Proof
Below are the Bitcoin addresses that the author of bithome controls. Each address has on-chain history dating to late 2013 or early 2014. Beneath each address is a message signed by that address's private key. Anyone with a Bitcoin wallet that supports message verification can confirm the signatures independently.
Together, these signatures establish that the writer of bithome held bitcoin during the early years and still controls the same keys. The signatures cannot be forged without the underlying private keys.
Primary (A)
- Address
1ArC1g7tojhpMHiNKG71f17Dfk1u7gxFVD- First on-chain transaction
- 2013-12-27
- Last on-chain transaction
- 2014-08-16
- Total transactions
- 7
- Signed message
bithome verify- Signature (base64)
G0dCuhrDkbpmFJD/28SmHYCOOiGM2dqM6zuuFZH/B3/7JwQi8I81qkFNmf+DCqIyYxam6wgDwbqQY+6zrr9bmR8=
Backup B
- Address
18zs78HF3Z5pqtWHy7qTSqGMtRmes4FkwN- First on-chain transaction
- 2014-01-17
- Last on-chain transaction
- 2014-10-03
- Total transactions
- 9
- Signed message
bithome.com signing test 2026-05-02- Signature (base64)
GwCuXhPhK4D071satSjjB+YJdnC8i7YOcRB0bUjpHxiURlWm2XQXmeqr6SaC5b1kx/EmJyH6wwp7A6YAwSCbqIU=
Backup C
- Address
1PUeY7E6yyFCk9m9ApQBBmHf1FNf9NdiPM- First on-chain transaction
- 2013-12-28
- Last on-chain transaction
- 2014-10-01
- Total transactions
- 122
- Signed message
bithome- Signature (base64)
Gzx2LCOSWfP0xLpaZwhWhyg/RgurVkBMB+cCfmv8UWkUKEpMFfGQLlx+HMqPsYATWPL3H+DtWPd1Rh6xZzLtDkU=
How to verify
Any Bitcoin wallet that supports message verification can confirm these signatures. Two common paths:
Electrum (GUI)
- Download Electrum
- Open Electrum and choose Tools → Sign / verify message
- Paste the address, message, and signature into the corresponding fields
- Click Verify. A valid signature will report success
Command line (Node.js)
Using the bitcoinjs-message library:
npm install bitcoinjs-message
node -e "console.log(require('bitcoinjs-message').verify(MESSAGE, ADDRESS, SIGNATURE))" Replace MESSAGE, ADDRESS, and SIGNATURE with the values from any block above. The output is true for a valid signature.
Key rotation
If the primary signing key (A) is ever lost, compromised, or signed under coercion, the author will publish a rotation announcement signed by backup B or C. Until such an announcement appears on this page, all signatures from A are considered authoritative.
If a "burn notice" signed by C ever appears here, all prior signatures from A are repudiated and only signatures from C should be trusted thereafter.
Backups B and C exist precisely so that a single point of failure in A does not collapse the entire chain of authority.
What this signs
Each future flagship article will carry its own signature in the format:
bithome.com | <article-slug> | <publish-date> | <article-content-hash> signed by A. The signatures above are key-control proofs; the article-attached signatures are content proofs. An interactive in-browser verifier is on the roadmap.