https://www.rd.ntt/e/organization/researcher/fellow/f_001.ht...
Is the insinuation that Tatsuaki Okamoto is Satoshi Nakamoto? Or that Okamoto worked for the NSA?
It seems plausible that Okamoto adopted a pseudonym which shares DNA with his real name if he's a private individual, but I rather think that if he worked for the NSA, he would go to greater lengths to conceal his identity.
In my opinion, there was a real (but vague) clue to his identity that was not a red herring: the IP leak in the debug logs he sent to Hal Finney. He used Tor most of the time but briefly slipped up and likely divulged his real, residential IP address. If that's the case, then he was living in California, possibly around the LA area, as of January 2009.
https://whoissatoshi.wordpress.com/2016/02/20/satoshi-in-cal...
"By all accounts, Len was on track to be one of the most important cryptographers of his time. But on July 3rd, 2011, he tragically took his own life at 31, following a long battle with depression and functional neurological disorders.
His death coincided with the disappearance of the world’s most famous cypherpunk: Satoshi Nakamoto. Only 2 months before Len died, Satoshi sent their final communication:
I’ve moved on to other things and probably won’t be around in the future." [0]
[0] https://evanhatch.medium.com/len-sassaman-and-satoshi-e483c8...
"Cryptography, Zero-Knowledge Proofs and Number Theory" (Kyoritsu-Shuppan, 1995)
"Cryptography" (Sangyo-Tosho, 1997)
"Cryptography and Information Security" (Nikkei-BP, 1998)
"Information Security" (Denki-Tsushin-Kyokai, 2000)
Japanese translation of "Modern Cryptography, Probabilistic Proofs and Psudorandomness (O.Goldreich)" (Springer-Verlag, Tokyo, 2001)
Theory of Public-Key Cryptography (Kyoritsu-Shuppan, 2011)
Quantum Computation (Kindai-Kagaku-Sha, 2015)
Advent and Advance of Modern Cryptography (Kindai-Kagaku-Sha, 2019)
Well then, that's actually quite a replete amount of work. I'm impressed! He's been working for NTT for more than 40 years, here's an interview with him:https://www.youtube.com/watch?v=D863zphRoqE
I dunno this all feels like someone mixing up names in a language they don't understand. Satoshi OKAmoto and Satoshi NAKAmoto are way different names. Japanese just happens to have a lot of homophones and there's even multiple different possible meanings for the family names Okamoto and Nakamoto - I've linked the one this specific person has based on his wikipedia page in Japanese [1] [2] [3]. It's also the name of a brand of my favorite condoms that feel like they came from the future, are like one micron thick, and are lubricated with hyaluronic acid if you're wondering how crazy the homophony goes with this one. [4] Reminds me of that time newsweek completely fucked with that random dude in California with the same name as the bitcoin nym for a while.
[1] https://tangorin.com/kanji?search=%E5%B2%A1%E6%9C%AC%E8%81%A...
[2] https://tangorin.com/words?search=nakamoto
[3] https://ja.wikipedia.org/wiki/%E5%B2%A1%E6%9C%AC%E8%81%A1
The NSA couldn't even keep their data sniffing secret, the odds that they could keep the billion-dollar Bitcoin secret are not good (according to the theory above). There are more viable theories about Satoshi's identity and why/how he disappeared completely imho (eg Hal Finney). The paper and the name prove next to nothing, it's maybe a hint that one of the the creators might have had a US security clearance at some point.
[0] https://whoissatoshi.wordpress.com/2016/02/20/satoshi-in-cal...
https://www.newsweek.com/2014/03/14/face-behind-bitcoin-2479...
TL;DR: Satoshi Dorian Nakamoto, japonese imigrant in the US, is software engineer, worked both in financial and defense sector...
For the record, TOR network is the work of 2 defense sector contractors.
EDIT: TOR and Bitcoin are 2 technologies which work both in tandem and share some requirement as well as limitations. As for requirement, they both are designed to provide at least of pretense of privacy. And that what they both advertised for. And as for limitations, Bitcoin implentation doesn't make sense for wide adoption because it is extremely costly to operate and is so slow it cannot be adopted for day to day financial operations ; and TOR is also slow as hell and unreliable...
For spy and LE stuffs, creation of an anonymous(?) internet network and pseudo-anonymous payment network make sense. If you are of control of end points (like payment processors or online wallets or [ISP companies?]), they give both a sense of (false) security for bad actors, whoever they are for whatever they do, and allow allied organisations or individuals to funnel information and money to each other provided they have secured the endpoints they use themself.
Also for the record, China has banned both Crypto and TOR as well as Russia (except for 'international operations') at least 1 year ago.
Some might argue that creation of online drugs markets, the crazy rush in crypto space by dubious 'entrepreners' and the rise of private and state hacking actors are the proof that western governments agencies could not be involved in these technologies... But it could be simply they didn't anticipated neither of these devellopments. Let's call that externalities.
[0] https://www.researchgate.net/scientific-contributions/Len-Sa...
[1] https://chainbulletin.com/the-unmasking-satoshi-aftermath