Bitcoin & Crypto & NFT News
Craig Wright's fraud continues. Yesterday, he submitted into evidence an email he says was from Dave Kleiman to Uyen Nguyen asking her to be a director of his 'bitcoin company' in late 2012.
It is provably fake.
Craig didn't realize that the email's PGP signature includes a signing timestamp along with the ID of the key used as metadata. Was the email actually sent in 2012? Let's find out!
The beginning of the signature is as follows: iQEcBAEBAgAGBQJTH+uQAAoJELiFsXrEW+0bCacH/3K
Converted to hex, it's: 89 01 1c 04 01 01 02 00 06 05 02 53 1f eb 90 00 0a 09 10 b8 85 b1 7a c4 5b ed 1b 09 a7 07 ff 72
We know how to find the long ID of the key used and the timestamp of the signature. I've bolded the ID and italicized the timestamp. Looking on the MIT keyserver, we can find the fake* key. The timestamp of the signature is 1394600848, which is March 12, 2014, two weeks before Craig filed to install Uyen as a director of Dave's old company, and almost a year after Dave died!
We can double-check with gpg -vv
. Transcribe the email and paste it in. Here's the output:
:signature packet: algo 1, keyid B885B17AC45BED1B version 4, created 1394600848, md5len 0, sigclass 0x01 digest algo 2, begin of digest 09 a7 hashed subpkt 2 len 4 (sig created 2014-03-12) subpkt 16 len 8 (issuer key ID B885B17AC45BED1B)
(I'll note, as an aside, that Dave apparently spelled his name incorrectly and put a typo in the subject.)
*The fake key has the same pref-hash-algos as Craig's fake keys, and were never updated.