У нас вы можете посмотреть бесплатно The three Keys of Satoshi или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
The theory that proposes the *Whitepaper**, the **Source Code v0.1.0**, and the **Genesis Block* as the "secret keys" to identifying Satoshi Nakamoto is based on the forensic concept of **"Identity Fixation"**. This approach argues that the possession of private cryptographic keys is insufficient proof of authorship, as these can be stolen, shared, or inherited. Instead, Satoshi's true identity is indelibly "fixed" in the technical craftsmanship, design decisions, and steganographic marks left in Bitcoin's three foundational pillars, each mathematically verified by its SHA-256 hash. Here is the summary of these three keys and their corresponding hashes: 1. First Key: The Whitepaper This key does not refer simply to the public text, but to the possession of the original source files (in LaTeX format) necessary to compile the exact document published on October 31, 2008. *The Identifier Hash:* The original PDF file must match the SHA-256 hash: `b167f0c0ca34bc055536ad07e158652697805175e7a9e917d8481d33451e064a`. *The Proof:* Anyone claiming to be Satoshi must be able to produce the original `.tex` files that, when compiled with the software of that era, generate a PDF with this exact hash. *Author Marks:* It is postulated that the document contains steganography, such as the use of double spaces, specific British spelling, and possible imperceptible digital watermarks in the diagrams, which only the original author could explain and replicate. 2. Second Key: The Source Code (Version 0.1.0) Released on January 9, 2009, this C++ code contains the creator's foundational logic and security decisions. *The Identifier Hash:* The integrity of the original file (bitcoin-0.1.0.rar) is verified with the hash: `8b17eb9a5707f2519defda4cdf8d14fa1b8dee630e11e6ef85ff9f5547555b56` (or its .tgz version with a hash starting with `ce9da...`). *The Proof:* Identity is fixed in the deep knowledge of latent or hidden functions in the code, such as incomplete primitive smart contracts, "Tripwire" type security tools, and specific dependencies (OpenSSL, CryptoPP). Only the author would know why certain functions were included that were not active at launch. 3. Third Key: The Genesis Block This is the first block of the chain (Block 0), mined on January 3, 2009, and contains immutable historical and political proofs. *The Identifier Hash:* `000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b60a8ce26f`. *The Proof:* *Hidden Message:* The coinbase parameter contains the headline: *"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks"*. This acts as a proof of time and a political statement on the banking system, further suggesting that Satoshi resided in the UK or had access to that specific newspaper on that day. *The Untouchable Treasure:* The 50 BTC reward of this block is technically unspendable due to a quirk in the code, which is interpreted as a deliberate mark that the creator did not seek personal profit with the foundational block. *The 6-Day Mystery:* There is an inexplicable six-day interval between the Genesis Block and Block 1. Only the true Satoshi knows if this was due to technical testing ("prenet") or if they were mining block 0 repeatedly to achieve a specific hash. Conclusion: The Ready Player One Analogy This verification structure is compared to the hunt for the three keys (Copper, Jade, and Crystal) in the novel *Ready Player One*. Just like the fictional creator James Halliday, Satoshi designed a system where his identity is not discovered by brute force or wealth (possessing stolen private keys), but by demonstrating an intimate knowledge of the creation process. Any impostor will fail when attempting to forge these documents, as forensic analysis will reveal anachronisms in the metadata or hashes that do not match the immutable originals.