Finding Satoshi
Why It Matters
Identifying Satoshi could expose Bitcoin to legal and ideological attacks, threatening its decentralised trust model and market stability.
Key Takeaways
- •New York Times links Adam Back to Satoshi Nakamoto.
- •Hoskinson cites technical fingerprints linking Back to Bitcoin code.
- •Styometric and code analysis can narrow Satoshi candidate pool.
- •Unspent Satoshi coins likely unspendable due to destroyed keys.
- •Revealing Satoshi’s identity could jeopardize Bitcoin’s credibility among investors.
Summary
Charles Hoskinson recorded a short video on April 8, 2026 responding to a New York Times story that named Adam Back as the most likely person behind the pseudonym Satoshi Nakamoto. He frames the question as a historical mystery, comparing it to the unknown years of Jesus, and explains why the identity of Bitcoin’s creator continues to attract speculation.
Hoskinson walks through the technical and non‑technical criteria that would fit a Satoshi candidate. He argues that the age and education required to design Bitcoin’s proof‑of‑work system point to someone educated in the late‑1980s to early‑1990s. He highlights Back’s work on the hash‑cache proof‑of‑work at Microsoft Research, his familiarity with the non‑standard SECP256K1 curve, and the fact that the original client was compiled with a Windows C++ compiler—traits that align with Back’s background.
The former Cardano founder also cites stylistic fingerprints: double‑spacing, specific wording, and code‑stometry that match Back’s known code. He notes that modern styometric tools can compare the 2008‑09 Bitcoin source to a corpus of a candidate’s earlier projects, often outperforming traditional handwriting analysis. Hoskinson adds that the original Satoshi keys appear destroyed, rendering the roughly 1 million unspent coins effectively unspendable and raising a future quantum‑computing risk.
If Satoshi’s identity were ever confirmed, Hoskinson warns that Bitcoin could face targeted political, regulatory, and personal attacks, undermining the protocol’s decentralised ethos. The discussion underscores both the power of forensic code analysis for attribution and the strategic value of anonymity in preserving the credibility and resilience of the world’s leading cryptocurrency.
Comments
Want to join the conversation?
Loading comments...