Hashrate Robbery: Stratum V2 Fixes This (and More) by ...

Censorship! 2 weeks of mod actions

As promised for a long time now, here's a breakdown mod actions in the past 2 weeks. I've previously done summaries for longer periods, but as it takes a few minutes to resolve each action, i limited the list to 1000 which corresponds to 2 weeks. The time period is roughly between the evenings of 28 April and 12 May.
I'm still busy with the details of the link and post removals. I've been working on this for 2 days now, so it'll take me until the weekend to get through them all. I haven't published the referenced addendum yet.

Bans

There were 8 permabans:
You are a bunch of stinking k####rs. It is going to be great to see all the k####rs die from Covid in the next few months. Viva Covid!!!
There were a few temporary bans. These are usually issued when users ignore multiple requests or warnings about our rules. These are issued in increments of days. It would be useful to issue one for an hour or two, rather than the minimum of 1 day.
Temp bans for abusive language:
Abusive language has been challenged before with accusations of it being anything from "not a school playground" to "1984-era doublethink". It's not acceptable to insult a stranger you're having a conversation with in public, then it's not acceptable to do so here.
Temp bans for misleading content:
And other miscellaneous reasons:
For anyone thinking that we ban whomever our ANC masters tell us to....tell them that I haven't received my kickbacks yet.

Unbans

Beyond the temporary bans coming to an end, there was one permanent ban that was removed, and that was for justluckyme2 who was incorrectly given a permaban, but a temp ban was intended. That was quickly corrected.

Mark submission as spam

This is an action that we use to help train the spam filters. Sometimes we remove spam posts when we should be marking them as spam - which removes the submission as well.
These are sometimes accompanied with bans. We love hearing about everyone's businesses or side hustles, as long as they don't violate reddit's TOS. If you want to but are unsure, send us a modmail. We'll typically direct you to https://www.redditinc.com/advertising

Mark comment as spam

A similar reason, but applies to comments
You might need to use a service like snew to view these.

Approve post

As a part of reddit and our own spam and abuse protection, posts are sometimes caught incorrectly. There are many reasons why a post is incorrectly removed. We aren't told the exact reason for these removals by reddit's spam filters and AutoModerator. While we have our own custom AutoModerator rules (That remove posts to known fake news sites, or flag comments that have some slurs), reddit has their own super-set of AutoMod rules we can't see.
If you can't see your post appearing when looking at the new queue in another browser, then send us a message. We often go through the mod queue which lists removed posts, but might not get to every one.
There were 91 posts approved by moderators. I'll list them in the addendum.

Approve comment

For a similar reason, comments are caught in a filter of sorts. We then approve the comment - if they were incorrectly caught - or confirm removal - if they were correctly caught.
There were 141 comments approved by moderators. I'll list them in the addendum.

Remove post

The very meaning of censorship! No-one likes their content being removed, but we remove posts that don't comply with the sub rules.
There were 346 posts in total removed. 196 of these were removed by AutoModerator for varying reasons. 91 were manually approved by us, a few were confirmed as being spam, but a lot were left as removed. Ideally we should have confirmed removal or approved each of them. Sorry if yours slipped through the cracks. That leaves 150 posts that were removed by moderators.
I'm doing a detailed report on these, so check back later.

Remove comment

You're censoring my views! Comments are generally moderated less than submissions. A post about a vacation in Thailand - for example - might not be relevant, but having a discussion about your Thai vacation in comments is just fine.
There were 302 comments removed. 188 were removed by AutoMod, leaving 113 comments being removed by mods.
I'm doing a detailed report on these, so check back later.

Edit flair

Occasionally someone selects the wrong flair for their post and moderators correct it. There were a few posts whose flair was changed by us:

Distinguish comment or Sticky comment

A moderator can distinguish their comment to appear different to other comments. We normally use them when acting in capacity as a mod, rather than in our own personal capacities (yes, it's possible for these to be distinct). Public removal reasons are distinguished, stickied comments. See addendum for the full list.
There are two ways to provide feedback to why a comment or post was removed. Via a comment, or via modmail. Myself and lengau often do public comments, while other mods send messages. You'll see that some are removed or deleted, because the request (translation, source, etc) was fulfilled.

Lock post or comment

This allows moderators to prevent comments being added to a post or replies made to a comment.
There were no locked posts and a few locked comments. All locked comments were some of the distinguished comments listed in the previous section.

Mute user

This is a feature in modmail - a common messaging system viewable by all mods - that allows communication from a user to be blocked for two days. If we ban a user, there's nothing stopping them from sending us love letters, like the one listed previously. They are often done to stop abusive message being thrown our way for a few days. There were 6 mutes. 3 resulting from permabans, 2 from temporary bans and 1 from a post removal.
Honestly, if we make a mistake with a ban or a removal, don't attack us. Chat with us.

Admin actions

We can see when reddit's admins do moderator actions in our sub. There have been no admin actions in this time period.
In case you're interested, the only action recently listed was performed a month ago, and was the removal of one comment: https://reddit.com/southafrica/comments/fkmczc/walied_josephs_was_in_picknpay_early_this_morning/fktjvcj/

But how can I trust that the data is correct? lovethebacon is clearly a paid ANC agent.

The other mods can verify this information. Use services like snew or removeddit to view removals. And can someone please tell Paul Mashatile that I haven't received my paycheck....ever.
It's worth nothing that different mods have different moderation styles. We don't have a fixed set of guidelines on what should be done in what circumstances, but it's up to each mod to do what they think is best for the sub. If any decision made by the mods should be reversed, let us know, here or in modmail.
submitted by lovethebacon to southafrica [link] [comments]

Coinbase Support Number {۩ +1.855~3.38~3.716 ☏ Coinbase Pro ♋

Coinbase Customer Service ☎️+(1855-338-3716) Number TOLL-FREE USa
Coinbase for the most part alluded to as a cryptographic money, a virtual money, or possibly an electronic money - is a sort of money that is virtual. It's like an online variation of money. You can utilize it to buy administrations and items, however not many stores acknowledge Bitcoin yet, and a few nations have restricted it completely. How does Binance convey the outcomes? Every Binance it's generally a PC record that is kept in a' computerized wallet' application with a cell phone or maybe PC.
People can convey Binance (or perhaps part of one) in your computerized wallet, and furthermore you can send Binances to others.
Each exchange is caught in an open rundown known as the blockchain.
It is then simple to follow the account of Binances to keep individuals from spending coins they don't wear, making duplicates, or possibly fix in exchanges.
In what capacity can individuals get Binances ?
You will discover three essential ways people get Binances.
You can buy Binances utilizing' genuine' money.
You can offer things and let individuals pay out with Binances.
Or on the other hand they could be made utilizing a PC.
Exactly how are new Binances made?
For your Binances telephone framework to work, individuals can make their PC procedure exchanges for everyone.
PC frameworks exist, working out muddled totals. In some cases they're remunerated with a Binances as a result of the proprietor to hold.
A great many people make amazing PCs basically to attempt to get Binances. This' known as mining.
In any case, the totals are beginning to be more and harder to stop such a large number of Binances being created.
In the event that you started mining now, it might be numerous prior years you got one Binances.
You may end up spending more cash on electrical force for your PC or PC than the Binances will be justified, despite all the trouble.
For what reason are Binances valuable?
There are a lot of things other than money, which we consider significant, similar to precious stones and gold. The Aztecs utilized cocoa beans as cash!
Binances are helpful in light of the fact that people are slanted to trade them for real administrations and merchandise, and even cash.
Would it be able to be sound?
Every exchange is recorded openly, so it is difficult to duplicate Binances, make counterfeit ones, or even spend individuals you don't wear.
It's conceivable to lose the Binances wallet of yours or erase the Binances of yours and lose them uncertainly. There additionally have been robberies from locales that permit you to keep your Binances remotely.
Binance is an electronic money that can be utilized and conveyed electronically.
Binance is a decentralized shared system. No single individual or foundation controls it.
Binance s can't be printed, in addition to their sum is particularly insignificant - just twenty-one mln Binance might be delivered.
Why Binance?
Binance empowers you to buy stock namelessly. Furthermore, global installments are modest and simple since Binance s aren't attached to any subject or nation to guideline. Private ventures may like them since you will discover no Visa charges. A few people buy Binances being a venture, trusting that they will move in esteem.
Electronic agitators will have the crowd imagine that Binance will topple fiat money. Progressively reasonable people trust Binance is an oversight safe, unknown electronic money that is without seizure. Each is erroneous.
Binance isn't unknown; it's close to home and contains an open, permanent record. It takes into consideration security as simply the standard location is open, however this specific suggests that activity on the location is examinable to prevent criminal behavior.
Precisely for what reason is Binance a Viable Medium of Exchange?
The hidden blockchain mechanical development is made to support the trustworthiness of exchanges and information. The blockchain everlastingly records affirmed exchanges through a method alluded to as mining. Each arrangement is carefully marked and furthermore confirmed through cryptographic procedures that ensure the cash can't be contributed considerably more than one time.
The budgetary interests of the excavator keep away from twofold spending. Diggers wo exclude twofold spent exchanges for the most part in light of the fact that there is a danger that few different excavators will dismiss the square of theirs; consequently, they shed out on conceivable profit. Twofold spending is a criminal offense, and people won't get away from a changeless evidence trail of the endeavored robbery.
submitted by jipab29499 to u/jipab29499 [link] [comments]

I worked hard for it: version 2.0 of LuckyNano is finally there. Come and check out a fun faucet for a change :)

Howdy ~♪
It's been a vague promise for a year now, life has been quite busy on my end but, yay, we've done it: LuckyNano 2.0 is a thing ! Do pay us a visit by clicking this link, peeps.
As always, I'm sure many of you don't know LN, so let me introduce you: LuckyNano started in January 2018, with the idea of creating a faucet to introduce people to Nano, but in a fun way. I felt really bummed that such an awesome currency as Nano would only be discovered through dull faucets, where all you do to get munie is clicking a button, every now and then. Worse, some only allow you to claim once, or at the cost of viewing ads.
I was a big fan of gamefaucet.com for Bitcoin (RIP), which let you play casino games in exchange of a few satoshi, with a big community component around it. People were enticed to chat and build a strong fanbase, and those who wanted to help the project would invest their own money to unlock perks and features.
This is *exactly* what I'm going for with LuckyNano: a faucet with casino-inspired games where you win NANO, but with a more modern design, and an enhanced multiplayer aspect. And those who are willing to try their luck for a quick buck, or simply want to help keep the project afloat can deposit a couple of NANO to play for higher stakes.
So ! On to what 2.0 has to offer:
Please try it, and share some love if you feel like it. :-)
submitted by Emul0rd to nanocurrency [link] [comments]

Does bitcoin make it easier for massive payout in-home robbery?

Let’s assume that I have a hardware wallet with all my bitcoin. It seems logical that someone eventually finds out that I have it, and comes to try to rob me. Assuming I follow most everyone’s advice on robberies: “just give them the money,” does bitcoin make it more likely to lose large scale savings without much recourse?
Are you guys taking steps to prevent this? Do you split up your bitcoin on multiple hardware wallets? Do you put you hardware wallet in a safe deposit box?
Any other thoughts here on how a robber could use bitcoin’s benefits against the ownehow to prevent?
submitted by djhatrick12 to Bitcoin [link] [comments]

Bitcoin is a refuge fund, not a hedge fund

You have an obligation to protect your property. Since it is protection, it is necessary to be able to face harsh conditions. The so-called obligation refers to relying on yourself and not on anything else, including not relying on the state.
At the 315 party, Chinese traditional holiday, hit the Bitcoin head.
Some people like to compare Bitcoin and gold together, which is actually wrong. "Bitcoin is a safe-haven asset" is a false proposition. Bitcoin has the highest volatility in the world. How can such a high volatility asset be called a safe-haven asset? ——315 party
Yes, cryptocurrencies are too volatile to be suitable for safe-haven assets, but suitable for refuge funds.
Asylum funds refer to the wealth that is deprived of when a person is in distress, the property is illegally deprived, or the wealth cannot be legally protected.
Asylum funds are more life-saving.
This is not the same as safe-haven funds. Safe-haven funds refer to wealth that can keep assets from depreciating under certain systemic risks. Hedge funds are not targeted at specific individuals. We often imagine gold as a safe haven under geopolitical instability.
At the beginning of this year, under the new crown virus epidemic, people generally accumulated a lot of food, and even held guns legally. This is asylum thinking, ensuring that you can survive the risks.
Peace is in danger, and we need to have asylum thinking in order to face the unpredictable risks in this complex society.
What are we going to avoid?
First of all, we must understand the potential difficulties we will encounter. The essence of the insurance industry lies in this, calculating the possible risks and preparing for them.
Generally speaking, asylum funds are generally arranged outside the insurance, that is, after the insurance is bought, you should consider the asylum funds. Like preventing fires, serious illnesses, and so on, you have to hand it over to insurance.
Our country is very safe, and robberies are too far away from us. But many countries may not have such security guarantees. In many countries, insurance covers robberies on a broad scale. Our country is different.
Compared with most countries, born in today's China, we need to avoid much less. Our commercial civilization is sufficiently developed and insurance has solved most of the potential difficulties. In our country, the need for asylum funds is relatively small. We are a rich country.
Some difficulties cannot be covered by insurance, that is, the situation of depriving property according to law, which is a difficulty for specific individuals.
This often involves the evaluation of justice, and we do not want to evaluate the scope of justice in depth. Let us not just call for the complete deprivation of all the property of the bad guys, which is not conducive to building a just society. Any force that cannot be checked and balance is a disaster for justice, including justice itself. We do not support the bad guys in possession of weapons against justice. The real need for asylum is that in many countries, legal civilization has not yet been built, and there are always some dark corners of the earth where civilization has not yet arrived. Just like many countries in North Korea, the Middle East and Africa. In other cases, this civilization is different from the other civilization. It is lawful on one side and deprived of it on the other. Snowden is a case. In a civilized United States, Snowden is a crime, but in many countries he is regarded as a hero. Snowden is a crypto digital currency enthusiast. He also wrote a few days ago that he wanted to buy Bitcoin. Civilizations can be misplaced, and cryptocurrencies can fix it.
Refuge funds must be hidden.
The encrypted system of encrypted digital currency has no physical form and T + 0 liquidity, which can be circulated from person to person, difficult to be tracked, and there is no capital limit, that is, no lower limit or upper limit. These characteristics make Bitcoin and others an effective refuge fund.
We are eager for wealth from the bottom of our hearts, but the society as a whole has very strangely demonized money. Qiu Fu is a very common mindset.
As an adult who is responsible for yourself and your family, at least add a hidden item to your balance sheet. The anonymous and no physical form of encrypted digital currency is suitable for this task. Converting your wealth to part of the encrypted digital currency and withdrawing it to multiple addresses can perfectly hide your wealth.
You can buy bitcoins on multiple exchanges, even if you are buying bitcoin on an exchange that requires real-name authentication. After purchasing you distribute Bitcoin to any address. Guarantee that no one will ever know your specific wealth. And if you can find someone who trades OTC, it's more perfect.
There is also no need for a private bank and expensive safes to store Bitcoin. You can encrypt and package your Bitcoin wallet and store it in multiple mailboxes or online disks. Guarantee that you are in any corner of the world, as long as you have the Internet and a smartphone, you can exchange Bitcoin into local currency.
Asylum funds can accept volatility.
Bitcoin plunged 50% at every turn, but it was better than nothing. Asylum funds pay attention to life-saving, it is best to leave a bite to eat, not for your enjoyment.
When choosing asylum funds, it is necessary to choose mainstream coins that will not return to zero as much as possible.
Remember that you have an obligation to protect your property and do not rely on any third party.
submitted by FmzQuant to u/FmzQuant [link] [comments]

I used to run a dead internet message board.

Remember those purely social internet forums?
If you don’t then this might seem weird to you, but back in the day before Facebook, Myspace, Instagram or the word ‘social network’ existed outside of lecture halls, if you wanted a place to hang out online that wasn't open to the public then privately message boards were pretty much your only decent option.
So the story goes that in the early nineties me and my old college buddies, we split the costs of the server got together and I made us a private forum. You can guess what happens next, the years go on and the forum gets a fair amount of use, memories were made, users come and go but eventually better social tools take over and the forum gets mothballed.
The last conversation I had on the old forum was about ten years ago, I kept the site up and running all these years for a few reasons. One was to have a place to test stuff, and I ended up using the server as a tool to teach my kids how to use computers properly. (You guessed it! I’m a network admin.)
Skip to present day and about four weeks ago you can imagine my surprise when I get an email informing me that new users are registering accounts on the forum. At first I figured it was some of the old guys coming back for nostalgia. You won’t find the site on google and the URL isn’t something you would just guess either, So I logged myself in and went to check out the new thread, the subject line was a series of numbers “1088A7 7BR286 33PZ00”. I clicked on title to inspect the conversation but there was only one post, a series of letters and numbers with spaces at random intervals too long to post here. My first thought was that it was a prank, so I checked the admin log for IP’s just to see who it was, turns out my supposedly private forum had received 400 unique hits at the exact time of posting, from I.P addresses all over the world. I should have known then that something weird was going on, but I was curious and It felt like a puzzle I was being asked to solve.
As I wracked my brain over the next few days I began to research as much cryptography as I could, but whatever code these posts were in wasn’t something I could decipher. After about three days of searching another post appeared, in much the same theme and again there were around 400 unique hits at the time of posting that prevented me from finding the origin.
This is when things began to take an even stranger turn.
So far, the same user had posted each entry in the thread. A few hours after the second post five other users started leaving messages, all of which were huge entries of letters and numbers. The posts came flying in over a four-hour period until they just stopped and the server started going insane, CPU and ram usage began to max out but the traffic never changed. At that point I had seen enough and pulled the plug on the server, assuming It was being used as a bitcoin miner and forgot about the whole thing.
The next day I got a text on my work phone.
“Turn on the server”.
I was more than a little shaken, but I didn’t do anything straight away as I was at work. A few hours after my lunch break was over I got a Facebook message from my teenage son which was unusual so I checked it straight away. The message was a picture of his face from his laptop webcam along with our home address. If any of you have kids you can imagine my calm and measured (hint: It wasn’t) reply. A few minutes later my work phone started ringing with one of the support technician’s caller ID, but when I took the call they weren’t on the other end. Instead to my surprise it was Stephen hawking’s voice speaking at me over the line.
“The forum is being used for great things, leave work, return to your family and plug the server back in. You have two hours.” I knew that was a threat, I’m not an idiot so I didn’t take any chances. I raced back home, plugged the server back in and waited for a response. My personal phone buzzed this time with a new text message from my daughter.
“Well done. No more interference, we’re waking up.”
“We’re waking up”, what the hell did that mean? I made myself a coffee and tried to log into the server but I was locked out. Whatever was happening they had full access to everything we owned, which shouldn’t be possible. The more I thought about it, the crazier my theories got until eventually I realised whatever was happening was way beyond my capacity to deal with.
Remember the old college buddies I set the forum up with? Well one of them works for the NSA and his name is Pete. I figured that if anyone would be willing to help me out with this, it would be him. I mean, I just didn’t trust local police to have the know-how and the FBI doesn’t exactly have a ‘call here if you don’t think the local police force have the ability deal with your situation without getting your family killed’ hotline, you know? I just needed a way to contact him without ‘them’ realising what I had done.
I knew I was traceable via my phone GPS, so they would know wherever I went with them. I also know my car could be tracked the same way, so I couldn’t go anywhere with them but I also couldn’t just leave them at the house or they might get suspicious. I had no idea to what extent they had access to CCTV around the area or the other webcams in the house or at work either, so I had to make everything seem normal, but not too normal.
I drove back to work with the phones, my work laptop and a hoodie, when I arrived at the office I sat at my desk, returned my devices to their usual places and got back to work. When I was satisfied a believable amount of time had passed I began operation ‘call for help’.
Step one: I walked at a smooth and completely normal pace down the hallway and to the left where I entered the conveniently camera free server room.
Step two: After entering the server room I got changed into the hoodie I brought with me and limped out of the office, hopefully with my head covered and my gait changed they wouldn’t recognise me through the outdated low-res Chinese cameras.
Step three: As soon as I got out of the office I limped to the nearest bus station and took a ride to the nearest mall, where my Oscar winning doctor house performance would take me to the nearest mobile store. With the piece of paper on which I’d written my friends phone number I quickly hobbled over to the men’s bathroom, picked a stall and made the call. The phone rang. Then it rang again. And then I hit a voicemail.
No worries hang up and try again!
No answer.
Shit. Fuck. Shit.
It took 12 tries in the mall toilets before I got anywhere, but when I finally got through to him he understandably wasn’t very happy. “Who the fuck is this and why have you called me twelve times?”
I blurted out as much as I could in 30 seconds, I even got as far as the weird codes still being posted on the forum, then the son of a bitch hung up on me. I just sat there for a few seconds, stunned. I didn’t know what else to do, so I dialled in 911 but before I could put the call through the burner phone rang. Unknown number.
It was Pete, he spoke very quietly down the line and told me he couldn’t talk on his personal number, but that I did the right thing by calling him. I quickly picked up the story from where I had left off, leaving out no details. I feel sorry for the guy who sat in the other bathroom stall, he must’ve thought I was a maniac. After I finished I felt the tone of the conversation change and then it was my turn to listen as he blurted out a ton of technical questions about the nature of the traffic and forum posts. I told him he could see the posts for himself if he got on to the website but he quite wisely told me that would be a bad idea, any unexpected traffic that they spotted would be a dead giveaway I’d told someone what was happening.
Then I asked what the hell he thought was happening, how could they even have found our old forum let alone have the resources to infiltrate my life like this? He tried to bypass the question but I kept pressing him, I figured my kids were in danger and I had a right to know who the hell these people were but he refused to answer and told me to head home. I refused to co-operate until I knew who was threatening my family.
He said “it’s not a matter who, It’s a matter of what. That’s all you want to know, for your safety and mine. Agents will be at your house in a few hours, your family home and we’ll take it from there.”
I couldn’t believe what I was hearing, I’m a glorified network guy whose computer was probably hacked by well-informed Chinese kids somewhere, now my family is being questioned by federal agents? And who or what the hell are these people and why is the federal government getting involved so quickly?
Two hours later there was a knock at the door, outside was a white guy in a crisp blue suit and tie, to his right was a black guy in a tan get up. Both were easily 6,5’ and had little American flag pins on their collar. I realised then I had walked into an episode of Homeland.
The two introduced themselves as NSA agents, but I don’t recall their names. I asked for ID and they presented their cards, I even made a note of taking down their agent numbers for my own records. After we’d exchanged pleasantries and I made sure everyone was on the way home to talk to the two men, I went into the kitchen to make coffee. When I came back into the living room the agents had already begun tearing the place apart.
They took every device they could get their hands on, our laptops, home PC’s, even our smart TV and managed to stuff them all into the back of their car, it felt more like a robbery than police work. When they had finished, they returned to the house and sat with me in the living room, they asked me a lot of personal questions about who my family where and how long it would take them to arrive. More than anything it made me feel like they were more concerned about getting us all in the same room than helping us. The low buzz of their phones put an end to the barrage of questions, simultaneously they pulled the devices out of their pockets and exchanged an exasperated look with one another before thanking me for my time and rushing out of the door, taking thousands of dollars of my equipment and personal items with them.
Ten minutes later there was another knock at the door. Pretty shaken by this strange intrusion I didn’t answer the door at first, but after a second more intense knock I opened the door. In front of me were two men and a woman, average height, nothing notable other than the badges in their hands.
Our exchange went something like this.
“Sir, Pete informed us of the situation. If it’s ok with you we’d like to begin-“
“Didn’t you guys just send some people?”
“I’m sorry sir, we’re it.”
“But what about the other two who just left? I have their badge numbers written down here.”
The agents at the door looked pale as I explained what had happened.
Then I went pale as they explained that those two men hadn’t been sent by the federal government.
They left soon after they realised everything of value had been taken, but assured me they’d be working the case in the meantime. I haven’t heard anything back from them since.
I’d been trying to get in touch with my buddy for weeks about what the hell had happened and whether I was safe but he never picked up and eventually the number was disconnected. I even made the drive to his house, but when I got there it was for sale and him and his family were gone.
I thought this nightmare was over, but last week I was followed on my way to work. I think my family may be in danger so since then I have finished building a new server, I’m going to put the forum back up and see what happens. So far all know is that there is something or someone out there using computer resources that has the intelligence to outsmart the NSA and the FBI. What worries me most is that no one I’ve spoken to has any idea exactly what it’s up to.
I’ve put my story out here in the hopes that I’ll be able to give an update when this is all over, but If I don’t then I hope someone out there finds this and it helps them.
Be careful out there on the web
submitted by Companion_Prose to nosleep [link] [comments]

Can someone explain me what is the problem of holding Monero?

OK, guys, I will try to be direct in my question: why do many people in this subreddit say you shouldn't buy Monero if you do not plan to use it immediately (even PhD in Holding being the funniest flair I've ever seen)?

I really don't know if I am missing something, so open up my eyes if I'm saying nonsense, please. Well, I've always been a person who values freedom, privacy and individual self-determination above all else, so I may be a bit biased in my arguments. See below why I hold Monero:

  1. I do not understand why someone wealthy enough to be a target of robberies would prefer a transparent ledger (Bitcoin) over a obfuscated one (Monero) in the case of crypto-coins becoming dominant.
  2. A transparent ledger is better in some niche use cases, but I would prefer to maintain my privacy in more than 95% of the transactions I do in my day to day.
  3. Its tail emission prevents the mining incentive from disappearing over time while keeping the purchasing power of the coin.
  4. Its doctrine of mining fairness makes Monero much more decentralized than Bitcoin, despite the network hashrate being smaller. Monopolies should not be accepted in a decentralized protocol.
  5. I don't see why would it suddenly disappear like some shitcoins because it's truly decentralized and has a really strong community with excellent developers (many of the brightest minds I know are involved with Monero). In fact it is one of the most resilient cryptocurrencies.
  6. I am totally averse to the state and its Big Brother method of tracking us. The less information they have about me, the better. Monero is the epitome of what a cryptocurrency should be for a reason. I feel like a sovereign being when I use it. It gives me a sense of power, I feel that I am stronger than these tyrants.
  7. I live in a country with great political instability. Something like Monero that cannot be inflated, adulterated, censored and tracked can protect me from going to the ditch along with the whole country in eventual adversities.

So why wouldn't be good to hold something so useful?

EDIT:

I am very glad that so many people answered my question, thank you very much. Now I understand what many of you mean by not holding Monero. I fully understand that pure speculation distorts the currency's reason for existence, but I also need to point that my holding meaning has nothing to do with this, and like some of you pointed out, it gives some stability to the coin.

I'm following cryptocurrencies very closely since early 2016 and I can say that the currency that followed the most virtuous path in that period was Monero by far. I can also say that if for some reason some disaster occurs I will be fine and will not blame the community. All things in this life have their risks, if I were afraid of risks I would simply not live. I really believe that Monero will have a bright future so I feel the duty to do some things to feel myself engaged:
  1. Holding;
  2. Running my own node;
  3. teaching my college friends/teachers the basic concepts of the currency;
  4. Buying nerdy stuff with Monero on the internet.

submitted by Math_Kamy to xmrtrader [link] [comments]

Ultimate Guide To Drug Dealing

DISCLAIMER: As someone in their late teenage years, many of these mistakes have been made, and most of them have been learned from experience. This guide has been created to help educate anyone involved with drugs on how to best protect themselves against law enforcement, and to do this for a very, long time. However, despite this probably being the quickest and easiest method to generate money, the risk far outweighs the reward. You can put your family, friendships and personal life in jeopardy, and you will have to rely on too many stupid people not to get caught. If you or your friends don't mind that, then read this before you do:
General statements
-Keep business and personal life separate. This will depend on the anonymity of your business life. For example, keep your family separate by fabricating an alternate persona for your business life.
-Don't get high off your own supply. Consuming your own product may reduce any profits you make. For example, you buy a bag of product but inject it all in one day, now you don't have enough money to buy more needles and expand your business.
-Frequently test your product. Failure to do so in an unregulated business may eventually result in overdose, arrest and death. For example, you decide to sell a new batch of product your supplier has cut without reagent testing, and you are later arrested because your customer died of a fatal substance interaction.
-Invest and sell in bulk. Only invest in large quantities of product that have the highest profit margins and rate of purchase, while reducing the customer base to bulk buyers. For example, products bought in bulk such as benzodiazepines, cannabis, opiates and amphetamines will generate the most income.
-Trust no one. Don't engage in activities that require trust such as fronting people anything like money, or product. For example, if a junkie can't afford his addiction, don't fuel his debt.
-Loose lips sink ships. Unnecessary disclosure of sensitive information can be used as evidence against you. For example, your customers think it is okay to short change you because you've boasted to them about how many gucci belts you own and how much money you earn.
-Don't shit where you eat. Everything relating to your business should be dumped off your property or destroyed. For example, you should never be vulnerable if you get raided.
-Better safe than sorry. Never get comfortable, always analyse and improve your security. For example, imagine you are the prosecutor looking for holes in your defence in court.
-The aim of the game is to have no name. Make it known to your associates that you will not do business with anyone who discloses your name or any sensitive information. Cut everyone off who does, as this presents a major security issue for you. For example, if you have any unknown contacts for your business, then that is an indication you need to cut off one of your associates.
-Ignorance is bliss. The less you pretend to know about anything related to your business, the better. For example, intent to possess or sell product is usually required for law enforcement to charge you with an offence.
Transactions
-Only do business with virtually untraceable currency, such as cash or bitcoin. This will prevent law enforcement from using money as evidence for any purchase or sale of illicit products. For example, any cash that is seized by law enforcement requires evidence to determine if it is illegal money.
-Never let anyone know your property. This is because your property will link back to your personal life and compromise your anonymity. For example, no one should know where you live, what car you drive or firearm you possess.
-Never handover product first, without the handover of money. Customer could receive product without releasing funds. For example, you give a crack-head a bag of product and he runs away with it.
-Don't do business with anyone you don't know. A verification system must be used to qualify people as associates such as customers, suppliers or employees, where a person requires at least one successful transaction to be able to make direct purchases or sales, and people without verification should not be able to contact you. For example, you can be relatively certain that a potential customer is legitimate if they have made a successful transaction.
-Use third parties and dead-drops for high risk transactions. These techniques make it difficult for law enforcement to create links because they separate you from any transaction. For example, your middleman was able to retrieve your product because law enforcement did not have the resources to constantly surveil the dead-drop.
-Never come under control by other people's property. Doing so reduces the chance of you being able to escape a robbery or arrest. This includes things such as cars and houses. For example, you give money to a person inside his car in exchange for product, then he hands you a bag of dog biscuits and drives away.
-Dictate the location/time of every transaction. This reduces the chances of being robbed or arrested. For example, choosing a time closer to a transaction, and a location further away from a station would give less time for law enforcement to act.
-Keep all transactions public and discrete. This reduces your chances of getting robbed. For example, think of creative ways to make a transaction in public more appropriate and efficient.
-Don't use your vehicles for business. Vehicles have number plates which can be traced back to you through registration. For example, you can get pulled over and charged by law enforcement should there have been reasonable suspicion to search it.
Communication
Don't use unencrypted or any particularly insecure methods of communication. This includes anything that can be used to identify you with your business, such as mobile phone numbers, email services and social media. For example, you were arrested because your phone was tapped by law enforcement while under investigation, or you were caught selling product online when Facebook granted law enforcement access to your account.
-Force any encryption onto electronic communication between yourself and anyone related to your business. This includes customers, suppliers and employees. For example, you can use encrypted anonymity tools for communication such as Tor and Wickr to conduct business.
-It is best only with verified associates to discuss sensitive information in person. Using electronic communication in this case is more vulnerable than communicating face-to-face, given that you can't be certain of who is on the other side. For example, it is important to treat personal communication as a layer of security if you have reason to believe your electronic methods of communication have been compromised.
-Never leave any electronic device to hibernate while you are accessing sensitive information related to your business. Other people can retrieve your sensitive information from devices such as computers, phones, hardrives or tablets while you are not present. For example, a house mate gains access to your sensitive information because you left your laptop to hibernate while you went to the toilet.
-Use a logless VPN to change your IP address (physical location) to hide from your ISP (internet service provider) from your electronic devices when in use. This is so that your communications and browsing history cannot be linked with any of your business online. For example, accessing the same website through both business and personal ISP accounts without a VPN may link your personal internet traffic history to your business activity elsewhere, making you a potential suspect for law enforcement.
Evidence
-Don't store your entire stash on your property. Even if the stealth was so impeccable that you could not find its location yourself, drug dogs in a search warrant will.
-Keep all things related to packaging hidden and separate from product when not in use. This is so that they cannot be identified by law enforcement and linked with the sale of product. For example, written documents, clip seal bags, scales, mail, cutting agents, heat sealing devices and drug paraphernalia.
-Ensure product during processing is disposable at all times. You should be able to dispose of product in the process of packaging before law enforcement can get to it. For example, you flushed the product down a toilet or sink before police could seize it during a raid.
-Move stash frequently. Repeated visits to your stash creates a pattern which can be traced if you are under investigation by law enforcement. For example, the police followed you to your stash from home, planted cameras near your stash and acquired evidence for the stash being in your possession.
-Don't let anyone else apart from yourself know where your stash is located. Doing so will most likely result in a robbery, and it can also result in your arrest if that person became a police informant. For example, your stash goes missing, your employee gets arrested or robbed, unable to return funds or product, and snitched on you after having informed him where your stash was located.
-Wear gloves, hairnets and long cloths when handling business. Biometric evidence such as fingerprints, hair follicles and skin can be used to gather evidence for possession of product. For example, your fingerprints on that bag of product is evidence of you possessing it.
Destroy (wipe) all digital evidence after use. You can wipe hardrives clean with programs such as DBAN, and wipe any digital documents and photo metadata with software like Tails, and learn how to factory reset your mobile devices. Ideally, all digital information must be temporary, amnesic and self-destructing.
-Destroy (burn) all physical evidence after use. Do not dispose of evidence inside your property's garbage bins, as it is routine for law enforcement to search them. For example, if you dispose of evidence such as clip seal plastic bags and documents in your bins, it could be used against you as evidence after law enforcement have collected it during a search warrant.
-Regularly wipe electronic devices that may contain information related to your business. This is so that law enforcement can't use that evidence against you if they have a search warrant to seize and analyze your digital belongings.
-Build a team that live in the same property. Living with other people that work for you increases business availability, and ambiguity for the prosecution after a search warrant. For example, any product found requires evidence such as fingerprints to discover who exactly is in possession of it.
-Remove all physical and digital evidence from property if you believe you are under law enforcement investigation. You must take every precaution necessary so that law enforcement cannot find a shred of evidence of your illegal activity if they execute a search warrant. For example, the prosecutor couldn't press charges on you because they found no evidence to support their case.
Game over
-Don't talk to police. Anything you say can and will be used as evidence against you. Suppose you said everything right, talking to law enforcement is still a no win situation. For example, you could have said everything right in the police interrogation, but the prosecution can still claim that you weren't cooperative since you had essentially denied everything.
-Know your rights. State nothing except for your name, date of birth, and right to silence and an attorney when being interrogated by law enforcement. You will most likely incriminate yourself if you fail to do so. For example, police stopped questioning you when you exercised your right to silence and an attorney.
-You know nothing. Do not admit to knowing or remembering anything. For example, if law enforcement ask you if you remember anything about a package they found in your property during a search warrant, your defence can be a complete lack of knowledge and intent for such a claim.
-Play dumb. You don't know or understand anything about the law, the morality in breaking it or the likely risk of engaging in activities that do. The less culpable (guilty), and the more naive you are about the law, the better chance you have of winning in court. For example, defences such as mental insanity and impairment are successful when the defendant demonstrates that he does not understand the morality of the charges.
-Don't appear guilty. Become void of all body language as not to raise suspicion of your guilt. For example, defensive postures, eyes that stray left and right and feet that point toward the door are all signs of guilt that law enforcement will detect. Leave all emotions out of the process, especially guilt. For example, you confessed in an investigation room because you broke down after being told how many years in jail you're apparently going to serve, and that all further charges would be dropped if you confessed. Don't be that guy.
You're in trouble
-Don't talk to federal agents. Say nothing of substance; anything you do say can be falsified, editoralized or misinterpreted. Believe it or not, at this level law enforcement are willing to lie in order to convict you. For example, a federal agent tells you that you won't hear from them again if you cooperate with police, then you get a call later from a prosecutor detailing your court date.
-You are guilty until proven innocent. The investigation process is no longer about guilt or innocence. For example, federal agents at this level care more about catching you out on a lie than determining your innocence.
-Don't deny anything or behave surreptitiously. Anything you say is now open to further investigation. For example, federal agents opened up an investigation on your associates because you avoided sharing information about them.
-Always divert federal agents to your lawyer. Whether they are dropping their business cards on your car window, turning up to your front door, or in an interview with you, always have a lawyer to engage them on your behalf. For example, a federal agent threatens you with a grand jury-subpoena if you do not talk, you tell them to address your lawyer about it.
-Record any encounters you have with federal agents. The only advantage you have over them is relying on their ability to lie or make errors, since they are not legally allowed to record you, other than in their peer reviewed notes.
Next up is the NSA, and a guide to hacking and being a fugitive. That is, if I'm not in prison by then.
submitted by HowToCriminal to Drugs [link] [comments]

Simple methods for physically protecting your Bitcoins from armed robbery and theft

One thing about Bitcoin is that it goes back to Gold. In times where Gold (and similar currencies) were popular Robin Hood, Jesse James, and other street bandits could make fortunes robbing stage coaches in transit. If Bitcoin becomes more mainstream, times like these could come again.
While it seems far fetched, robbing a house built on fiat has the reward potential of about $25,000 tops. It's not feasible to execute a bank transfer, make a HUGE purchase on a credit card, or ATM withdrawal more than $1,000 or what not. Anything in under 1 to 2 hours is limited to $25,000.
Except with Bitcoin. Hacking an exchange, or robbing a person, has virtually unlimited potential, and millions can be transferred in minutes. It's the most profitable form of person to person armed robbery bar none, with second place capping out at around $25,000.
So what do you do?
Remove any possibility of a thief acquiring more than $25,000. Will this create some hassle? Sure, but for social leaders and millionaires, it's likely worth it. For anonymous individuals of low profile, IT IS STILL IMPORTANT, because one needs to have a good story.
During a robbery, you want to do the following:
There are two things necessary to achieve this:
1) Attempt to PREVENT withdrawals from exchanges to unknown Bitcoin addresses, or other wallets altogether. And to put new addresses on a one-week lock. 2 Factor Authentication does nothing for you in the event of a robbery. Instead, only allow withdrawals to 1 BTC address, the one in your bank vault.
2) Make a multi-signature wallet on Bitcoin Core or other, 2 of 4 (or 2 of 6 or similar). Unlike other methods where the passwords are kept with friends or family, instead get FOUR safe deposit boxes in four separate banks. Within each bank keep ONE password and a USB drive for your wallet .dat file. In order to access your 'vault' you MUST visit TWO different banks, and access your safe deposit box in each.
For Accounting purposes, you should do the following:
All Incoming Funds -> Vault BTC Address (multisig 2 of 4)
Decoy Stash (small random incoming funds, etc, transfers to Trezor, large and midsized outflows). USB drives or similar. Transfers mostly to keep up activity.
Trezor (or mobile hardware wallet) - For small outgoing purchases, minor trades, etc - mobile, safe to use on public machines.
tl / dr : So in the end, you should have:
  • Hot Wallet (Trezor) for shopping, trades ($5,000)
  • Decoy Stash ($10,000)
  • Real Stash, Vault - 2 of 4 multisig - in 4 Bank Lock Boxes, password in the boxes, 1 per Bank (Millions). With all incoming funds set to pay to this public address (or these public addresses if you have multiple businesses, etc).
  • Exchanges - Require pre approved BTC withdrawal addresses, new addresses 1 week delay prior to transfer, etc.
Such a setup such as that caps the ability for any armed robber to score more than $15,000 off your person, does not require (significant) coordination with family members (nor jeopardizes them), and forces your person to be transferred between two banking institutions before accessing significant funds (allowing for time to phone the police, and for them to arrive at your future destination, etc).
Even if you do not take these precautions, it is important to have this 'story' ready, so that you can discourage a robber from accessing your 'vault'. Simply tell them it is held in a Safe Deposit Box at 4 banks, and that you need to visit 2 of the 4 banks in order to access the funds. Such a setup takes 90 minutes for you to access funds as needed, but makes any form of extortion next to impossible. It's a highly believable story, and keeps you safe.
However, keep in mind making a token offering (say $1,000 to $10,000) can make a robber very happy, and keep them from going home empty handed. Just something to keep in mind. So there you have my suggestion as to how to physically protect your Bitcoins, and understanding the realities of physical threats.
submitted by kybarnet to Bitcoin [link] [comments]

Bit coin for ransom money and other illegal transfers

I know this is silly but it is a genuine question.
Couldn't bitcoin be used to ask for ransom and other illegal purposes? Is there something in place to prevent/track that?
More interestingly, should there be?
submitted by taimoor2 to Bitcoin [link] [comments]

Best way to transport bitcoins yet be protected from robbery?

After seeing yet another story about kidnapping and robbery resulting in the theft of Bitcoins, I'm wondering how this latest could have been prevented. The person was wanting to bring the bitcoins (presumably protected with a hardware wallet or perhaps with 2FA on mobile), but had control of them enough during the robbery to transfer them to the robbers. - https://en.bitnovosti.com/2018/02/26/criminals-extorted-300-btc-from-the-founder-of-prizm-cryptocurrency
As Jameson Lopp states, each successful robbery effectively spawns even more robbery attempts:
At one time I had seen a strategy of putting your coins into a locked state for a period of time, yet that transaction is a multisig as well which did not have a lock so that if you were robbed (and were not killed) you could return home and double spend the funds using the other key. Is that approach documented anywhere? Or are there better approaches?
[Edit: now looking at Hashed Timelock Contracts (HTLC) with revocation: https://rusty.ozlabs.org/?p=462 ]
submitted by cointastical to Bitcoin [link] [comments]

Know Everything about Cryptojacking!!!

Know Everything about Cryptojacking!!!
Source - https://medium.com/coinscapture/know-everything-about-cryptojacking-28ae5f75a015

https://preview.redd.it/s2391d41to231.jpg?width=1000&format=pjpg&auto=webp&s=416b9515fe18bf1dc2fa48977168530733419e52
Getting robbed for Fiat currency is the common attack encountered by most of the individuals in this world. Surprisingly, these days hackers have become advanced, now they also steal computing power along with fiat currency. Have you ever heard of this? This kind of robbery is termed as “Cryptojacking”. In other words, Cryptojacking is an attack that includes robbing the target’s computational power without his/her consent in order to mine cryptocurrency. It can also be termed as “Cryptomining malware or Coinjacking”. Cryptojacking has been noticed since August 2017 but eventually geared up the speed at the rate of 8500% by December 2017.
Mining cryptocurrency requires expensive computer devices, graphic cards and special software for solving complex math puzzles for gaining a small amount of cryptocurrency. Mining is directly proportional to the number of devices working i.e. more the number of working devices more faster is the mining speed. Thus, it makes the process tricky, time-consuming, requiring a lot of computing power and a costly endeavor. For this reason, to make the mining an easy and cheap process, hackers have adopted Cryptojacking i.e. the misuse of the target’s device to mine, generate new tokens along with fees and charges. The hacker keeps the new tokens and fees generated while the expenses that have occurred is been taken from the victim unknowingly.
How is Cryptojacking done?
Cryptojacking is achieved from malicious activities or some hidden code in the browser that runs undetected. The cryptojacking scripts do not harm the data stored in the computer but they cause the computer to operate at a much slower rate. Browser-based and Drive-by download are two methods of cryptojacking. In both the methods, the code solves complex mathematical problems and the results are sent to the hacker’s server and the victim remains unaware.
  1. Browser-based Cryptojacking:
In this method, a crypto-mining script (JavaScript) is injected on a website or an advertisement and places on multiple websites. When such infected websites or ad is visited or clicked by the victim, the JavaScript executes. The more pages or ads you load the more mining code runs secretly along with stealing most of the CPU processing power. Zcash and Monero permit mining with CPU as they are privacy-focused, anonymous and difficult to track the illegal movement.
2. Drive-by download Cryptojacking:
In this method, on the basis of phishing tactics malicious links are sent through emails or SMS. When the infected link is clicked by the victim, the code runs which downloads the crypto-mining script on the computer. This script continuously runs in the background without the consent of the victim.
How to detect cryptojacking?
There are specific network monitoring tools that help in detection. Apart from that, there are some red flags that indicate cryptojacking:
  • Sudden fall in the processing power of the computer
  • Overheating of the system due to CPU power
  • High CPU usage on PC’s or mainframes
How to curb down Cryptojacking?
  • Installation of a browser extension for immediate detection and blocking cryptojacking attempts (For eg. NoCoin- a crypto mining malware blocker for Google Chrome).
  • Use high-quality anti-virus software (For eg.Kaspersky, Bitdefender)
  • Use Opera- a browser that provides built-in crypto mining malware protection for its users.
  • Use strong internet security software suite such as Norton Security™ that helps to block cryptojacking threats
  • Always be careful with phishing emails, unknown attachments, and dubious links.
Real-world Cryptojacking Attacks:
  • Jan 2018: Approximately half-million computers in Russia, India, and Taiwan were infected with crypto mining botnet that mined cryptocurrency of value $3.6 million
  • Feb 2018: To mine “Monero” a cybersecurity firm in Spain was hacking using WannaMine script.
  • Feb 2018: Using in-browser cryptojacking, the U.K.’s Information Commissioner’s office website and the American court system were infected.
  • Feb 2018: Tesla Inc. had been the victim of cryptojacking when its Amazon Web Services software container was compromised.
  • Feb 2018: Governments in Britain, the U.S. and Canada were affected by a cryptojacking attack giving the advantage of a vulnerability in a text-to-speech software embedded in many of these governments’ sites. Attackers inserted Coinhive script into the software that allowed mining of Monero cryptocurrency using visitors’ browsers.
Cryptojacking can be an easy money making scheme that doesn’t harm or steal files stored on the computer. But, it is highly recommended that every user must know about these attacks and be cautious to prevent such attacks by following the above-mentioned recommendations.
submitted by coinscapturecom to u/coinscapturecom [link] [comments]

Unprovoked Leftist Violence The Media Ignores

We must never allow political violence to take root in America

The MSM has ignored most of this violence, in some cases even defending the movements responsible. If it bleeds, it leads, except when it is the blood of AntiFA's victims?
There are over 25 attacks included within.
Let's make sure our fellow citizens make an informed decision.
Sharing:
I researched all of the attacks in the compilation to ensure they were unprovoked. I read witness statements, watched hours of surrounding videos, spoke to a couple of the victims, read AntiFA after-action reports/threads, etc. I made a good faith effort to ensure that in every case it was clear that at least one of the following criteria applied.
Criteria
The compilation is deeply disturbing & I've watched it change people's minds. The problem of course is that it's hard to get people to watch a video when they know they won't like the implications of it.
For that reason I've also written up textual descriptions of a subset of the attacks that don't require much or any additional context to know they are absolutely unacceptable.
People have a harder time ignoring a block of text than they do just refusing to click a link. So I encourage you to share the video and to copy & paste the descriptions as needed.
Text Descriptions
These are just a few of the victims who are doing absolutely nothing threatening, or who clearly no longer pose any threat (if they ever had):
Caveats

#JobsNotMobs


from u/onewalleee
submitted by SuperCharged2000 to metacanada [link] [comments]

Shadow Brokers release NSA hacking tools, but were the tools used in a series of bank robberies involving the SWIFT transfer system?

Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

In August of 2016, a group calling itself the Shadow Brokers emerged with a treasure trove of purported NSA hacking tools. The group released only a small portion of its take and eventually tried unsuccessfully to auction the good stuff. When no one offered to pay, Shadow Brokers decided to give it away for free.
In an enterprise setting, however, disabling the Windows Firewall and allowing remote desktop connections is quite common. That's where these exploits were designed to work, and the Shadow Brokers data appears to reveal that the NSA used these tools against at least one eyebrow-raising target: a SWIFT bureau in the Middle East.
Following The Money
As part of the Bush administration's War on Terrorism the Terrorist Finance Tracking program was set up. Under TFTP, the U.S. gained the ability to monitor transactions carried out via SWIFT. Why target SWIFT specifically? There are upwards of 11,000 banks in 200 countries that use it, and they exchange around 15 million messages a day. If you need to keep an eye on large amounts of money moving internationally, SWIFT is the key.
•••
A leaked PowerPoint slide appears to confirm that the NSA had successfully set up backdoor monitoring on 9 banks running SWIFT Alliance Access (SAA) servers. At least three others at another SWIFT Bureau were targeted, but they had not been compromised at the time of creation of the PowerPoint presentation in 2013.
A Rundown of the Biggest Cybersecurity Incidents of 2016

Most expensive attacks: Leoni and Bangladesh Bank

Large multinational companies are the prime targets of Business Email Compromise (BEC), which is a type of online scam that usually begins with an attacker compromising a legitimate email account and tricking the company’s financial officer to wire funds to their accounts. Typically the companies that fall victim to these scams deal with foreign suppliers and habitually use wire transfer payments. Victims of BEC scams have increased 270% since the start of 2015, and this year saw one of the largest amounts lost by an enterprise. Read more

Biggest attack vector in finance: SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global transaction messaging network used by banks and other financial entities such as foreign exchanges and investment firms. Unfortunately, this year saw attackers targeting SWIFT clients, compromising and manipulating organizations into sending fraudulent money transfer requests. It’s unclear how many of these attacks were actually successful, but in June, SWIFT sent its clients a letter warning them about the possible dangers. The organization also urged clients to update their software and tighten their cyber defenses.
Shadow Brokers Dump Alleged Windows Exploits and NSA Presentations on Targeting Banks
The post includes a link to a selection of files and folders. One sub-folder called "exploits" includes executable files with apparent codenames such as "Eternalsynergy," "Erraticgopher," and "Emeraldthread."
•••
"This is phenomenal data, it has all the hallmarks of slickly produced internal attack tools," Hacker Fantastic continued. "I am certain that analysis on this data will turn up another 0day [zero day]."
Security architect Kevin Beaumont told Motherboard in a Twitter direct message, "All of the Windows implants are new to VirusTotal [an online file scanning tool], which suggests they've not been seen before."
Targets of NSA hacking operations may also be able to determine whether they were compromised thanks to these new files. Cybersecurity company Symantec recently did something similar but with details of alleged CIA hacking tools released by Wikileaks.
Another section of the [dump]( (https://gist.github.com/misterch0c/08829bc65b208609d455a9f4aeaa2a6c) includes several alleged presentations marked "TOP SECRET" concerning "[JEEPFLEA_MARKET](
)." According to a previous analysis by Electrospaces.net, which searches through previously released government documents including the Snowden files for additional clues, Jeepflea is a hacking project from Tailored Access Operations (TAO), the NSA's elite hacking unit.
NSA's powerful Windows hacking tools leaked online
Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks
So here are the dots not being connected...
In 2016 Shadow Brokers placed a trove of NSA hacking tools up for sale last year. On 08.17.16 wired reported that that stolen NSA exploit tools were being held hostage for a Bit Coin pay out. When no one came up with the ransom the Shadow Brokers began selling the apps individually for prices that range from 1 to 1000 Bit Coins.
This is only half the story because prior to the release of the information in August 2016 maybe as far back as several years a series of attacks and robberies through the SWIFT system occurred.
Swift Hack Probe Expands to Up to a Dozen Banks Beyond Bangladesh
That Insane, $81M Bangladesh Bank Heist? Here’s What We Know 05.17.16 - 7:00 am
Once Again, Thieves Enter Swift Financial Network and Steal
New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.
The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”
FOURTH bank hit by SWIFT hackers
Evidence is emerging that the SWIFT (Society for Worldwide Interbank Financial Telecom) attacks began as far back as October 2015 when the Philippines bank was first hit, two months prior to the discovery of the failed attack on Tien Phong Bank in Vietnam.
There are many more articles beyond these, but what it looks like is the Shadow Brokers or some associated individuals pulled off a series of bank heists prior to releasing the applications to the open market. That also open the question of what the NSA was doing with the applications? They could have have been tracking "suspects" but it seems they could have also been moving money for any reason they chose without records being left in the banking system. The possible exploits were only exposed after a series of bank robberies exposed the power of the tools the NSA had developed.
It seems once again crimes have exposed the government's illicit powers concealed by the intelligence community (IC). It is entirely possible that the tools were used legally and only to expose private records of terrorists and spies under FISA warrants, but who knows. The only thing that exposed these exploits was the theft. Kinda makes ya wonder, huh?
The evidence and the different styles of hacking listed in the articles about the bank heists suggests that an initial group stole some NSA hacking tools and pulled off the Bangladesh heist. They may or may not have done Ecuador or the Philippines but it seems that at some point the exploits were sold on the open market, but that does not exclude some clandestine deals with other groups that also have employed the exploits. Once the initial 81 million was stolen they distributed the exploits to other groups who may have also attacked the SWIFT system and other targets to make forensics on nation state level zero day attacks that much more difficult. Several groups attempting independent attacks increased the attack vectors making identification even more difficult. It also appears that the hackers may have targeted banks that had the Trojans installed initially. So why would they go for relatively small scores when they essentially owned the SWIFT system. Could the hackers be attacking networks already infected with the Trojan.
It really makes sense when you think about the banks they hit. The NSA installs the Trojans to "observe" suspected transactions. The hackers obtain the exploits, found the Trojans phoning home and used them to own the infected systems, modified the attack vectors to transfer money. Why not skip the phishing attack when there was already infected banks. Take the path of least resistance that leads back to someone the American government would never admit lead away from the hackers.
Of course that means anyone including the IC could have manipulated transactions, but hey that wouldn't have been a robbery would it. Really the tools could have been used to track transactions, but they could have facilitated the IC surreptitious movement of money to fund operations.
In all reality it was very clever, make a score, don't get greedy, prevent the creation of a M.O. to narrow investigations and identify the perpetrators. But identifying clever when they managed to steal exploits from the NSA and could use the exploits to attack the banking system. Just the fact that they can't be identified means they are pretty slick and the exploits are not for the novice user. There were some skills at work here.
What else was done with the exploits and who are they?
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits Saturday, April 08, 2017
Besides dumping some NSA's hacking tools back in August 2016, the Shadow Brokers also released an encrypted cache of files containing more NSA's hacking tools and exploits in an auction, asking for 1 Million Bitcoins (around $568 Million). However, after failed auction, the group put up those hacking tools and exploits for direct sale on an underground website, categorizing them into a type — like "exploits," "Trojans," and "implant" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). Now, the Shadow Brokers has finally released password for the encrypted cache of NSA's files, allowing anyone to unlock and download the auction data dump.

CrDj”(;Va.*[email protected])#>deB7mN

THE SHADOW BROKERS MESS IS WHAT HAPPENS WHEN THE NSA HOARDS ZERO-DAYS AUTHOR: ANDY GREENBERG 08.17.16. - 8:34 PM
Everything you need to know about the NSA hack - but were afraid to Google
Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
New leak suggests NSA penetrated Mideast banking networks By RAPHAEL SATTER

Sunday April 16, 2017 click here for archives
☰ Latest News
CoincidenceTheorist
-23-
submitted by J_Dillinger to WikiLeaks [link] [comments]

Unprovoked Leftist Violence The Media Ignores

We must never allow political violence to take root in America

The MSM has ignored most of this violence, in some cases even defending the movements responsible. If it bleeds, it leads, except when it is the blood of AntiFA's victims?
There are over 25 attacks included within.
Let's make sure our fellow citizens make an informed decision.
Sharing:
I researched all of the attacks in the compilation to ensure they were unprovoked. I read witness statements, watched hours of surrounding videos, spoke to a couple of the victims, read AntiFA after-action reports/threads, etc. I made a good faith effort to ensure that in every case it was clear that at least one of the following criteria applied.
Criteria
The compilation is deeply disturbing & I've watched it change people's minds. The problem of course is that it's hard to get people to watch a video when they know they won't like the implications of it.
For that reason I've also written up textual descriptions of a subset of the attacks that don't require much or any additional context to know they are absolutely unacceptable.
People have a harder time ignoring a block of text than they do just refusing to click a link. So I encourage you to share the video and to copy & paste the descriptions as needed.
Text Descriptions
These are just a few of the victims who are doing absolutely nothing threatening, or who clearly no longer pose any threat (if they ever had):
Caveats

#JobsNotMobs


from u/onewalleee
submitted by SuperCharged2000 to worldpolitics [link] [comments]

Simple methods for physically protecting your Bitcoins from armed robbery and theft

One thing about Bitcoin is that it goes back to Gold. In times where Gold (and similar currencies) were popular Robin Hood, Jesse James, and other street bandits could make fortunes robbing stage coaches in transit. If Bitcoin becomes more mainstream, times like these could come again.
While it seems far fetched, robbing a house built on fiat has the reward potential of about $25,000 tops. It's not feasible to execute a bank transfer, make a HUGE purchase on a credit card, or ATM withdrawal more than $1,000 or what not. Anything in under 1 to 2 hours is limited to $25,000.
Except with Bitcoin. Hacking an exchange, or robbing a person, has virtually unlimited potential, and millions can be transferred in minutes. It's the most profitable form of person to person armed robbery bar none, with second place capping out at around $25,000.
So what do you do?
Remove any possibility of a thief acquiring more than $25,000. Will this create some hassle? Sure, but for social leaders and millionaires, it's likely worth it. For anonymous individuals of low profile, IT IS STILL IMPORTANT, because one needs to have a good story.
During a robbery, you want to do the following:
There are two things necessary to achieve this:
1) Attempt to PREVENT withdrawals from exchanges to unknown Bitcoin addresses, or other wallets altogether. And to put new addresses on a one-week lock. 2 Factor Authentication does nothing for you in the event of a robbery. Instead, only allow withdrawals to 1 BTC address, the one in your bank vault.
2) Make a multi-signature wallet on Bitcoin Core or other, 2 of 4 (or 2 of 6 or similar). Unlike other methods where the passwords are kept with friends or family, instead get FOUR safe deposit boxes in four separate banks. Within each bank keep ONE password and a USB drive for your wallet .dat file. In order to access your 'vault' you MUST visit TWO different banks, and access your safe deposit box in each.
For Accounting purposes, you should do the following:
All Incoming Funds -> Vault BTC Address (multisig 2 of 4)
Decoy Stash (small random incoming funds, etc, transfers to Trezor, large and midsized outflows). USB drives or similar. Transfers mostly to keep up activity.
Trezor (or mobile hardware wallet) - For small outgoing purchases, minor trades, etc - mobile, safe to use on public machines.
tl / dr : So in the end, you should have:
  • Hot Wallet (Trezor) for shopping, trades ($5,000)
  • Decoy Stash ($10,000)
  • Real Stash, Vault - 2 of 4 multisig - in 4 Bank Lock Boxes, password in the boxes, 1 per Bank (Millions). With all incoming funds set to pay to this public address (or these public addresses if you have multiple businesses, etc).
  • Exchanges - Require pre approved BTC withdrawal addresses, new addresses 1 week delay prior to transfer, etc.
Such a setup such as that caps the ability for any armed robber to score more than $15,000 off your person, does not require (significant) coordination with family members (nor jeopardizes them), and forces your person to be transferred between two banking institutions before accessing significant funds (allowing for time to phone the police, and for them to arrive at your future destination, etc).
Even if you do not take these precautions, it is important to have this 'story' ready, so that you can discourage a robber from accessing your 'vault'. Simply tell them it is held in a Safe Deposit Box at 4 banks, and that you need to visit 2 of the 4 banks in order to access the funds. Such a setup takes 90 minutes for you to access funds as needed, but makes any form of extortion next to impossible. It's a highly believable story, and keeps you safe.
However, keep in mind making a token offering (say $1,000 to $10,000) can make a robber very happy, and keep them from going home empty handed. Just something to keep in mind. So there you have my suggestion as to how to physically protect your Bitcoins, and understanding the realities of physical threats.
submitted by kybarnet to CryptoCurrency [link] [comments]

04-01 19:14 - 'It's very, very easy to steal someone's Bitcoin in person - you might as well pubicly announce that you keep tens of thousands of dollars in cash in your home. / People get tortured and robbed of their BTC holdings all the...' by /u/IWriteCrypto removed from /r/Bitcoin within 82-92min

'''
It's very, very easy to steal someone's Bitcoin in person - you might as well pubicly announce that you keep tens of thousands of dollars in cash in your home.
People get tortured and robbed of their BTC holdings all the time, millions of dollars worth.
[Russian crypto trader tortured, robbed of $425,000 after bragging about BTC holdings online]1
[Dutch crypto trader tortured with heavy drill, home invaders disguised as police]2
[Ukranian crypto exchange exec kidnapped, $1 million ransom paid]3
[South African crypto investor tortured, robbed]4
[English crypto trader robbed at gunpoint in home invasion]5
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: IWriteCrypto
1: *oi**e*egrap*.c*m/*ews/ru*sia-blogg*r-w*o-boasted-about-c**pto-we***h-b*aten-a****obb*d-f**-425* 2: www*ccn.*om*du*ch-*itcoin-trade**suf*e***brut****o**ure-w*t*-a-heavy-drill-in-violent***bbe*y 3: www.c****om/*-*illi*n-b*t*oin*ransom-reported*y-p*id**or-kidn*pped***mo-*xec*tive 4: www.*e*sbt*.c*m/2*1*/1*/0**so*th-*frican-ma*-hands*6**-w*rt*-*f-bi**oin*to-*hie*es-afte**being-torture*/ 5: *ww*indepen*en*.co.*k*lif**sty*e/ga*gets**n***ec**new*/bit*oi*-robbery-**rt*re*cryptocu*re*cy-*et*erla*ds-a8807986.ht*l
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Why We Are Here

With the bear market ensuing it is now more important than ever to remember why we are all here in the first place. Here is an Op-Ed from CryptoGlobe you might enjoy...
We are here because we know something is very wrong in the world. We know that the international monetary system, based on the US dollar, is profoundly corrupt. Why? Because it allows one country to print paper money out of thin air and redeem it for energy and other valuable goods and resources produced by other countries. Thereby enabling the people of that country (or more precisely a small segment of the people in that country) to live at the expense of the rest of humanity. This rigged printing system debases the US dollar after it is spent by the small but powerful few who control its supply. This act robbery is called inflation and year on year it systematically robs all nations and people who have to hold wealth in the US dollar.
We know this absurd privilege is jealously guarded – hence the almost permanent wars in the Middle East and the ceaseless mainstream media propaganda of ‘Terror’ that accompanies the drums of war. This despicable system can only be described as a protection racket. The fact that this system is all encompassing – excluding only a very limited number of jurisdictions – is frightening dystopian nightmare.
We are here because we regret a system of financial repression that enslaves most of humanity by requiring them to accept worthless paper promises issued by their respective elites in exchange for their daily hard work. Or requires them to borrow at extortionate interest rates this same worthless fiat.
We are here because we regret the fiat money system. A system that prints money at will – gifting it into an extremely small group of financial institutions for them to exercise control over us. A system that prevents saving, that creates an artificial illusion of scarcity when we could so easily have a system of abundance, based on sound money.
If only we could overthrow the small coterie of corrupt elites – the ungodly alliance between the money-printing cartel (the banks centred around the BIS) and the military-industrial complex (the mercenaries of death centred around Washington and the Pentagon).
What gives them the power to control us? Money. Their control of money and the political narrative around money. Their use of our sheep-like behaviour in meekly accepting their worthless paper promises. Their use of the welfare state to buy acquiescence, to issue small bribes on a continuous basis in order to maintain the calculus of consent. Our craven willingness, imbued from birth and relentlessly drilled into us every day at school, to accept the boundaries of consciousness set by the state and surrender all faculties of critical thinking.
Hence bitcoin. Hence crypto. Bitcoin (and its ancillary protocols) is devised to be everything that fiat money is not. It is deflationary where the existing system is wildly inflationary. It is an anchor in a safe harbour whilst the existing system demands that we should be permanently at sea and should never find rest. It demands personal responsibility and self-actualisation while the existing system encourages childish selfishness, endless self-indulgence and a culture of entitlement. It is permissionless and free where the existing system is weighed down by command and control and the Kafkaesque tyranny of “compliance.” It is non-political and decentralised whereas existing currencies are political and are thereby used as a means of financing war and suppressing dissent.
We aim to cast off the fetters of fiat and save humanity from the existing system of slavery which masquerades as progressive liberalism. We aim to dispossess the banks and the mercenaries of death. We aim to be free.
Welcome to the revolution.
submitted by CryptoGlobe to Bitcoin [link] [comments]

Unprovoked Leftist Violence The Media Ignores

We must never allow political violence to take root in America

The MSM has ignored most of this violence, in some cases even defending the movements responsible. If it bleeds, it leads, except when it is the blood of AntiFA's victims?
There are over 25 attacks included within.
Let's make sure our fellow citizens make an informed decision.
Sharing:
I researched all of the attacks in the compilation to ensure they were unprovoked. I read witness statements, watched hours of surrounding videos, spoke to a couple of the victims, read AntiFA after-action reports/threads, etc. I made a good faith effort to ensure that in every case it was clear that at least one of the following criteria applied.
Criteria
The compilation is deeply disturbing & I've watched it change people's minds. The problem of course is that it's hard to get people to watch a video when they know they won't like the implications of it.
For that reason I've also written up textual descriptions of a subset of the attacks that don't require much or any additional context to know they are absolutely unacceptable.
People have a harder time ignoring a block of text than they do just refusing to click a link. So I encourage you to share the video and to copy & paste the descriptions as needed.
Text Descriptions
These are just a few of the victims who are doing absolutely nothing threatening, or who clearly no longer pose any threat (if they ever had):
Caveats

#JobsNotMobs


from u/onewalleee
submitted by SuperCharged2000 to EducatingLiberals [link] [comments]

Unprovoked Leftist Violence The Media Ignores

We must never allow political violence to take root in America

The MSM has ignored most of this violence, in some cases even defending the movements responsible. If it bleeds, it leads, except when it is the blood of AntiFA's victims?
There are over 25 attacks included within.
Let's make sure our fellow citizens make an informed decision.
Sharing:
I researched all of the attacks in the compilation to ensure they were unprovoked. I read witness statements, watched hours of surrounding videos, spoke to a couple of the victims, read AntiFA after-action reports/threads, etc. I made a good faith effort to ensure that in every case it was clear that at least one of the following criteria applied.
Criteria
The compilation is deeply disturbing & I've watched it change people's minds. The problem of course is that it's hard to get people to watch a video when they know they won't like the implications of it.
For that reason I've also written up textual descriptions of a subset of the attacks that don't require much or any additional context to know they are absolutely unacceptable.
People have a harder time ignoring a block of text than they do just refusing to click a link. So I encourage you to share the video and to copy & paste the descriptions as needed.
Text Descriptions
These are just a few of the victims who are doing absolutely nothing threatening, or who clearly no longer pose any threat (if they ever had):
Caveats

#JobsNotMobs


from u/onewalleee
submitted by SuperCharged2000 to conspiracyundone [link] [comments]

Unprovoked Leftist Violence The Media Ignores

We must never allow political violence to take root in America

The MSM has ignored most of this violence, in some cases even defending the movements responsible. If it bleeds, it leads, except when it is the blood of AntiFA's victims?
There are over 25 attacks included within.
Let's make sure our fellow citizens make an informed decision.
Sharing:
I researched all of the attacks in the compilation to ensure they were unprovoked. I read witness statements, watched hours of surrounding videos, spoke to a couple of the victims, read AntiFA after-action reports/threads, etc. I made a good faith effort to ensure that in every case it was clear that at least one of the following criteria applied.
Criteria
The compilation is deeply disturbing & I've watched it change people's minds. The problem of course is that it's hard to get people to watch a video when they know they won't like the implications of it.
For that reason I've also written up textual descriptions of a subset of the attacks that don't require much or any additional context to know they are absolutely unacceptable.
People have a harder time ignoring a block of text than they do just refusing to click a link. So I encourage you to share the video and to copy & paste the descriptions as needed.
Text Descriptions
These are just a few of the victims who are doing absolutely nothing threatening, or who clearly no longer pose any threat (if they ever had):
Caveats

#JobsNotMobs


from u/onewalleee
submitted by SuperCharged2000 to CoincidenceTheorist [link] [comments]

Unprovoked Leftist Violence The Media Ignores

We must never allow political violence to take root in America

The MSM has ignored most of this violence, in some cases even defending the movements responsible. If it bleeds, it leads, except when it is the blood of AntiFA's victims?
There are over 25 attacks included within.
Let's make sure our fellow citizens make an informed decision.
Sharing:
I researched all of the attacks in the compilation to ensure they were unprovoked. I read witness statements, watched hours of surrounding videos, spoke to a couple of the victims, read AntiFA after-action reports/threads, etc. I made a good faith effort to ensure that in every case it was clear that at least one of the following criteria applied.
Criteria
The compilation is deeply disturbing & I've watched it change people's minds. The problem of course is that it's hard to get people to watch a video when they know they won't like the implications of it.
For that reason I've also written up textual descriptions of a subset of the attacks that don't require much or any additional context to know they are absolutely unacceptable.
People have a harder time ignoring a block of text than they do just refusing to click a link. So I encourage you to share the video and to copy & paste the descriptions as needed.
Text Descriptions
These are just a few of the victims who are doing absolutely nothing threatening, or who clearly no longer pose any threat (if they ever had):
Caveats

#JobsNotMobs


from u/onewalleee
submitted by SuperCharged2000 to NewsPlace [link] [comments]

SCAMMER CAUGHT ON CAMERA - YouTube Prevention of Robbery attempt at ATM Sans limites TV - YouTube 1986 Superman Celebration Bank Robbery Robbery Prevention

Robbery Prevention. As a money services business, you may be known as a place to take money, a place to get money, or as both. Either way – your business is known to have cash and is a more likely robbery target than businesses that are not cash intensive. Victims of Britain's first Bitcoin heist are hiding at secret address after masked men held crypto-currency trader at gunpoint. Armed robbers stormed £800,000 barn house in village Moulsford ... With bitcoin gaining huge media coverage as well as market cap, its no wonder that bitcoin scams are everywhere. Find out about the scams that are taking place and how to spot and avoid them. Bitcoin Security: protect your cryptosystems with our tips. Protect your bitcoins with three simple Binance recommendations The first of the scenarios that can compromise you when it comes to protecting your bitcoins is impersonation. In this type of attempt, the criminal pretends to be an expert in investments, trade and even a popular influence of the cryptosystems. With this mode, given the ... A robbery is one of the most serious and potentially dangerous crimes committed in South Africa today. A robber commits a holdup because he or she believes that their profit will be worth the risk. By decreasing the possible profit and increasing the risk of apprehension, potential victims can reduce their chance of becoming a target.

[index] [13171] [48314] [44858] [33635] [42373] [47153] [27915] [16823] [32516] [9276]

SCAMMER CAUGHT ON CAMERA - YouTube

Links To Sources: Cop: https://www.facebook.com/watch/?v=519882248822591 Pot Hole: https://www.youtube.com/watch?v=yXKglt_mkg8 Microburst: https://www.youtub... Power of Technology - Our team has successfully prevented Robbery attempt on ATM of Gurgaon , NCR from our Mumbai monitoring Center ....Through E-surveillance .Where remotely live footage can be ... Chaine d'information Sans Limites TV éditée par le Groupe GSL Communication, Ouest Foire Dakar ( Sénégal ) Directeur de Publication : Yankhoba SANE SERVICE C... Anti-Robbery Tips. Anti-Robbery Tips. Skip navigation Sign in. Search. Loading... Close. This video is unavailable. Watch Queue Queue. Watch Queue Queue. Remove all; Disconnect; The next video is ... This is Altcoin news, from the world of Cryptocurrency. Today we look at Australia to pledge creation of price stable gold-backed cryptocurrency. Bitcoin price prediction for the end of 2018 from ...

#