What is Bitcoin? Price in USD, Mining, Bitcoin wallet ...
What is Bitcoin? Price in USD, Mining, Bitcoin wallet ...
Bitcoin Mining Pool Bitcoin.com
Main Page - Bitcoin Wiki
Bitcoin - The Currency of the Internet
A community dedicated to Bitcoin, the currency of the Internet. Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics. A large percentage of Bitcoin enthusiasts are libertarians, though people of all political philosophies are welcome.
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
Monthly Update: Parachute Social Liquidity Pools, Ivan(OnTech) Joins as Advisor, Townhall, Trending on CoinGecko, Covered by EllioTrades Crypto + Altcoin Buzz, …– 31 Jul – 3 Sept'20
Hola folks! Yesterday we got caught up with everything that happened in July 2020 at Parachute and ParJar. Today, I will be sharing news from August. Looking back at those five weeks, they were easily one of the most action-packed ones in the Parachuteverse ever. If you missed my note about the new format from yesterday: “…I thought it would be best to club all the Parachute news into monthly reports and publish them back-to-back over the next few days to catch up with the latest…For a change, we will be focusing on Parachute + ParJar news alone in these monthly reports. Because if we include news from our partner project in these, we might as well publish the Encyclopaedia Britannica”. In case you thought yesterday’s was a long read, boy are you in for a shock today. Make sure to get yourself a beverage and set aside an hour to go through all that will follow. So here’s goes the Parachute scrolls dating 31-Jul-20 to 3-Sept-20 – 31 Jul – 6 Aug'20: $PAR became one of the top trending coins on CoinGecko this week. The token also received a perfect score on DEXTools. Pretty sweet! We crossed 2500 members in the Parachute channel after quite a while. But no sign of Ron yet. Haha. BrainiacChess Network ($CHESS) was added to ParJar. We got a surprise listing on Hotbit ourselves with an ETH and BTC pairing. $PAR was listed on CoinW exchange this week too. More details here. Looks like wrapping up a day at Parachute usually ends with steaks. If you ever thought otherwise, a look at the $PAR contract should dispel that doubt. A community vote was opened up to list the next token on ParJar. Congratulations to Chirag for winning this week’s Parena and taking home 6k+ $PAR. Neat! Everybody knows about the bitcoin pizza. But did you know about the bitcoin burger? Read all about AlBundy185's crazy BTC journey here. What a wild ride indeed! AlBundy185’s BTC ride has to be a stuff of legends Pic of Gian with Diamond Dallas Page taken from his epic WCW Thunder story (https://t.me/parachutetokengroup/395125). Spooky sent us! Gian announced a temporary stoppage of Two-for-Tuesday to make way for the second annual Big Brother contest. Soon after, he opened up entries for the contest. Woot! Fans can also get updates and spoilers from the GC’s BB group. Gamer Boy hosted a “Random Gk” trivia in TTR this week. Naj hosted a Sunday “Mega Trivia”. Afful held a “General knowledge” trivia as well. Sebastian shared the new ParJar Gaming schedule for August. Yes, you read that right. 75k $PAR in the monthly prize pool. Woot! For this week's Friday creative prompt (#nottodaycovid) by Jason, Parachuters talked "about what you are doing to keep yourself sane during the pandemic" for some cool $PAR. Alejandro’s betta fish collection is a sight for sore eyes Elmar, these are all amazing! Model ships made by Bada during the lockdown. Awesome! Ivan (from Ivan on Tech) joined the Parachute channel this week. Looks like next few weeks are going to be super exciting! Doc Vic hosted a flash game in the Parachute War Zone for some cool $PAR prizes. Mario had an interesting idea. Change the ParJar display name to “ParJar Wallet” to actually reflect the true nature of ParJar. And voila! “ParJar” is now “ParJar Wallet”. Instant feedback implementation! We also finally got an unofficial price chatter group running. As we mentioned in the last update, Clinton released a limited edition shirt in the Parachute Store this week to commemorate the Liquidity Program on Uniswap. Some of the Parena merch had to be sunsetted from the store though. So if you grabbed some before that, you are now the proud owner of rare Parena merchandise. James from the Parachute Athletics and Running Club announced a Secret Challenge for 400 $PAR. Cap shared a sneak peek into what’s brewing behind the scenes. He also posted some experimentalvisuals for the website and for ParJar: Cap’s creative spurts are super trippy! Pt. I Trippy creatives from Cap Pt. II 7 Aug – 13 Aug'20: ParJar did some heavy lifting on behalf of Uniswap this week when Uniswap got clogged but ParJar swaps were running smoothly. If you haven’t seen how swaps work yet, CF made another cool video tutorial. Following last week’s community vote, Enjin ($ENJ) won a spot to become the next swappable token on ParJar. DMM DAO’s $DMG token was listed on ParJar as well. Inputs from the community were taken for listing the next DeFi token on ParJar. A new tier was added for the Parachute Uniswap Liquidity Rewards Program this week. Last week’s incredible Parachute run on CoinGecko was noticed by many including DAO Maker and Blockfyre. We got word that Parachute was featured in Ivan’s (Ivan on Tech) private report meant for his closed group of subscribers. Word on the street is that Parachute was reviewed in detail in the Hidden Gems section of the report and received the highest score among all the projects covered there. Super cool! He also talked about Parachute in his latest video. Watch out for timestamps 42:23 and 47:48. And followed it up with another mention in next day’s video as well. Pretty cool! $PAR also saw some crazy movements and activity. And all this started while Cap was chilling on an Amtrack on his way to Vermont. Haha. Cap shared this amazing view from Vermont Check out the Sentivate gear in the Parachute shop. For this week's creative prompt (#donkeyart), Jason had Parachuters "find an image of a piece of art that particularly moved" them and explain how and why. Darren’s Mega Friday Trivia in Tiproom had a sweet 6300 $PAR prize pot. Peace Love (Yanni) hosted another quiz in TTR with some more cool $PAR prizes. Clinton’s charity For Living Independence (FLI) became Lumenthropy’s spotlight charity this week which means they will be matching all $XLM donations to FLI. Lumenthropy is Stellar’s charitable arm. The entries to Gian's Big Brother Contest closed this week with Gian starting to share updates on episodes and $PAR rewards to weekly winners. If you want to catch all the action, head over to the BB Group set up by GC. And the most amazing thing happened this week – As new folks were joining into the Parachute group, someone named Ender Wiggin chimed into the chatter and as we talked we figured that he was not only Cap's neighbour in NYC but was also my school senior. Parachute truly brings the world together! PARs & Recreation wants to create a Parachute foodies group. And if his posts are anything to go by (figs, blueberries, Ikura), it’s going to be a hunger-inducing channel. Doc Vic (from Cuba) announced the start of a team Deathmatch tournament in the Parachute War Zone. Congratulations, Clinton! Looks like an epic ParJar video is underway. Parachute was also covered extensively by EllioTrades Crypto this week. YouTuber CM TopDog too made an awesome video on Parachute where he talked at length about the project, the roadmap, the token and more. Saweet! After seeing Albundy185 struggle with pooling on Uniswap, Cap and Ice had a light bulb moment for an entirely new feature on ParJar that would make pooling social and fun. More details to be released over the next few weeks. Jose’s epic new gif puts Cap’s lightbulb moment about social pools into perspective :D Looks like Alexis’ neighbour is into Uniswap pools as well. Get it, get it? Haha Congratulations on the new store, Hang! Folks who don't know, Hang is building a hempire. World domination next 14 Aug – 20 Aug'20: As mentioned last week, Cap and crew had something cool brewing for folks who pool assets on Uniswap. Presenting Social Liquidity Pools (SLP) by Parachute. No more pooling/staking alone in silos. Get together with others doing what you love most – pool assets on Uniswap (either directly or through ParJar - upcoming), then stake the received liquidity tokens into SLPs on ParJar to get additional rewards and social bonuses like entry into VIP or premium token curated groups. Making Uniswap social! Click here to read about what’s next for ParJar and Parachute. The first Uniswap $PAR Liquidity Pool Rewards Program came to a close. All qualified poolers will receive their rewards in 2 months. DeFi superstar yearn.finance ($YFI) was added to ParJar this week for both sends/tips and swaps. Woohoo! Waifu in the house. After last week’s community inputs regarding the next new token on ParJar, a public vote was started. Uptrennd founder Jeff Kirdeikis’ latest project, TrustSwap ($SWAP), got listed on ParJar after winning that vote which got a shoutout from Ivan as well. So now we have a tongue twister on our hands. Haha. Cap also shared the first hints about $PAR governance. More details to be posted next week. Plus, Cap announced that he will be hosting a townhall next week. Stay tuned! Get your questionnaire ready. Like last week, Parachute chatter popped up in Ivan’s latest video this week as well. Dang! What an amazing place, Victor For all the mobile gamers out there, Tony set up a Parachute Corporation for the EVE Echoes game. Hit him up if you want to join. Naj hosted a Sunday TTR trivia with a 6300 $PAR prize pot. Gamer Boy held one as well. Darren’s Mega Trivia in Tiproom was super fun as always. Jason did an impromptu token giveaway so that fellow collectors could complete their ParJar collection followed by a mini contest to "guess the closest to the number of miles I am about to run" for some cool $PAR. Chris hosted this week’s creative Friday prompt (#adminfunday): “Using the profile image of any Parachute admin as inspiration, draw what you think that admin would like to do on the weekend”. And what an amazing video Hans (Pad of DeFi Chad). Haha! Super hilarious and fun. Some of the radest #adminfunday entries. Clockwise from top left: Skittish, TyReal, Staph It!!, Yosma, Ik Now, Jeff, Chica Cuba, Jhang, Kuuraku 21 Aug – 27 Aug'20: Ivan (from Ivan On Tech) joined Parachute as an advisor. Woot! Welcome to the Parachute fam. Here’s a sneak peek into what the first day discussions with Ivan as an advisor revolved around. The project got featured in France’s largest crypto news platform, Journal du Coin. Noice! Click here for the English translated version. As mentioned earlier, Cap hosted a townhall this week. If you missed it, you can catch up here. He also shared a rough draft snapshot of “how the governance and fee distribution contracts could look for ParJar Wallet”. Plus, some updates from this week and a big picture view at what staking liquidity through ParJar could look like. Parachute also got mentioned in another of Ivan’s videos this week. Snapshot from the Parachute Townhall In partnership with Sentivate, ParJar distributed $SNTVT tokens this week to 1500 people of whom 800 were new users. Sentivate hosted this drop for members of a specific group as a token of appreciation for their support. Reminiscent of the AMGO drop, this was a precursor of “how PAR drops + other token drops could work for our Social Liquidity pooling”. The $PAR Governance whitepaper was released and initial brainstorming started in the tokenomics group. Cap was also interviewed by YouTuber Money Party (@Edward_F) this week to talk at length about where we are at and where we are heading. We also received a super duper shoutout from CryptoTube in his latest video where he did a deep dive into ParJar and Parachute. Thanks a ton! Cryptovator did a cool feature on the project as well. Cap added more changes to the site to show: \"ParJar wallet in action along with…the integrations\" + Big Picture In this week's creative contest, Jason put up a #writingprompt: "...imagine you are a brand new intern at my new mega corporation...Today is your first day and you are told you need to present something about crypto to upper management...all you know is Bitcoin is a thing and some vague information about it. Pick a coin or general crypto subject and write a short story...None of the facts or material can be correct in your presentation...". Haha! After helping fellow Parachuters with their ParJar collection last week, Jason set up a collector’s group this week. If you have more than 30 of the coins/tokens listed on ParJar in your @parjar_bot collection already, send Jason a PM and he will get you in. Victor hosted a “Big Trivia” in TTR this week for 6300 $PAR in prizes. Afful held a quiz in Tiproom on “General Knowledge” as well. Check out these wicked new shorts in the Parachute Store based on Jose’s gif. Epic stuff, Jose! Haha Nice haul from the Parachute Beer Exchange, CF! Markus did you a solid Boldman Stachs pointed out that $PAR had the highest Galaxy Score on social media analytics platform LunarCRUSH this week. Pretty neat! CF took note. And like Cap mentioned, it has mostly been thanks to him. Haha. And big up to Jesús (@JALBARRAN02) for making a ParJar guide video for our Spanish crew. You rock! Interesting results from the DeFi survey: majority of crypto folks are still DeFi-curious. A new community vote was thrown open for listing the next DeFi token on ParJar. Anyone who's been around a bit already knows that Clinton does some amazing work at his charity, For Living Independence, which creates assistive technology for disabled individuals. This week he shared some snaps of a build which now enables a lady in a wheelchair get upstairs in her home. This is so wholesome, Clinton! Thank you for doing what you do. 28 Aug – 3 Sep'20: ParJar was featured in Altcoin Buzz’s latest video. Noice! Click here and here to read some recent updates from Cap. After winning last week’s vote, Akropolis ($AKRO) became the latest token to be listed on ParJar. Woot! bZx crew gave some serious competition too. So we had to get them on ParJar as well. $BZRX was listed this week right after $AKRO. $PAR now has 7k on-chain HODLers. Saweet! Sentivate will be our first partner project to have a Social Liquidity Pool on ParJar. This is amazing! Time for another community vote to get a new project listed on ParJar – this time it is DeFi Pie v/s Ren v/s Proxi DeFi v/s Others. If you’ve missed all the latest Parachute-related videos, we have your back. Check this tweet thread to catch up. Naj hosted a Saturday Tiproom Trivia for 6300 $PAR in prizes. Congratulations to Maria for winning the latest Parena. 8k $PAR in the bag. Woohoo! And congo rats to Yanni as well for winning a special edition shirt from the Parachute store. Gamer Boy’s Big Trivia in TTR saw a ton of participation as always. The Parachute Fantasy Football contest is back! Chris set up the entry rules this week. CF has done wonders for Parachute’s social metrics: “..+500% in our fi(r)st marketing month..” Whew, what a month! And with that we close for August 2020 @ Parachute/ParJar. See you again with one more epic monthly update tomorrow. Cheerio!
Checker Thread (A list of hacked clients for easy reference)
Community contribution is the only way this thread will be useful. This is a WIP! More clients will be added as time goes on! Quick note: The vast majority of these are files supplied by the community -- some may not work. The person who sent me 9b9t says it doesn't work, but I have not personally tested. Please let me know if it works or does not work. Some additional notes: I am open to community criticism so long as it can actually be used to benefit the thread. Issues with formatting, approach, client choice, etc. are all great things to come talk to me about so I may improve. However, people keep commenting the same things over and over and over — “VirusTotal can’t catch X” is a popular one — and I don’t have time to deal with it. If you have a security concern, you are more than welcome to raise it. HOWEVER, do not make unreasonable requests of me — I work, in addition to that I have a social life, I have responsibilities at home as well. This is a side thing that I do when I have the time. A lot of people have suggested looking through bytecode to determine if a client is malicious. I do not have the time to do this for every client. If you are willing to help and do more than say “you should do more than you already are, even though you have a job and a life outside of an obscure subreddit,” feel free to DM me. People who take the broken record approach and say things that are already covered in the thread, or refuse to offer help and just post complaints, will be blocked and ignored. I’m all down for making this post better, but I’m not gonna waste my time with people who won’t work with me. Thank you for your help! BIG THANKS TOu/jpie726FOR HIS MASSIVE CONTRIBUTIONS! WITHOUT HIM THIS LIST WOULD BE SIGNIFICANTLY LESS EXPANSIVE. GO UPVOTE THIS MAN INTO HEAVEN, HE DESERVES IT! Eventually I would like to make a Python script that takes care of all the necessary tasks to install these clients. Python itself is available through theWindows Storeas well as on Python's website, or through various other installers. It will install any additional dependencies via Pip and will use Curl to retrieve the files. Anyone interested in helping with this script is more than welcome to do so, if you wish. The two options for assisting me would be as follows: 1. You can install Visual Studio Code or Atom and work with me directly through those applications (more details soon™) 2. A GitHub page may be made and you could submit pull requests through that and edit the script alone. ####################################################################### There is a misconception that I am only here for free paid clients. 1. I can't use a paid client unless I have access to a cracked version, an account, and the HWID bound to said account. 2. People are also saying there's a way for clients to track if someone leaks them. While I suppose this is possible if they bothered to put in the absurd amount of effort it would take, it would give them no benefit and it would do no good as I am not running the software on my desktop -- I am sending the software to VirusTotal, grabbing the SHA-256 checksum, and deleting the file. 3. If all you're going to do is post that "VirusTotal can't catch x" or "muh client" do not waste my time, and don't waste yours. You will be ignored in favor of people who will actually help me construct what I hope to be a megathread for this subreddit, FOR YOU GUYS. I mean jeez, someone's trying to help and half the fucking responses are "muh client" like come on. No wonder this fucking subreddit is dead, sheesh. If someone's trying to help you and you just step on their toes that's just not very cool, not everyone is trying to scam you. I do just be trying to help people who come here doe. 4. If you have concerns, raise them respectfully. Do not attack me, you will be ignored or if I feel so inclined I will give you 110% of the shit you give me right back to you. I will answer questions, I will elaborate on my goals, I will takehelpfuladvice. Everything else will be outright ignored, and misinformation will be countered. That is all, thread below. ####################################################################### I named this the Checker Thread to make it easy to search for in the subreddit. Enjoy.Below will be a list of hacked clients, with VirusTotal links, SHA-256 hashes, direct download links (skipping ad pages) and eventually features for each client. I'd also like to add what servers they do and don't work on, but I need the community to help with that. The only client I use is Impact, send me additional clients in the comments and they will be added to this list. Note about SHA-256 hashes: SHA-256 hashes are a hash of a file produced algorithmically. This type of hash was developed by the United States National Security Agency, and is typically used to verify that files are what they are supposed to be. Widely used in cryptographic applications such as SSH, APT repositories, transactions on websites, verifying files, Bitcoin, and more. It is very common. This type of cryptographic hash has been in use since 2001. An SHA-256 hash will be the exact same for the same file regardless of the source of the file, so if your hash is different from the one listed here you do not have the legitimate installer OR the hash is not up-to-date. Note about VirusTotal tests: Several people have pointed out to me something I feel should be brought up in the main thread. VirusTotal is not a catch-all, just as your typical antivirus software is not a catch-all. It will not catch everything. It should be used as a general guideline only. Clean VirusTotal tests do not guarantee your safety, although if the program passes all ~70 or so antivirus engines it's probably safe to use. Any additional malicious activity should be caught by your antivirus program's heuristics. I take no responsibility for anything that is malicious, but I can say in good conscience that I have done everything I can to ensure that everything on this thread is safe. Keep in mind that programs that trip VirusTotal may still be safe to use, antivirus programs often pick up injectors as malware or Trojans because that's how those types of viruses behave in the real world. Use your best judgement. If your best judgement is not good enough, do not use these programs. You have been warned. ----- C --- L --- I --- E --- N --- T--- S ------ C --- L --- I --- E --- N --- T--- S ------ C --- L --- I --- E --- N --- T--- S ----- Impact | 1.11.2 to 1.15.2 | Java Edition VirusTotal Link for *.exe Installer | VirusTotal Link for *.jar Installer SHA-256 Hash: 4EAFFB99759FBD949D0FBEF58AE9CEB45CE8CA2B0D7DC22147D4FF0E46F010EC Impact triggered 0/72 engines on both installers. Direct Link to Impact's *.exe Installer | Direct Link to Impact's *.jar Installer ------------------------------------------------------------------------------------------------------------------------------------------------ Sigma | 1.8 to 1.16 | Java Edition VirusTotal Link for *.jar Installer | VirusTotal Link for the *.zip the Installer is Contained In SHA-256 Hash for the *.zip file: 3FCD397849358522BF0EEEAF117487DBA860919900A904551DF512BE2C34B48C Sigma's *.zip file triggered 0/59 engines on the *.zip file. Sigma's *.jar file triggered 0/60 engines on the *.jar file. Direct Link to Sigma's *.zip File that Contains the Installer ------------------------------------------------------------------------------------------------------------------------------------------------ 9b9t | 1.12.2, needs testing | Java Edition | Forge Mod VirusTotal Link for the *.jar Forge Mod SHA-256 Hash: 30E4F2778688D54CE7992AFDE509460A7BDDBDA77800219083D4D12BC696EEA0 9b9t triggered 0/60 engines. AnonFile link to 9b9t's *.jar Mod ------------------------------------------------------------------------------------------------------------------------------------------------ Ingrosware | 1.12.2 | Java Edition | Forge Mod VirusTotal Link for the *.jar Forge Mod SHA-256 Hash: BD1A0F9079F4C834A251163C3A0ECBFF7DFC28AB00CF1C74008AADD042FAD358 Ingrosware triggered 0/59 engines. AnonFile link to a pre-built *.jar Mod Note: Ingrosware is open source, and is available on GitHub. If you want to build it yourself, you can do sohere. ------------------------------------------------------------------------------------------------------------------------------------------------ Mercury | 1.12.2 | Java Edition | Forge Mod VirusTotal Link for the *.jar Forge Mod SHA-256 Hash: 70E585A94218149970410ACAE5BE7C1C1B731140F1AF55FE2D1292B1CA74DCB9 Mercury triggered 0/60 engines. AnonFile link to Mercury's *.jar Mod ------------------------------------------------------------------------------------------------------------------------------------------------ Atlas | 1.12.2 | Java Edition | Forge Mod | Use with caution! VirusTotal Link for the *.jar Forge Mod SHA-256 Hash: 7AEB7220CBD5D7C4E4421A940357F14EC70B18DB905469E288529FE3A2C04D57 Note: The file is called AceHackGold-n3.0-release.jar in VirusTotal. The client is identified as Atlas in the .nfo file it came bundled with. Atlas triggered 7/59 engines. Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe,use with caution. AnonFile Link for the *.jar Mod Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. Note 2: The file downloaded is called AceHackGold-n3.0-release.jar*, I'm not sure why. This file was community-sourced, but it has been inspected in the same manner as all the others*. ------------------------------------------------------------------------------------------------------------------------------------------------ Atom | 1.12.2 | Java Edition | Forge Mod | Use withextremecaution! VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: 3B43F952EB5B14F2B01592057B27E92B0E38B6874EA10B8E893BFCBC71463377 Note: The file is called output.157312297.txt in VirusTotal. In addition, VirusTotal identifies the file type properly (\.zip).* Atom triggered 9/59 engines. Note: Upon closer inspection of the VirusTotal scan, the client accesses numerous registry keys, which is a behavior I personally would consider to be unnecessary and incredibly suspicious. You can find more information in the VirusTotal scan. The client also exhibits typical Trojan false-positives. AnonFile Link for the *.zip File Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. Use this client with extreme caution. There are behaviors that I consider to be extremely suspicious, you must determine for yourself if it's safe to use however. This may just be how the client works. I do not know, and I can't be bothered to test it. ------------------------------------------------------------------------------------------------------------------------------------------------ Aurora | 1.12.2 | Java Edition | Forge Mod VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: 9A66929B629AB076383340D33E0EF9B8CE221679EF79315240EA6C760651A533 Aurora triggered 0/61 engines. AnonFile Link for the *.zip File Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. ------------------------------------------------------------------------------------------------------------------------------------------------ CandyCat | 1.12.2 | Java Edition | Forge Mod | Use with caution! VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: 8CEC2F9F28AA3957504E0CC66BF1516080C7BAC50EADB54DC6DD97E0E6E9C745 CandyCat triggered 9/61 engines. Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe,use with caution. AnonFile Link for the *.zip File Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. ------------------------------------------------------------------------------------------------------------------------------------------------ DayNightGod | 1.12.2 | Java Edition | Forge Mod | Use with caution! VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: 9CEEB43476B18149C0DA76B7AE94713AAF60ED4D2BFD2339E863CC46A1808A0D DayNightGod triggered 1/59 engines. Note: Upon closer inspection, only one engine was triggered. The client did not trigger the usual false-positives of a Trojan, use with caution. AnonFile Link for the *.zip File Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. ------------------------------------------------------------------------------------------------------------------------------------------------ HyperLethal | 1.12.2 | Java Edition | Forge Mod | Use with caution! VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: 77FACC1FDB0415438963CCC8DDB4081958563AAA962CE9C024E5063DA32E8FAD HyperLethal triggered 2/59 engines. Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe,use with caution. AnonFile Link for the *.zip File Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. ------------------------------------------------------------------------------------------------------------------------------------------------ LoveClient | 1.12.2 | Java Edition | Forge Mod | Use withextremecaution! VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: C71EC42FF612D75CB7AA21B8400D164A74AAD9BB65D2DFEE232461DAF98034C2 LoveClient triggered 9/61 engines. Note: Upon closer inspection of the VirusTotal scan, the client accesses numerous registry keys, which is a behavior I personally would consider to be unnecessary and incredibly suspicious. You can find more information in the VirusTotal scan. The client also exhibits typical Trojan false-positives. AnonFile Link for the *.zip File Use this client with extreme caution. There are behaviors that I consider to be extremely suspicious, you must determine for yourself if it's safe to use however. This may just be how the client works. I do not know, and I can't be bothered to test it. ------------------------------------------------------------------------------------------------------------------------------------------------ SnowHack | 1.12.2 | Java Edition | Forge Mod VirusTotal Link for the *.zip the Forge Mod is Contained In SHA-256 Hash: 7100C8D59CE06B279F7D03D834FC2C361F10BEAE913575FC7EFA74E498167D2C SnowHack triggered 10/62 engines. Note: Upon closer inspection of the VirusTotal scan, the client appears to be of the injected flavor. Injectors are commonly a false positive Trojan. The client appears to be safe, and there was nothing particularly noteworthy in the VirusTotal scan that is atypical for an injector. While this makes the file appear to be safe,use with caution. AnonFile Link for the *.zip File Note: This is a cracked client! The crack is pre-done, so no additional work is required to use -- just put it in your Forge Mods folder and click play. ------------------------------------------------------------------------------------------------------------------------------------------------
Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!
If you know of a scam that is not covered here, write a comment and it will be added to the next edition.
Caller ID spoofing It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you. Email spoofing The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created. SMS spoofing SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.
The most common scams
The fake check scam (Credit to nimble2 for this part) The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
The scammer sends you a very real looking, but fake, check. Sometimes they'll call it a "cashier's check", a "certified check", or a "verified check".
You deposit the check into your bank account, and within a couple of days your bank makes some or all of the funds available to you. This makes you think that the check is real and the funds have cleared. However, the money appearing in your account is not the same as the check actually clearing. The bank must make the funds available to you before they have cleared the check because that is the law.
For various and often complicated reasons, depending on the specific story line of the scam, the scammer will ask you to send someone some of the money, using services like MoneyGram, Western Union, and Walmart-2-Walmart. Sometimes the scammer will ask for you to purchase gift cards (iTunes, Amazon, Steam, etc) and give them the codes to redeem the gift cards. Some scammers may also give you instructions on how to buy and send them bitcoins.
Within a couple of weeks, though it can take as long as a month, your bank will realize that the check you deposited was fake, and your bank will remove the funds that you deposited into your account and charge you a bounced check fee. If you withdrew any of the money from the fake check, that money will be gone and you will owe that money to the bank. Some posters have even had their bank accounts closed and have been blocked from having another account for 5 years using ChexSystems.
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent. Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it. Bitcoin job scams Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins. Email flooding If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere. Cartel scam You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty. Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse. Employment certification scams You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist. Craigslist fake payment scams Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule. Craigslist Carfax/vehicle history scam You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it. Double dip/recovery scammers This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam. General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter. Credit card debt scam Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement. The parcel mule scam A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods. The Skype sex scam You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious. What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account. The underage girl scam You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer. What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money. Phishing Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious. The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/ PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/ Sugar scams Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on. Google Hangouts Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution. Publishers Clearing House scams PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH. Pet scams You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example) If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down. Thanks to djscsi for this entry. Fake shipping company scams These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible. Chinese Upwork scam Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people. Quickbooks invoice scam This is a fake check style scam that takes advantage of Quickbooks. The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam. The blackmail mail scam This is very similar to the blackmail email scam, but you will receive a letter in the mail. Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse. Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on. Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum. Man in the middle scams Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to. Digit wallet scam A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds. Cam girl voting/viewer scam You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories. Amateur porn recruitment scam You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer. Hot girl SMS spam You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card. Identity verification scam You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to. This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website. Multi Level Marketing or Affiliate Marketing You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.
You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls. Tax Call You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world. Warrant Call Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards. [Legal Documents/Process Server Calls] Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number. Student Loan Forgiveness Scam Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program. Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam. Chinese government scam This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats. Chinese shipping scam This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators. Social security suspension scam You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information. Utilities cutoff You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin. Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same. Mexican family scam This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help. General family scams Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money. One ring scam Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.
Online shopping scams
THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is. Dropshipping An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer. Influencer scams A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products. Triangulation fraud Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer. Instagram influencer scams Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time. Cheap Items Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off. Cheap Amazon 3rd Party Items You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam. Scams on eBay There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month. Scams on Amazon There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items. Scams on Reddit Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online. Computer scams Virus scam A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.
Chinese Brushing / direct shipping If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings. Money flipping Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.
How to buy Bitcoin and Deposit on Roobet Full Tutorial
Hello! In this thread I will do my very best to explain how to purchase Bitcoin safely and deposit it onto Roobet.com ! If anything is too confusing or you need further instructions feel free to message a mod for help!Be very aware of other users offering to sell you bitcoin or purchase on your behalf.If you are new to Bitcoin in general I strongly recommend watching this quick video on the basics of bitcoin safety https://www.youtube.com/watch?v=2z2xggmeW1AAfter you have watched that or you already understand bitcoin skip to down below! Buying Bitcoin Step 1 Chosing an exchange Ok so you want to buy bitcoin to play on roobet? No problem! Bitcoin is super easy to use once you understand it! The first thing you need to do is pick an exchange to purchase from. I would recommendcoinbaseas it is a very large and trusted exchange.If coinbase does not work in your region then I would recommendBinance The last option if buying online doesn't work would be a local Bitcoin ATM use google to find one close to you. Step 2 Signing up -coinbase Sign up using https://www.coinbase.com/join/carava_zo to get a bonus 10$ btc on your first purchase Once you create an account you will be prompt to verify both a Email & Phone Number *Sometimes a photo id is required* *(It is recommend to add one as it will improve account security and increase your buying limit)* Follow the on screen prompts until you get to Add Payment Method Add your method of payment Once you link a Bank/Credit Card you will now be in the main page https://preview.redd.it/a58hftutv8d51.png?width=1892&format=png&auto=webp&s=9ce87ba198fdcaad10a2da4725c1030fca4d1741
Copy the Bitcoin Address (Your bitcoin address not the one in the screenshot)
Head back to coinbase
You should still have the Sent/Receive tab open if not open it back up
Put in the amount of BTC you wish to send
I like to add a note to keep my purchases organized this is optional
PASTE THE ROOBET DEPOSIT ADDRESS WE COPIED FROM STEP 1
DOUBLE TRIPLE QUADRUPLE CHECK THE ADDRESS IS CORRECT YOU ONLY GET 1 SHOT AT THIS GO SLOW
If everything looks good click send
TRIPLE CHECK BEFORE CLICKING SEND You will be given a confirmation screen again take note of the fees It is easy to get confused especially with currency conversion its always best to look at the BTC amount not the $ amount. (pro tip) Last chance to check everything Once you confirmed everything click send and the BTC is on its way! Go back to roobet and keep an eye on your notifications. Thanks to Roobet Instant funding you only need 1 confirmation before your funds are ready to go! https://preview.redd.it/14x2wwmo59d51.png?width=524&format=png&auto=webp&s=d40212fd1b67555fecb6e7f69c78d47c1abe569f Thats it!!!!You have successfully purchased and added BTC to your roobet account! Things to note Bitcoin is risky be safe take time to learn it Gambling is risky... Crpto is risky this website combines both please take the appropriate steps to ensure not only your financial safety but also your metal health Play Smart Play Safe Thank you for reading!if this helped you at all I would love it if you used my links above when signing up This was my first reddit guide I apologize if it is messy/confusing I will work on the formatting any Feedback is appreciated -Dom
Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.
Flatten the Curve. Part 48. Source Here It's getting crazier day by day now, so are you following the Boy Scout motto? On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.” Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island. But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply. Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it. But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right? Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court. 'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies. The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you. Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more. Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered. PACOM? Why isn't that command group responsible for the South China Sea? Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India. Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here Nah. I'm just fear mongering and Doomscrolling again. Heads up and eyes open. Talk soon.
Common sites with HIGHEST payout and STABLE income << 04/10/2020 >>
This is a long post, but please try to read it all and select the most suitable one for you. When you see any sites with good payout and good potential, feel free to create a post. Also when you know site that is scam, please create a post to alert everyone as soon as possible. There're 4 main and common types of task you will encounter when using beermoney sites. You can use all the sites or just pick the most suitable type and site to work with. Using more than one site is recommended, as the number of tasks on one site is not high enough, and the tasks will not appear continuously.
I. MICRO-TASK (or Crowdsourcing task)
The task is vary from article assessment, information collection, search-query classification/answer relevance, taking or collecting photo/video, to object identification,... The number of tasks will increase as you complete tasks. Pros: - The number of tasks is higher and more stable than other type of beermoney. - The payout is appropriate to your time and effort. You can even make stable income with them. Cons: - Sometime you will need to pass the training test to access the task. - Your work may not be accepted if it does not meet the guideline. - It can be a little hard in the beginning, there're also not many tasks for you, but BE PATIENT, because they haven't been able to fully assess your ability yet. 1-Toloka Yandex: This is one of my favorite micro task sites, and is the first on the list when I make beermoney site suggestion. The tasks are mainly in English and Russian. They also have task in your mother language too, depend on your setting and location. Don't worry about the language, as you can easily have it to be translated with google translate extension or any translation site and the task is easy enough to understand. The minimum withdrawal is $0.02 if you request to withdrawal once a week, and it will be $1 if more than once a week. You can withdraw the money to PayPal, Payoneer, Skrill or papara. But to be able to withdraw with PayPal, you will need a verified PayPal account. Here are registration links: ref-link and no-ref 2-Clickworker: One of the most popular micro task sites, you can find many recommendations and good reputation about them. But to make the most if it, you will need to unlock UHRS, as describe here. You definitely shouldn't miss Clickworker and UHRS. Their payout rate is higher than Toloka, but be careful that you'll be considered as spam if you complete the task too fast. Depend on your location and language, you can earn a great amount of money here, the highest I've earned in 1 day is $35. You can receive payment to PayPal account with the minimum of €5. You can choose other payment methods too, like SEPA transfers and Transferwise. No need to say anymore, here are the links: ref-link and no-ref 3-Remotasks You will need to take part in training (which is quite hard and time-consuming) and pass the test to be able to access a large number of tasks here. The tasks are categorization, text highlighting, image annotation, semantic segmentation,... and well-known Lidar Annotation and Segmentation. Here are registration links: ref-link and no-ref NOTE FOR MICRO-TASK:
It's highly recommended to use all those sites, and maybe other sites if you want, because the tasks are not shown continuously.
Make sure to fully understand the guideline, as you will not be credited if you work fails to meet the requirement, which will waste your time and effort.
If you find any task with really low credit but require a lot of time and effort, don't do it. If the requester still be able to find worker, they will always offer that price. It's not worth your time, just going to other tasks or going to other sites to see if there're any available tasks for you.
II. OFFER WALL TASK
Another way to earn beermoney online is to complete Offer wall tasks. You will be asked to installing app on your smartphone, signing up, playing game and reaching determined level, or watching video,.... Doing survey can also be listed here, but it will be shown in separate section. There're many offer walls for you to choose, with different payout level. Usually each beermoney site will list many offer walls, one offer can appear in more than one site/wall, so make sure to surf around and compare the credit to find the best and highest payout wall/site for that offer. Pros: - Easy to do - Can complete offer many times if you have different kinds of phone (mostly Android and iOS), or using another phone as the tasks are listed on many different offer walls. - Can earn money while playing and relaxing, as mostly the offered apps are games. Some apps only requires you to install and open, make it really quick to have some beermoney. Cons: - The payout is not very high. Especially when that offer is going through many walls and sites to reach you. - Some offer take much time to complete. - The number of offers is not high enough to do daily. 1-RewardXP RewardXP has surpassed GG2U to become the highest payout site. They have leveling system, the higher level you reach, the more offer walls you can access and the more benefit you can get. With the minimum of $5, they provide a variety of withdrawal methods for you to choose, like PayPal, Amazon, Steam,... You definitely should try this site. Here are your registration links: ref-link and no-ref. Registration with referral link, you will be given a 5000XP (~$0.5) bonus. 2-GG2U: This is also my favorite site. Their paying rate is one of the highest in the market (if you find any other site which is higher, feel free to suggest :D THE HIGHEST ONE NOW is RewardXP, see above). Aside from installing and registering app, they also have many survey walls for you. The most attractive part is that they will give you $1 bonus right after signing up, and after 5 withdrawal requests, you will have a chance to earn up to $7 bonus. With bonus, it's hard to say which is better, RewardXP or GG2U. You can withdraw money to your PayPal account or Coinbase (crypto wallet), with the minimum of $7. Here are your links: ref-link and no-ref 3-Cointiply One of the most popular sites, with great community. They will pay you with cryptocurrency like Bitcoin or Doge. You will have many chances to earn coins, by doing offer walls task, rolling the faucet every 1 hour, testing your luck with multiplier or by activating in their really crowded chat room. You can also earn some coins by clicking Paid-to-click ads. Most of the time, those ads are from Cointiply user with their referral link embedded, so if you register sites when viewing those ads, they will earn some commission. You can try this strategy too :D With their mobile app, it will be much easier to do mobile offers. Make sure to check your email and mobile app to get the user-limited Promotion Codes regularly. Registration links: ref-link and no-ref 4-Swagbucks Sometime you can earn money by spending less. Swagbucks offers a big number of sites where you can receive cash back when you shop online. If you shop online a lot, it's worth to take a look Here are registration link for shopping: ref-link-shopping and no-ref-shopping Beside the cash back program, Swagbucks also provides offer wall, however the paying rate is not as high as site 1 and 2 above. Anyway, if you want to try, here're your registration links: ref-link and no-ref 5-EarnCrypto If you're into doing offer walls task and earning crypto currency, try this site too. Their paying rate is quite lower than above sites, but they have Data entry task, which is daily, for you to earn some coins. By ranking high on their daily leader board, you will be rewarded with a great amount of coins (can even be higher than your earning from doing the data entry task itself :D). There are many different kinds of crypto currency for you to select. Just take a look if you have time: ref-link and no-ref NOTE FOR OFFER WALL TASK:
Every offer wall has a place to track your activity history, like what offer you clicked, what offer you completed and did you receive credit or not. Every time you're about to do an offer, after entering that offer (usually when you click an offer, a small panel about what offer is appears, there will be a button name 'continue' or 'go to offer', after you click that button, you're entering the offer), make sure that offer appears in your history tab of that offer wall. This will enable you to request support in case you complete the offer and have not received credit yet. If it does not appear in the history list, you will not be credited for that offer, so try to click it again.
To find the history tab, after entering offer wall, you will need to find a button named 'My coin', 'My history', 'Support', or button with question mark,... That button should be easy to be found.
Try to surf around to find the offer wall and site having the highest paying rate for the offer, as the same offer will appear in many offer walls and sites.
When you're about to start to do an offer of installing app (especially game), try to read the comment in appstore/playstore to see whether the offer's requirements can be easily to fulfill or not. For example, the requirements are: 1. install game, 2. open it, 3. reach level 30; and you find some comment about cannot reach level 25, or it takes months to reach level 29, then skip that offer, it's not worth the try.
III. PAY TO SEARCH
You can earn nearly passive income from this type of task. They will give you some query, you will search with that query, entering determined site, leaving that site opened for couple of minutes. Pros: - It's super easy to do. - While leaving the site open, you can do any other thing you want, like doing some micro-tasks. - The paying rate is quite good, especially when you will not need to do much. Cons: - The number of queries is not very high. 1-SerpClix In order to receive more queries to search, make sure to leave the site open and allow the notification. Even though SerpClix recommends you to click on the page, don't do that, just using scrollbar. SerpClix will automatically navigate to sub page of that page. Another suggestion here is to install adblock extension, because SerpClix will ban you if you click on any ads on the page, so blocking them before hand is a good move. Here your registration links: ref-link and no-ref
Probably all offer walls have some kind of surveys there, some surveys are only available through offer walls, some have their own sites. By using their own sites will not guarantee that you will have higher payout though. Make sure to be honest when doing survey, despite the fact that you will sometime be disqualified from the survey. There's many reasons why you are disqualified, like because your job is not suitable, your demography is not their target, your answer is not persistent,... BE CAREFUL, they will keep track of you, even if you clear your cookie, so being dishonest can lead you to be banned from their sites. Again, BE HONEST, and there will be suitable surveys for you. There will be two types of survey for you: the first one is filling form and selecting answer from their suggestion, the second one is to talk with them directly or via Video call apps. The second one has much much higher earning but the requirement is also higher too. Pros: - Easy to do, just being honest - High payout, especially with the second type of survey. - Some survey only need 5 minutes to complete with good payout. Cons: - Some survey can take about 30 minutes to complete, so make sure that you have enough free time. - You will be disqualified if your information is not suitable to their survey's target. BUT ALWAYS BE HONEST. 1-SurveyTime One of the best sites out there, my favorite one. They will instantly send you $1 or $0.5 (depend on survey) to your PayPal or Coinbase account when you complete the survey, so no minimum required to withdrawal. The survey you will do here is the first type, filling in the form and selecting answer. You can register with SurveyTime through some offer walls, as they will give you some more coins when you complete the survey, but make sure to check their's conditions. Make sure to turn on Browser notification and Email notification so that you don't miss any survey. Registration links: no-ref 2-Respondent You will need a microphone and/or webcam (built-in or external) as the survey in Respondent is conducted via video calls, phone calls, in-person discussions. Of course, you will receive a huge credit for doing survey here, from $5 up-to $1000. This's a great deal, one successful survey can get you more credit than doing hundreds of micro-tasks. Don't miss this site. They will recommend suitable survey for you, but if you want to view all available survey, make sure to uncheck the 'Recommended' option in Filter panel. Here're your registration links: ref-link and no-ref NOTE FOR SURVEY TASK:
sometime, they will provide the must-select answer in the question to test if your attention. Make sure to read the question carefully. For example, the question is "Do you agree that 1 + 1 = 2? Select option [I do not agree] in the answer", if you select [I agree], you fail.
BE CAREFUL - BE HONEST
When you're doing the first type survey (filling form, selecting answer), be careful not to install any app, or download any thing, or upload your social data file when asked. In that case, just contact survey site support and report it.
It's better to use many different survey sites to maximum the number of surveys you receive.
Last word, BE PATIENT - earning online can be a little hard in the beginning. Feel free to share your experience when using beermoney sites (and your referral link too :D) or ask question about any beermoney sites by creating new post. Also creating new post when you know that any site is scam or becomes scam. P.S 1: In case you need a Crypto wallet, you can use Coinbase, registration links: ref-link and no-ref, or Binance ref-link and no-ref. You can read here for the comparison between Coibase and Binance P.S 2: You can add some email addresses to PayPal account, so you can use many email address to register to beermoney sites if you want P.S 3: If you're confident with your English, and have a computer, microphone and webcam, you can try Usertesting site, you will visit a website that requires you to test, talk about your experience of using that site Here is the link: no-ref
Main Page. From Bitcoin Wiki. Jump to: navigation, search. Welcome to the Bitcoin Wiki, for all your Bitcoin information needs. 1,270 pages. Established April 14, 2010. This wiki is maintained by the Bitcoin community. Bitcoin.org: Forums: Chatrooms: Bitcoin; Bitcoin is a decentralized digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer ... Bitcoin (inoffizielle Abkürzung BTC) ist ein Open-Source-Softwareprojekt für die gleichnamige digitale Währung auf Peer-to-Peer (P2P) Basis, das 2009 von Satoshi Nakamoto ins Leben gerufen wurde. Über sogenannte Bitcoin-Adressen kann Geld anonym von einer Wallet-Datei (engl. Geldbörse) bzw. einem speziellen Service über das Netzwerk an andere Adressen überwiesen werden. Im Gegensatz zu ... Main page; Recent changes; Random page; Help about MediaWiki; Tools. What links here; Related changes; Special pages; Printable version; Permanent link; Page information; Welcome to the Bitcoin Wiki. Here we aim to provide a correct and up-to date set of information on the Bitcoin network and its features and functionality. Bitcoin. Bitcoin is a peer to peer electronic cash system created by ... a collection of citable Bitcoin-related logs, emails and references. This wiki is maintained by the Bitcoin community. New sources Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH.
The most interesting is that at the time of growth and decline, information about the further development of the bitcoin and other currencies was published on the Bitcoin.info page, where a lot of ... Bitcoin is one of the most important inventions in all of human history. For the first time ever, anyone can send or receive any amount of money with anyone ... What it really takes to mine a Bitcoin in 10 Minutes. Firstly I'll show you a special free method to mine Bitcoin and send funds directly to your wallet in 1... UPDATED VIDEO: https://www.youtube.com/watch?v=x9p7t0stipo THE NEW TWITTER: STOCK POLLS, NEWS, ETC. https://twitter.com/TechCrackHouse_ Pledge $1 and BECOME ... Situs Penghasil Bitcoin Gratis Tercepat 2020 Situs Penghasil Bitcoin Gratis Terbukti Membayar Situs yang bisa menghasilkan bitcoin tercepat, gratis dan ter...