❌

Reading view

There are new articles available, click to refresh the page.

El Salvador’s AuthenticDoc Goes Live: Bitcoin-Powered Signatures Eye $60B DocuSign

By: Juan Galt

Bitcoin Magazine

El Salvador’s AuthenticDoc Goes Live: Bitcoin-Powered Signatures Eye $60B DocuSign

AuthenticDoc, a decentralized digital signature platform developed in El Salvador, launched on November 13, 2025, at the Adopting Bitcoin conference in San Salvador. The tool uses the Nostr protocol for its open-source, decentralized architecture, incorporating Bitcoin-compatible cryptography to enable tamper-proof document verification and user-controlled private keys.

Co-founder Fabian, of the Salvadoran firm illuminodes, announced the release during the conference. β€œThe digital signature landscape is ripe for innovation, and AuthenticDoc is leading the charge,” Fabian said. β€œWe’ve harnessed the power of decentralized open protocol technology to deliver unparalleled security and control, effectively eliminating single points of failure that plague traditional solutions. Our platform provides a robust, tamper-proof cryptographic verification and authentication solution that businesses can trust, all while making it accessible and affordable.”

Built by Bitcoiners, the start-up addresses vulnerabilities in centralized platforms like DocuSign, which holds about 70% of the $10 billion digital signature market. According to their press release, the sector is projected to grow to $60 billion by 2030 at a 40% compound annual growth rate, fueled by regulations such as the EU’s eIDAS and the U.S. ESIGN Act, alongside remote work trends and AI-driven authenticity challenges.

The platform’s core features include trustless identity verification, private key management for users, and ISO-standard compliance for enterprise use. It eliminates reliance on centralized storage by using Nostr’s event-based system, where documents and signatures are cryptographically signed and distributed across a network of relays, ensuring robust data storage and distribution.

Diego, head of technology at illuminodes, emphasized the shift from legacy systems. β€œOur decentralized architecture empowers users with private key control and trustless identity verification, moving beyond the vulnerabilities of centralized systems,” Adding that, β€œthis is not just an incremental improvement; it’s a paradigm shift in how digital signatures are secured and managed.”

AuthenticDoc is free for basic use, with paid tiers based on volume for enterprises, undercutting competitors’ license-based models. The platform supports global expansion from its El Salvador headquarters, leveraging local talent and regulatory support to target markets in Latin America, North America, and Europe.

This post El Salvador’s AuthenticDoc Goes Live: Bitcoin-Powered Signatures Eye $60B DocuSign first appeared on Bitcoin Magazine and is written by Juan Galt.

How intelligence agencies recruit Tor administrators

In an anonymous statement, a Tor administrator explains how the Dutch intelligence agency AIVD attempted to recruit him. His story gives a detailed insight into the expanding power of the security state, whose influence now reaches into the business world, prestigious universities, and (international) hacker communities.

Marco*, the provider of the statement, is a 30-year-old Dutchman with a Master of Science degree from the Delft University of Technology. He is an expert concerning the Tor network who – for research purposes – runs some Tor exit nodes. Marco states:

β€œSuddenly, I was approached by a man and woman at a gym I frequented at that time. They identified themselves with a badge from the Ministry of Interior and explained they were working for the AIVD. I felt somewhat overwhelmed, and I was afraid I had got myself into trouble.”

That is a common tactic used by intelligence agencies. They do not announce their visit in advance so that they can overwhelm their targets. It also gives them an edge before the recruitment process has started.

β€œFirst, they asked all sorts of questions related to my education. They had read my thesis regarding IT security and complimented me extensively.”

β€˜Ego boosting’ is yet another tactic to make the target feel important and comfortable. It also makes you somewhat forget that you are talking to an intelligence officer.

β€œAt one point, they offered me all types of jobs at the AIVD. I could work from their office, but I could also do fieldwork as an informant or infiltrator. They explained they were creating a special team called the Joint Sigint Cyber Unit (JSCU).”

File:Zoetermeer De Leyens AIVD kantoor (2).JPG - Wikimedia Commons
The AIVD headquarters in Zoetermeer, the Netherlands

The JSCU is a special department that encompasses employees from the AIVD, as well as the military intelligence agency MIVD. In the past few years, the department has grown significantly to 700 employees, including fifty hackers. Their task is to intercept radio and satellite communications and to engage in cyberwarfare. The JSCU is known to share intelligence with foreign agencies, such as the CIA and the NSA.

β€œTheir approach clarified to me that the intelligence agencies are monitoring IT students in the final stages of their education. They are also looking for individuals who are slightly older – but still connected with younger generations – for management positions.”

At that point, the intelligence officers become more open about the intended targets of the unit:

β€œSubsequently, they asked me if I was interested in traveling for several years. I could also work for a German technological company. The idea was to travel to Germany and visit Hackspaces of the Chaos Computer Club. I had to report on these events, and the agency would cover all costs.”

The Chaos Computer Club (CCC) was founded in West-Germany in 1981. It is the largest European hacker organization, with approximately 7700 members. The CCC is an independent association that, among other things, shows a strong commitment to (online) privacy, cryptography, and anonymity. Given the expertise and activities of some members, the CCC acts as a magnet for intelligence agencies.

β€œThey kept offering me proposals. They promised me β€˜unparalleled opportunities’ if I decided to work for the AIVD. They told me I could attend hacker parties in Spain, Italy, and Austria, and consider those events as paid holidays.”

Then, more targets were mentioned:

β€œThe male intelligence officer explained the AIVD was interested in the developers of Tor and Tails. What he meant was that they need informants and infiltrators, but he said this in a lengthy way. According to the officer, this was part of an international operation.”

Aside from paid expenses and travel costs, Marco was offered a substantial starting salary.

β€œI could determine my salary, as long as it was no more than 5000 euros per month.”

Despite these generous offers, Marco was able to see through the grooming efforts. He refused, but initially, the officers kept attempting to convince him. When Marco persisted, the tone of the conversation changed. Now, the time for compliments was over.

β€œWe know you are building Tor exit nodes. If you do that while working for us, you can make a living out of it. If you do not work for the intelligence agency and something illegal occurs, we cannot prevent the police from raiding your house and confiscating your equipment. Finally, the officers explained to Marco that talking about the meeting was a criminal offense. After giving me their number, they left.”

Marco’s story demonstrates the priorities and dedication of intelligence agencies. And already they have achieved success. In 2017, the Dutch authorities announced they had taken over, dismantled, and deleted Hansa Market, at that point, one of the largest markets on the dark web.

If intelligence agencies succeed in infiltrating service providers such as Tor and Tails, this will be a severe blow to online privacy and anonymity.

*Marco is a fictitious name.

The post How intelligence agencies recruit Tor administrators appeared first on Rana News.

❌