About Craig

A computer scientist, a businessman, and an inventor.

All BitcoinColonialismCommerceCommunismConstitutionCryptographyCulturesCybercrimeDataDecentralisationDecolonisationDeveloperDigital ForensicsDiplomacyDocument ManagementEconomicsEducationEnforcementFreedomGlobalisationGovernmentHardwareInformation SecurityInternational RelationsLawMythologyPhilosophyPsychologyPsychometric TestingPsychotherapyReflectionScienceSecuritySocial MobilitySocietyStatistics
Contextualising Information About Aesthetics

The process of contextualising the information around an artwork is a necessary component in fully understanding the message being interviewed by the artist. While many native viewers of artworks can display enjoyment in pure sentimentality, the message portrayed in high art is often lost without a detailed understanding of the context as to how the artwork has been created and where it is displayed. 

Criminal Specialization as a Corollary of Rational Choice

Organized criminal groups can be modeled using rational choice theory. Criminal groups act as profit seeking enterprises, and the ability to shift the economic returns away from this activity results in a lower amount of crime. Criminal behavior does not need to rely on social deviance, but is moving towards the greatest financial rewards. As a consequence, as criminal groups face few financial disincentives, a growing class of criminal specialists has resulted. The course of action to best minimize the online criminal threat can be linked to minimization of economic returns from cybercrime.

Current Issues in DNS
DeveloperInformation Security

There are many ways to attack DNS. Attacks range from denials of service (DOS) to man in the middle (MiTM) to spoofing. The recent inclusion of Unicode entries into DNS may mean a site that looks like “microsoft.com” could exist but actually point to something else. Perhaps the o's in Microsoft would be Cyrillic instead of Latin. This paper will look at the issues facing DNS as well as conduct an analysis of the existing DNS infrastructure to assess its state and weaknesses. This process will also compare results that have been taken from previous DNS testing exercises.

Data Recovery: ECC Data and Recovery
Information Security

One of the misconceptions that is held concerning the recovery of data following its being overwritten is that the modern ECC (error-correction codes) used in hard drives will enable the data recovered to be reconstructed.


A system such as bitcoin operates using a Proof of Work based consensus mechanism that many individuals have falsely claimed limits the ability for the system to scale. As a result, alternative proposals based on Proof of Stake are misleadingly being promoted as scaling solutions. However, it will be demonstrated that proof of stake is not a scaling solution but is rather a means of reintroducing ownership and equity control through a back door creation of a digital bearer share. 

Decentralized Autonomous Corporation

This document is intended to provide an overview on Decentralized Autonomous Corporations (DAC) based on the blockchain technology. We provide definitions of (i) DAC, (ii) Secure Multiparty Computation – a secure multiparty protocol for authorizing transactions, (iii) Autonomous Agents – a set of computer program that carry out some set of operations on behalf of users.

Detecting Hydan: Statistical Methods For Classifying The Use Of Hydan Based Stegonagraphy In Executable Files
Digital Forensics

It is known that HYDAN changes the statistical distribution of Sub and Add calls in the assembly code to embed the "hidden data". Before this paper, there were no publicly released tools or methods available to detect HYDAN. The methods previously used to detect HYDAN have been inefficient and involved extensive manual processes that could not be easily automated. This paper presents a method to take the assembly code (using a disassembler) and to feed this into R, a statistical language, in order to detect if the file has been altered steganographically.

DPA Exploitation and GOTs With Python

This article is a follow-up and second part of a look at format strings in the C and C++ programming languages. In particular, how these may be abused. The article progresses to discuss crafting attacks using python in order to attack through DPA (Direct Parameter Access) such that you can enact a 4-byte overwrite in the DTORS and GOT (Global Access Table) and continues with exploiting the GOT and injecting shell code. We demonstrate how these simple but still often overlooked and even taught vulnerabilities can be used to read arbitrary locations from memory, write to memory and execute commands and finally to gain a shell.

Electronic Contracting in an Insecure World
Information Security

The rise of the Internet as a commercial tool has created a level of uncertainty surrounding the law of offer and acceptance.

Electronic Contracting, New Wine in Old Bottles

The rise of the Internet as a commercial tool has created a level of uncertainty surrounding the law of offer and acceptance. This paper discusses the implications associated with online contractual dealings and the issues that have created these uncertainties.

Never miss a story from Craig Wright (Bitcoin SV is the original Bitcoin)