Bitcoin, Satoshi Nakamoto
Digest more
One paper finds that attacking the bitcoin blockchain through quantum mining would demand the energy output of a star. Another replicates every major "quantum factoring breakthrough" using a 1981 home computer and a dog.
A New York Times investigation points to the 55-year-old inventor of hashcash as the most likely identity behind Satoshi Nakamoto A forensic investigation by the New York Times has identified British cryptographer Adam Back as the most credible candidate yet for Satoshi Nakamoto,
Google published a paper on March 31 that states that Bitcoin's cryptography could be impacted by quantum computing sooner than previously stated.
Google quantum pioneer says encryption-breaking use cases may arrive sooner than expected, urging crypto industry to prepare now
The New York Times claims renowned cryptographer Adam Back is the mysterious Bitcoin creator, Satoshi Nakamoto. Back joins a long list of cryptographers who might be Satoshi. The world might never
Bitcoin’s creator has hidden behind the pseudonym Satoshi Nakamoto for 17 years. But a trail of clues buried deep in crypto lore led to a 55-year-old computer scientist named Adam Back.
Anxieties over the quantum threat to Bitcoin have been growing, but Bernstein backs Back in saying there’s no cause for alarm.
The British computer scientist and entrepreneur has denied being the man who the New York Times identified at Satoshi Nakamoto.
After research from Google suggested a potential threat to some cryptocurrencies, tokens like QRL and Cellframe (CEL) saw their values rise. Bitcoin has been the king of cryptocurrencies since its inception.
Both Mr. Back and Satoshi were involved with the Cypherpunks, a group of anarchists formed in the early 1990s who wanted to use cryptography — the art of securing communications through code — to free individuals from government surveillance and censorship.
The study, titled “ Kardashev Scale Quantum Computing for Bitcoin Mining ,” reveals that while quantum computers are often viewed as a threat to the network, using them to accelerate traditional mining is currently an impossible task.