• 0 Posts
  • 48 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle

  • dhork@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    64
    arrow-down
    1
    ·
    5 days ago

    Using your credentials is not hacking, but once he was canned he no longer had authorization to access those systems. Legally, there is probably no distinction between gaining access by actual hacking vs. using credentials that are no longer authorized.

    So yes, their IT processes are deficient, but that doesn’t let the guy off the hook or mitigate his punishment.








  • Not really, all it requires is someone to produce a signed message with one of Satoshi’s private keys, which can be easily verified with the public addresses on the blockchain. Whoever produced that message can be proven to possess that private key. Nothing short of that would be believable by the crypto nerds.

    If we presume that Satoshi understood that Bitcoin may be valuable one day and kept the keys private, that would mean that the signer really is Satoshi, or one of his associates or heirs Satoshi trusted wih access. Even if that person wasn’t actually Satoshi, their word on who it is would be considered authoritative.

    Unless it’s Craig. Fuck that guy. Nobody believes him.






  • NYT says this switch to pagers has been recent, after the Oct 7 attacks last year, when Hezbollah suspected that Israel was spying on the cell network, and using it to locate targets for strikes. So all these pagers got distributed to Hezbollah-affiliated people in short order . This system doesn’t use commercial networks, and has been called a “closed” network by the NYT.

    If all that is true, then that means anyone with one of these closed-network pagers got it from being involved with Hezbollah in the first place.