About Craig


A computer scientist, a businessman, and an inventor.



















































All ArtArtificial IntelligenceAuditBitcoinBlockchainColonialismCommerceCommunismConstitutionCryptocurrencyCryptographyCulturesCybercrimeDataDecentralisationDecolonisationDeveloperDigital ForensicsDiplomacyDocument ManagementEconomicsEducationEnforcementFreedomGlobalisationGovernmentHardwareHistoryHowey TestInformation SecurityInternational RelationsLawLibertyLiteratureMythologyPhilosophyPolitical SciencePsychologyPsychometric TestingPsychotherapyReflectionRelativityScienceSecuritySocial MobilitySocietyStatisticsSteganographyTheory of MindTimeTuring Complete
Live Capture Procedures
Digital Forensics

This article takes the reader through the process of carving files from a hard drive. We explore the various partition types and how to determine these (even on formatted disks), learn what the starting sector of each partition is and also work through identifying the length the sector for each partition. In this, we cover the last two bytes of the MBR and why they are important to the forensic analyst. This process is one that will help the budding analyst or tester in gaining an understanding of drive partitions and hence how they can recover and carve these from a damaged or formatted drive.

Live Investigations
Digital Forensics

Ever need to get hold of a set of trusted tools to check processes on a live windows host and just don't have a disk with these on you?

Live Theater and the Limits of Human Freedom
FreedomLibertySociety

This paper argues that there is a relationship between the structure of live theater and the question of whether human beings have free will, and that the practice of live theater and the pursuit of philosophical certitude regarding free will are both constructive human experiences coalesced around roughly the same set of sensations. 

Madison and Federalist 10: Why Extrinsic Information Matters in Defining a System
Constitution

In Federalist Paper Number Ten, Madison provided explanations and definitions that aid in defining the meaning of the Constitution of the United States of America. Many of the terms can be read widely and out of context without these documents. The necessity of defining meaning leads to the requirement to look to meaning through the definitions and explanations of founders and creators outside of the limited notion of an individual document. 

Micropayment Systems for Migrant Workers: An Economic Proposal Bridging the U.S. and Central and South America
BitcoinGlobalisationSociety

This paper proposes implementing a micropayment system to facilitate remittances for migrant workers moving from Central and South America to the United States. Traditional remittance methods often involve high transaction fees that significantly decrease the value of money sent to families in workers’ home countries. The proposed system addresses this inefficiency and fosters a more equitable economic landscape.
Through this paper, we examine the physical and human geographical features of the regions involved and analyze the current political climate that shapes financial regulations and policies impacting remittances.

Modeling a Double-Spending Detection System for the Bitcoin Network
BitcoinBlockchain

The Bitcoin protocol prevents the occurrence of double-spending (DS), i.e. the utilization of the same currency unit more than once. At the same time a DS attack, where more conflicting transactions are generated, might be performed to defraud a user, e.g. a merchant.

Modeling System Audit as a Sequential test with Discovery as a Failure Time Endpoint
AuditEconomicsSecurity

Combining hazard models with SIR (Susceptible-Infected-Removed) epidemic modeling provides a means of calculating the optimal information systems audit strategy. Treating audit as a sequential test allows for the introduction of censoring techniques that enable the estimation of benefits from divergent audit strategies. This process can be used to gauge the economic benefits of these strategies in the selection of an optimal audit process designed to maximize the detection of compromised or malware infected hosts.

NDIFF for Incident Detection
Digital Forensics

Ndiff is a tool that utilizes nmap output to identify the differences, or changes that have occurred in your environment. Ndiff can be downloaded from http://www.vinecorp.com/ndiff/. The application requires that perl is installed in addition to nmap. The fundamental use of ndiff entails combining ndiff with a baseline file. This is achieved by using the "-b" option to select the file that is the baseline with the file to be tested using the "-o" option. The "-fmt" option selects the reporting format.

Neoliberalism and Doublespeak
Freedom

A strawman argument of Milton Friedman’s position on liberalism has been promoted as representing the concept of “greed is good” to attack the concept of a decentralised free-market approach to political regulation and control and the ability for markets to change with the needs of society organically. Instead, neoliberalism represents a system and structure of increasing government centralisation at the expense of small to medium businesses and individuals.

Of Black Swans, Platypii and Bunyips: The outlier and normal incident in risk management
Information Security

To act rationally requires that we forecast the future with inadequate information using the past as a guide for all its flaws. We make decisions in the absence of knowledge. We state that black swans and bunyips do not exist. From time to time, we find that we have decided in error and black swans are found.

Never miss a story from Craig Wright (Bitcoin SV is the original Bitcoin)