About Craig


A computer scientist, a businessman, and an inventor.




































All BitcoinColonialismCommerceCommunismConstitutionCryptographyCulturesCybercrimeDataDecentralisationDecolonisationDeveloperDigital ForensicsDiplomacyDocument ManagementEconomicsEducationEnforcementFreedomGlobalisationGovernmentHardwareInformation SecurityInternational RelationsLawMythologyPhilosophyPsychologyPsychometric TestingPsychotherapyReflectionScienceSecuritySocial MobilitySocietyStatistics
A Comparative Study of Attacks Against Corporate IIS and Apache Web Servers
Information Security

It has been suggested that an attacker will specifically target the Windows operating system. This research has shown that rather than this being the case an attacker will in fact not target Microsoft Windows, but rather seeks to avoid attacking Linux.

A critical review of De Callatay, 2005. The Graeco-Roman economy in the super long-run: lead, copper, and shipwrecks.
Economics

De Callatay (2005) provided an in-depth analysis of methodologies that can extend the analysis of shipwrecks of the Greco-Roman period. In this analysis, the author has provided the seeds of a system that could be expanded using new technologies into paths to conduct further analysis. The following paper provides an analysis of work by De Callatay, 2005. 

A Distribution Protocol for Dealerless Secret Distribution
BitcoinCryptography

As the value of bitcoin increases, more incidents such as those involving Mt Gox and Bitfinex will occur in standard centralized systems. The addition of group based threshold cryptography with the ability to be deployed without a dealer and which supports the non-interactive signing of messages provides for the division of private keys into shares that can be distributed to individuals and groups to provide additional security. 

A Preamble Into Aligning Systems Engineering and Information Security Risk
Information Security

For many years information security and risk management has been an art rather than a science. This has resulted in the reliance on experts whose methodologies and results can vary widely and which have led to the growth of fear, uncertainty and doubt within the community. At the same time, the failure to be able to effectively expend resources in securing systems has created a misalignment of controls and a waste of scare resources with alternative uses. This paper aims to introduce a number of models and methods that are common in many other areas of systems engineering, but which are only just starting to be used in the determination of information systems risk. This paper introduces the idea of using neural networks of hazard data to reliably model and train risk systems.

A Preamble Into Aligning Systems Engineering and Information Security Risk Measures
Security

For many years information security and risk management has been an art rather than a science. This has resulted in the reliance on experts whose methodologies and results can vary widely and which have led to the growth of fear, uncertainty and doubt within the community. At the same time, the failure to be able to effectively expend resources in securing systems has created a misalignment of controls and a waste of scare resources with alternative uses.

A Proof of Turing Completeness in Bitcoin Script
Bitcoin

The concept of a Turing machine has been well defined. It would be sufficient to show that Bitcoin uses a dual stack architecture that acts as a dual counter machine. Such systems have already been demonstrated as being Turing complete.

A Quantitative Analysis into the Economics of Correcting Software Bugs
Developer

Using a quantitative study of in-house coding practices, we demonstrate the notion that programming needs to move from “Lines of Code per day” as a productivity measure to a measure that takes debugging and documentation into account. This could be something such as “Lines of clean, simple, correct, well-documented code per day”, but with bugs propagating into the 6th iteration of patches, a new paradigm needs to be developed

A Question of Platinum Plus
Information Security

To act rationally requires that we forecast the future with inadequate information using the past as a guide for all its flaws. We make decisions in the absence of knowledge.

A Step-by-Step Introduction to Using the AUTOPSY Forensic Browser
Digital Forensics

This is a brief tutorial on how to use the Autopsy Forensic Browser as a front end for the Sleuthkit. This tool is an essential for Linux forensics investigations and can be used to analyze Windows images.

A Taxonomy of Information Systems Audits, Assessments and Reviews
Information Security

Common misconceptions plague information systems audit as to the nature of security,
audit and assessment types and definitions. The dissertation aims at being a definitive
guide to define the terminology and detail the related methodologies across the range of
information assurance services.

Never miss a story from Craig Wright (Bitcoin SV is the original Bitcoin)