Economics 23/05/2017
223 Myths of permission-less 28/10/2018
224 NDIFF for incident detection 24/06/2010
225 Negotiable Instruments 02/07/2018
226 Neural Network Threshold Oracles 26/10/2018
227 Nodes 13/06/2017
228 Non-Repudiation – Does this exist? 22/10/2018
229 nSequence and P2P exchange 13/11/2018
230 Of Black Swans, Platypii and Bunyips. The outlier and normal incident in risk management.” CACS2011 Australia 01/11/2011
231 Official (ISC)2 Guide to the CISSP(R)-ISSMP(R) CBK 22/05/2009
232 Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press) 11/04/2011
233 On Civil Disobedience. You can view the full article here 07/01/2020
234 On Predicates 21/12/2018
235 On Scammers, a redux. 04/11/2019
236 On scammers. 13/06/2019
237 On testing and causal statements 01/04/2017
238 On testing and causal statements 01/04/2019
239 On the minimum wage 06/11/2018
240 OP Codes and the push to confuse. 07/06/2018
241 Open Source. 25/01/2020
242 Operating an Escrow Document Storage and Secure Signing Registry. 26/06/2019
243 OpSec and the Bitcoin business 23/10/2018
244 Overwriting Hard Drive Data 15/01/2009
245 Overwriting Hard Drive Data: The Great Wiping Controversy” Lecture Notes in Computer Science (Springer Berlin / Heidelberg) 03/07/2007
246 P2P and returning IP and domain-based transfers 09/11/2018
247 Packer Analysis Report – Debugging and unpacking the NsPack 3.4 and 3.7 packer.” Sans Technology Inst, USA 2009 24/08/2010
248 Panopticrypt 07/04/2019
249 Patent wars… 13/04/2019
250 Payment intermediaries 11/11/2018
251 PAYMENTS PROVIDERS AND INTERMEDIARIES AS DEFINED IN THE LAW OF THE INTERNET. 30/10/2007
252 PAYMENTS PROVIDERS AND INTERMEDIARIES AS DEFINED IN THE LAW OF THE INTERNET. 30/10/2007
253 Peer-to-peer digital electronic cash 22/03/2019
254 Personal Security Device 09/10/2018
255 Phases of the Bitcoin system 20/10/2018
256 PII in the Bitcoin World 01/08/2019
257 Poisson Processes 30/03/2018
258 Present liability schemes and sanctions 16/11/2018
259 Prevention is the key 12/11/2018
260 Privacy versus hypocrisy 21/03/2019
261 Private blockchains are a matter of economic forces 18/12/2018
262 Problems and key questions around Bitcoin 13/10/2018
263 Problems and key questions around Bitcoin 13/11/2018
264 Profiting from privacy 10/03/2019
265 Proof 13/03/2019
266 Proof of (unregistered) security 04/03/2019
267 Proof of Assignment 13/11/2019
268 Proof of State, or, the new Fed 14/11/2018
269 Proof of Work 16/02/2019
270 Proof of Work as it Relates to the Theory of the Firm 28/06/2017
271 Property law in the age of Bitcoin 31/10/2018
272 Q&A/Written Interview — The answers — Part 1 16/09/2018
273 Q&A/Written Interview — The answers — Part 2 17/09/2018
274 Q&A/Written Interview — Part 5 I shall continue answering in order 20/09/2018
275 Q&A/Written Interview — The answers — Part 3 18/09/2018
276 Q&A/Written Interview — The answers — Part 4 19/09/2018
277 Quota. 07/08/2019
278 Radio Interview back when CSW worked for Hotwire PE. 10/07/2014
279 Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls” CISIS Spain 2011
280 Rent-seeking in economics and crypto 07/11/2018
281 Repudiation 07/09/2018
282 Repudiation 07/11/2018
283 Requirements for Record Keeping and Document Destruction in a Digital World 30/06/2017
284 Requirements for Record Keeping and Document Destruction in a Digital World” 21/01/2008
285 Returning Bitcoin to its role 08/01/2019
286 Reverse Enginnering Java 28/09/2009
287 Reversing Illicit Transactions on Bitcoin Is Simple. 24/07/2019
288 Rights and Tracing. 06/09/2019
289 Rights as property 19/10/2018
290 Satoshi and Science. 30/05/2019
291 Satoshi and the Sophists 23/05/2019
292 Satoshi Nakamoto 05/04/2019
293 Satoshi; or, The Solution to Nakamoto’s Dilemma. 27/09/2019
294 Satoshi’s Vision: The Art of Bitcoin 12/09/2019
295 Saving research 02/04/2019
296 SCADA: Air Gaps Do Not Exist 26/09/2011
297 Scaling Bitcoin and what some will do to stop this 13/11/2017
298 Scanning for Malware Offline is Essential – July 2011 01/06/2011
299 Scenario 1: Public Registry of an Asset 06/10/2018
300 Scenario 2: Creation and Registry of an Asset 06/10/2018
301 Scenario 3: Lease Contract 06/10/2018
302 Scenario 4: Rolling Contract 06/10/2018
303 Scenario 5: Contract Conditionality 06/10/2018
304 Schnorr 03/03/2019
305 Searching for Exploits, SCAPY Fuzzing 17/04/2018
306 Secure wallet systems 10/02/2019
307 Security 08/10/2018
308 Security in a world of IPv6 and Bitcoin 03/10/2018
309 Segregated Witness or Separated Legality 27/05/2017
310 Set in Stone 15/11/2018
311 Shades of Black… 24/05/2019
312 Simplicity in Bitcoin 25/09/2018
313 Simplified Payment Verification. 09/10/2019
314 Sisyphus Impenitent 30/06/2017
315 Smart-card-based mobile wallets 13/01/2019
316 Social Choice, Bitcoin, and Arrow’s Theorem 28/04/2016
317 Software, Vendors and Reputation: an analysis of the dilemma in creating secure software” Intrust 2010 China 01/12/2010
318 Spam Away… 25/07/2019
319 Spending the simple way in Bitcoin cash. 29/10/2017
320 Spin-Stand Microscopy of Hard Disk Data (Dave Kleiman) 28/01/2009
321 Splitting a registry 30/12/2018
322 SQL, Databases and Forensics 11/03/2009
323 Stable by design 10/09/2018
324 Starting to Write Your Own Linux Shellcode 17/04/2018
325 Starting to Write Your Own Shellcode 24/08/2011
326 Starting to write your own shellcode. Hakin9 24/08/2011
327 Statist 27/02/2019
328 Statistical Methods to Determine the Authenticity of Data” CACS2008, Au 07/07/2008
329 Storing IP on the Blockchain 27/01/2019
330 Subsidised Growth. 29/07/2019
331 Subsidised ledgers 23/11/2018
332 Sun-setting P2SH 08/11/2018
333 Sustainable blockchain-enabled services: Smart contracts 14/12/2017
334 Sustaining hash 13/11/2018
335 Symmetric Fair Exchange Protocol 15/10/2018
336 Taking care of business 18/11/2018
337 Taking Control, Functions to DLL Injection 17/04/2018
338 Taking control, Functions to DLL injection. Hakin9 31/03/2007
339 Taking money over the web using Bitcoin – the way it was designed 20/01/2019
340 Tax and Bitcoin – income-tax implications of Bitcoin as money 31/10/2018
341 Tax and Bitcoin – investment in Bitcoin 01/11/2018
342 Tax and Bitcoin – transacting and accounting for Bitcoin 02/11/2018
343 Taxing Bitcoin – GST implications of Bitcoin as money 30/10/2018
344 Taxing Bitcoin – Introduction. 28/10/2018
345 Taxing Bitcoin – ordinary and tax concepts of “money” 29/10/2018
346 Taxing crypto. 17/06/2019
347 Taxing Times. 15/10/2019
348 Territorial behavior and the economics of Botnets 05/12/2012
349 Testing Homogeneity of Variance 22/04/2017
350 The “Perfect” Firewall… 20/04/2019
351 The 1937 Crash 13/09/2018
352 The application, scope and limits of Letters of Indemnity 19/04/2008
353 The application, scope and limits of Letters of Indemnity in Bitcoin Contracts 30/09/2018
354 The art of Bitcoin CSW 27/09/2019
355 The Asian Currency Crisis 04/07/2017
356 The ASIC myth 16/01/2019
357 The Bitcoin Future 26/10/2018
358 The cancer in Bitcoin 04/05/2018
359 The cancer that is the Selfish mining fallacy 31/03/2018
360 The collectivist insanity 12/10/2018
361 The crypto-ring of Gyges 02/09/2018
362 The cult of Decentralisation 16/08/2018
363 The distributed processing system 03/05/2017
364 The Economics of Developing Security Embedded Software 11/11/2010
365 The Economics of Developing Security Embedded Software” SecAU Australia 30/11/2010
366 The error in Coase 02/10/2018
367 The fallacy of Gresham’s law as it relates to Bitcoin 02/05/2017
368 The Fallacy of Selfish Mining in Bitcoin: A Mathematical Critique 25/07/2017
369 The Fallacy of the Selfish Miner in Bitcoin: An Economic Critique 27/07/2017
370 The Fallacy of the Selfish Miner in Bitcoin: An Economic Critique 29/04/2018
371 The false lure of anonymity 12/02/2019
372 The Fury 10/12/2018
373 The Game of Chicken 15/10/2018
374 The Gamma Monstrosity & the Probability Deception 08/09/2018
375 The Genesis of Genesis 12/04/2019
376 The Genetic Fallacy 18/06/2019
377 The Gini Inequality Flaw 12/08/2019
378 The great mining swindle 18/02/2019
379 The GST Story 29/05/2019
380 The hardware wallet in a phone 15/11/2018
381 The Illusion of Scale in Segregated Witness 28/06/2017
382 The Imbalance of Payments 05/08/2019
383 The immovable 23/04/2019
384 The Impact of Internet Intermediary Liability 17/04/2008
385 The Impact of Internet Intermediary Liability 22/04/2017
386 The infinite-money fallacy 04/10/2018
387 The Irrationality Defense of Paternalism 28/06/2017
388 “The IT Regulatory and Standards Compliance Handbook:
How to Survive Information Systems Audit and Assessments” 21/06/2008
389 The labour fallacy of Bitcoin value 05/10/2018
390 The labour fallacy of mining 07/03/2019
391 The legacy of Keynesian money 02/11/2018
392 The lie of anarchy and the true value in Bitcoin 13/12/2018
393 The Markov mysteries… 09/04/2018
394 The measure of justice 10/11/2018
395 The Myth of Anti-Competitive Pricing 03/08/2017
396 The Myth of Anti-Competitive Pricing. 30/08/2019
397 The myth of forks 06/03/2019
398 The myth of the full validation node 21/12/2018
399 The myths of Bitcoin 14/08/2018
400 The Official CHFI Study Guide” (Exam 312-49) (Paperback) 07/11/2007
401 The paradox of the Übermensch 05/09/2018
402 The politics of rent-seeking 07/11/2018
403 The postal acceptance rule in Bitcoin 27/09/2018
404 The problem of Keynes 01/11/2018
405 The Problem With Document Destruction” ITAudit, Vol 10. 10 Aug 2007, The IIA, USA 01/08/2007
406 The puzzle of the double hash 30/04/2019
407 THE QUANTIFICATION OF INFORMATION SYSTEMS RISK 08/02/2017
408 The Reason for Law 08/04/2019
409 The Resentment of the Experts 18/05/2017
410 The Right to Privacy 07/06/2019
411 The scams in Crypto 30/10/2018
412 The Secure (Bitcoin) Internet 03/11/2018
413 The SegWit 15% Attack 24/05/2017
414 The start of Metanet 14/02/2019
415 The story of Bitcoin, continued 09/02/2019
416 The tax implications of bitcoin as money 14/10/2018
417 The trouble with Too much of anything 17/11/2017
418 The wheel of time is not on an axis 27/04/2019
419 Today’s manifesto… 02/05/2013
420 Today’s manifesto… 01/04/2017
421 Today’s thought experiment 10/06/2018
422 Transparency and Government. 15/11/2019
423 Trolls and bullies 11/04/2019
424 True sale and insolvency challenges in ICO token sales 31/10/2018
425 Trust and Risk 11/09/2018
426 Trust in Smart Contracts 07/10/2018
427 Tulips and Other Myths 26/04/2016
428 Tulips and Other Myths 25/05/2017
429 Turing Complete Bitcoin Script White Paper 28/04/2018
430 Two steps forward, one step back 06/04/2019
431 UCP 500 – successful or not. 21/04/2008
432 Understanding *NIX File Linking (ln) 09/04/2010
433 Understanding Conditionals in Shellcode 17/04/2018
434 Unix Logging 10/03/2010
435 Unix Network and System profiling 12/03/2010
436 Unix System Accounting and Process Accounting 24/03/2010
437 Using checklists to make better best 26/01/2011
438 Using checklists to make better best 07/12/2011
439 Valuing systems – the margin of substitute goods 25/11/2018
440 Vampire Securities from beyond the Wormhole 06/09/2018
441 We don’t want to lead with “anonymous” 17/04/2019
442 Welcome to science 30/03/2019
443 What happens after Moore’s law…. 28/04/2016
444 What is Bitcoin 11/10/2018
445 What is Bitcoin…. 12/10/2018
446 Where Have all the Unskilled Jobs Gone? 23/09/2018
447 Why CLTV was a bad idea 08/01/2019
448 Why code must not be law 18/05/2019
449 Why didn’t Google catch the Norway killer? 26/07/2011
450 Why I troll 26/11/2018
451 Why is Bitcoin Open Source? 26/09/2018
452 Why Law Matters 02/08/2019
453 Why Lightning will never be currency, and why BSV matters 15/03/2019
454 Why Scaling on-Chain Works 08/09/2018
455 Why Selfish miners do not exist and never will 10/04/2018
456 Why Silk Road was an abyss 10/12/2018
457 Why the protocol is set 28/03/2019
458 Wiki 16/04/2019
459 Windows NT Security: Step-by-Step (Version 3.03) 01/02/2001
460 Work Is Infinite…. 25/11/2019
461 World’s biggest-ever cyber attacks uncovered – and it’s only the beginning 04/08/2011
462 Worm-a-nomics 07/09/2018
463 Zeno’s Paradoxes and Bitcoin. 26/07/2019

 

SATOSHI´S CLOSE CONTACTS:

CRAIG IS SATOSHI:

WHO IS…?:

CRAIG´S ARTICLES:

LINKS:

What do you think?

Written by Ramon Quesada

Passionate about Blockchain & Bitcoin technology since 2013, Co- Founder of https://avalbit.org, Team Manager in the CoinTelegraph Spain franchise (2016-2017 years) Co. Organizer of the Blockchain Boot camp Valencia 2018, Co. Organizer of the mini Hackathon BitcoinSV Barcelona, in August 2019, current coordinator of the BSV Valencia Meetup. https://telegra.ph/Ramon-Quesada---Links-01-10

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Loading…

0

BSV Telegram Links

Gocke #IotBlockchain

Gocke #IotBlockchain Camp Entrevista avalBit