These can be viewed at bitcoinstrings.com/blk00052.txt and are mostly commented on the "Wikileaks cablegate data" section of Hidden surprises in the Bitcoin blockchain by Ken Shirriff (2014).
Soon after block 229991 uploaded the Satoshi uploader, several interesting files were added to the blockchain using the uploader, and notably some containing content that might be illegal in certain countries, as a test to see if this type of content would make the Bitcoin blockchain illegal or not:
So basically, this was the first obviously illegal block attempt.
None of this content is particularly eye-popping for Ciro Santilli's slightly crazy freedom of speech standards, and as of 2021, the Bitcoin blockchain likely hasn't become illegal anywhere yet due to freedom of speech concerns.
Furthermore, it is likely much easier to find much worse illegal content by browsing any uncensored Onion service search engine for 2 minutes.
Ciro Santilli estimates that perhaps the uploader didn't upload child pornography, which is basically the apex of illegality of this era, because they were afraid that their identities would one day be found.
Bibliography:
Other Bitcon analysis:
GlobalFoundries by Ciro Santilli 37 Updated 2025-07-16
AMD just gave up this risky part of the business amidst the fabless boom. Sound like a wise move. They then fell more and more away from the state of the art, and moved into more niche areas.
TSMC by Ciro Santilli 37 Updated 2025-07-16
One of the companies that has fabs, which buys machines from companies such as ASML and puts them together in so called "silicon fabs" to make the chips
As the quintessential fabless fab, there is on thing TSMC can never ever do: sell their own design! It must forever remain a fab-only company, that will never compete with its customers. This is highlighted e.g. at youtu.be/TRZqE6H-dww?t=936 from Video "How Nvidia Won Graphics Cards by Asianometry (2021)".
Video 1.
How Taiwan Created TSMC by Asianometry (2020)
Source. Some points:
  • UCM failed because it focused too much on the internal market, and was shielded from external competition, so it didn't become world leading
  • one of TSMC's great advances was the fabless business model approach.
  • they managed to do large technology transfers from the West to kickstart things off
  • one of their main victories was investing early in CMOS, before it became huge, and winning that market
You need a secondary password that when used leads to an empty inbox with a setting set where message are deleted after 2 days.
This way, if the attacker sends a test email, it will still show up, but being empty is also plausible.
Of course, this means that any new emails received will be visible by the attacker, so you have to find a way to inform senders that the account has been compromised.
So you have to find a way to inform senders that the account has been compromised, e.g. a secret pre-agreed canary that must be checked each time as part of the contact protocol.
Lepton by Ciro Santilli 37 Updated 2025-07-16
Can be contrasted with baryons as mentioned at baryon vs meson vs lepton.
Fog computing by Ciro Santilli 37 Updated 2025-07-16
Our definition of fog computing: a system that uses the computational resources of individuals who volunteer their own devices, in which you give each of the volunteers part of a computational problem that you want to solve.
Folding@home and SETI@home are perfect example of that definition.
Klein-Gordon equation by Ciro Santilli 37 Updated 2025-07-16
A relativistic version of the Schrödinger equation.
Correctly describes spin 0 particles.
The most memorable version of the equation can be written as shown at Section "Klein-Gordon equation in Einstein notation" with Einstein notation and Planck units:
Has some issues which are solved by the Dirac equation:

There are unlisted articles, also show them or only show them.