By James Quaid
For years I’ve sent the following questions to Crypto Blogs, Wallets, Ambassadors, SME (Subject Matter Experts).
- Do you know of any Government specified back doors??
- Are the allegations about SHA-2, SHA-***, true? That NSA installed a back door?
- What other security problems might BitCoin have?
- Are there any Android back doors?
- Plus, have there been any serious postmortems, recoveries and or prosecutions of Bit Coin heists?
Many of my questions have been answered by WikiLeaks Vault Seven revelations. But, please note, I’ve never received any feedback. Again, I invite anyone in the Crypto Community to send comments and or opposing POV’s.
Of late there are a wide range of Crypto currencies roaming the digital planes of Cyberspace. All Cryptos can are defined by two attributes.
The link below goes into great detail. Where the “Technology” defines the structure, features and functions of each Crypto currency and the “Governance” defines the internal policies, covenants, regulations, etc. Some coins have better technical and governance attributes than others. These features and functions define Crypto Currencies.
Each virtual coin carries a ledger of every transaction related to that specific coin or fractional amount of coin. Therefore, upon a theft the governance of that particular currency would provide remedies on how to deal with the theft. They in theory would also address beefing up the technology to deal with any newly discovered technical vulnerabilities.
See the last bulleted item in my introduction. Yes, there have been successful Crypto Currency theft prosecutions, the famous Silk Road bust. But, note how it took FBI involvement. Also note, there is no mention of the stolen BitCoin being returned to their righful owners. But, the theory of how it’s supposed to function is covered well.
- Why Criminals Can’t Hide Behind BitCoin
Science Mag| 19 March 2016
According to the first link below 99% of Bitcoins stolen have never been recovered. It also describes how most Crypto thieves operate. They steal (x) amount, then sell (x) amount at discounted prices and then take the money and run. Leaving the victim and new owner of the stolen Coin to sort out who owns what. This is the preferred method of operation (MO). Here the limits of the governance and technology are obvious.
- Recovering Stolen Bitcoin: a Digital Wild Goose Chase
The Guardian | 09 December 2013
- Bitcoin Theft Highlights Cryptocurrency Regulatory Uncertainty
Allen Overy | June 2017
Next Up: Crypto Currency Best Practices
Last Post: Crypto Commentary: First Installment