The Ultimate Guide to Anonymous Online Payment Methods ...

NiceHash - buy & sell hashing power

NiceHash offers you to buy or sell hashing power directly, no contracts, no limitations, pay-as-you-go if you're a buyer and be-paid-as-you-go if you're a seller. Why bother renting rigs, when you can rent hashing power? NiceHash brings more to renters and rig owners. Visit https://www.nicehash.com today! Simply create order and you are already mining your favorite coin or point your rig to our stratum server and you are already earning bitcoins.
[link]

Cash: use it or lose it!

Is this the last decade of cash?

The corona pandemic is not helping. Belgian media is picking up the Australian news about the coronavirus found active 28 days on banknotes, without understanding that the 28 days is on the Australian polymer and paper banknotes, while Euro banknotes are made of cotton fibers on which the coronavirus gets inactive rather quick. https://medicalxpress.com/news/2020-04-euro-banknotes-safe-coronavirus-ecb.html
You are touching so much in shops, including the pay terminals everyone is touching, that cash won't add much risk.

Until this year, I used to not care, and pay everything electronically.

But in March I became the victim of an identity theft. My bank account was frozen, my bank cards and payment app blocked. Opening new bank accounts or credit cards was impossible due to being on a blacklist.

My employer could not pay my salary in cash. For most professions this is forbidden by law since 2016.

Friends lent me cash. But I discovered cash was refused at supermarkets, shops, public transport, parkings, fuel stations, hospital, physiotherapist, online webshops, Uber, Deliveroo, etc. Sometimes because of corona anxiety, but often already from before 2020.

Prepaid cards could be a nice solution. But even while they are debit cards, in Belgium they seem to be refused where credit cards are refused, since they are Visa or Mastercards cards. These are refused in many Belgium places, since merchants don't like the higher costs. Not many prepaid cards allow charging with cash. And their availability is in recent decline: this year at least the following prepaid cards stopped or are announced to stop: Carrefour prepaid Flex card, BNP and Hello. The decline might be due to new very strict EU anti-money laundering laws. The anonymous prepaid cards (and generic gift cards) are now restricted to 100 euro maximum recharge in their lifetime and 50 euro payments.

Cryptocurrencies are also in theory a nice solution. But their acceptance in Belgium is extremely limited. Thanks to Takeaway accepting bitcoin, I could order delivery from many local snack restaurants.
But I discovered that bitcoin and most other cryptocurrencies, while having an "anonymous" reputation, are actually only pseudonymous and extremely open and transparent: for every transaction the origin address, destination address, amount and timestamp are recorded for eternity in a public ledger for everyone open to consult. When I buy something, the merchant can see how many coins I have in my wallet address. Buying, spending or selling coins are activities that can get your name connected to your addresses. Developers try to solve this privacy issue, but I'm afraid the war on anonymity (related to the war on cash) will crush that before cryptocurrency payments become popular.

So, my identity theft experience has awakened me: sharing your personal details in so many places caries a lot of danger. Think about it: while the law became more strict, there are still many (online) shops and restaurants taking knowledge of your credit card number, expiry date, CCV and your name. That's still enough information to do fraudulent payments in many places.

The cashless society is a surveillance society, with every payment traced. And it creates a lot of dependencies: electricity, internet, and permission by the banking and payment system. Once you are on a blacklist, even if you did nothing wrong, but somebody pretended to be you and did fraudulent payments, you are screwed for at least months.

So, now that I'm finally off the blacklist, I opened several bank accounts. That will not help for all issues, but still: having only 1 bank is really dangerous.

And from now on I pay everything possible with cash. Not just to keep my personal details safe, but also to keep the cash usage statistics high. Did you notice that the financial sector is regulary reporting the cash withdrawals decline? They report both the total amount withdrawn and the number of withdrawals.

I learned that the bank and payment processors are fighting a war on cash and they are actively lobbying the government for a reduction of the cash payment limit to 50 euro. Yes, an insane fifty euro! The banks are lazy about cash and want to impose negative rent without risking a bankrun. No cash is no bankrun. The payment processors just love the percentage they get from every payment.

Currently the acceptance of euro banknotes and coins for debts is compulsory by European law. But many merchants violated the law and we had at least one Belgian minister ignoring the enforcement. See e.g. this article from 2019: https://www.bruzz.be/samenleving/no-cash-doet-intrede-brusselse-horeca-2019-05-10.
The law has exceptions, e.g. for security reasons such as a pandemic. After the pandemic I will try to report all cash refusing merchants.
Merchants that refuse to accept cash payments can be reported at https://meldpunt.belgie.be or https://pointdecontact.belgique.be/. But I guess it is better to wait until after the pandemic.

We need to defend the right to use cash. And a crucial action to avoid the end of cash is to keep using it as much as possible.

Every time you pay with a bank card or app, you contribute to a cashless future where:
Use cash or lose it!
submitted by piabxl to belgium [link] [comments]

Everyday info sec, hardcore info sec, and DNMs

Edit: Currently writing a new version of this, dont know when it will be done.
Edit: Since first post I have updated a few sections with additional information.
I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful.
I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips)
Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful.
I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both.
--------
Everyday Simple Info Sec:
-There could be a hidden administrator user on your PC, make sure to change its password
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted)
-Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password)
-use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good.
-Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question)
-------_
High level crimimal information security:
The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked.
Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible.
-Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown)
-Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities)
-rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password)
-Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade)
-Never use accounts that have been exposed to lower security on higher security machines
-your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak)
-Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
-------_
How to use dark net markets (DNMs)
If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential.
Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money.
-A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist)
-Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature)
-Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen)
-now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct.
-wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in
-test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews.
Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask.
No idea how long this will stay up, I might purge it in 7 days, or never.
submitted by seven_N_A7 to u/seven_N_A7 [link] [comments]

Ledger Live adds Coin control: Here's why that matters.

Ledger Live adds Coin control: Here's why that matters.
Ledger Live version 2.11.1 (download link) adds Coin control for power users.
The coin control feature gives advanced users more granular control over their wallets. It enables them to change how and which coins are selected when making transactions. This increases their ability to manage their privacy and the network fees they will have to pay to spend their account balance.
More control over your coins

How does it work?

The account balance for Bitcoin and its derivatives consists of all the unspent transaction outputs (UTXOs) in the account. You can think of UTXOs as the coins in a regular wallet. When you receive money, you collect coins in your wallet. Then, when you want to make a payment, you get to choose which coins you pick from your wallet. Do you pick the largest coins first? Or do you want to spend all the smaller value coins to lighten up your wallet? Similar considerations can be made when creating a Bitcoin or Bitcoin derivative (altcoin) transaction.
Before the Coin Control feature was released, all transactions involving Bitcoin (and altcoins) automatically selected their coins using the First-In-First-Out (FIFO) algorithm. This strategy includes the oldest coin in the account, and when the amount is not sufficient the second-oldest coin is added, and so forth.
As of Ledger Live version 2.11.1, users are able to make use of a dedicated Coin Control tool to choose the coin selection strategy and the coins that may be spent.

Using Coin control in Ledger Live

Coin control is available in Advanced options in the Send flow
  1. Click on Send, choose an account to debit, and enter a recipient address. Click on Continue.
  2. Enter an amount and click on Advanced options. You will then see: - The currently selected, default coin selection strategy: Oldest coins first (FIFO). - A toggle to enable Replace-By-Fee (RBF). - A toggle to include coins from unconfirmed, replaceable transactions.
  3. Click on Coin control. The coin control modal opens.
  4. Select a Coin selection strategy from the dropdown menu: - Oldest coins first (FIFO). This is the default strategy that spends the oldest coins first. - Minimize fees (optimize size). This strategy tries to minimize the byte size of the transaction by spending the lowest number of UTXOs. This results in a low network fee. - Minimize future fees (merge coins), This strategy includes the maximum number of inputs so that a potential future price rise does not make smaller UTXOs economically unspendable. If the price of a crypto asset increases too much, small UTXOs may become worth less than the cost of the network fees to spend them.
  5. Select which coins may not be included in the selection by unticking their checkbox. The SELECTED indicator shows which coins will be included in the transaction. By changing the selection strategy and/or coins to include, the user has precise control over which coins end up being spent. The Coins to spend and Change to return indicators show how much is spent from and returned to the account.
  6. Click on Done to return to the Send flow to verify and send the transaction.
The coin control window lets you select the strategy as well as pick the coins. Coins marked SELECTED will be included in the transaction.

Coin status

The following statuses can be displayed for a coin:
  • Coins received in a transaction with 0 confirmations without RBF enabled: PENDING
  • Coins received in a transaction with 0 confirmations with RBF enabled: REPLACEABLE
  • Coins received in a transaction with 1337 confirmations: 1337 CONFIRMATIONS
By enabling the toggle Include coins from unconfirmed, replaceable transactions, replaceable transactions can be selected in the Coin control screen.

The Privacy use case

One of the main use cases for Coin control is to protect one’s privacy. UTXOs are, unfortunately, not perfectly fungible due to their unique history on the blockchain. Therefore, users may want to spend coins from different sources without mixing them together, because this would indicate to an outside observer of the blockchain that these addresses belong to the same account. For instance, if one were to spend coins bought on a KYC exchange, which are associated with the user’s identity, together with coins bought anonymously using cash, the anonymous coins could be linked to the user’s identity.
Another example would be that you would like to prevent spending a high-value coin for smaller purchases because this would unnecessarily show the person you’re paying how much you have. This is similar to not showing the boulanger how much is on your bank account when buying a baguette.

Let us know what you think!

We are excited to release this new feature because we think it will fulfill real needs of an important part of our users. This version of Ledger Live marks an important milestone, but we will continue working on more features that our community wants.
So, we invite you to try out Coin control in Ledger Live and let us know what you think! All feedback is welcome on this thread, on ledgerwallet, and you can send suggestions or get help through our official contact form.
We'd like to close out by underlining our commitment to the Bitcoin community, and our willingness to build the best wallet ecosystem for newbies as well as for power users.
submitted by fabnormal to Bitcoin [link] [comments]

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 2/2)

Source | Guestbook
Previous thread
Questions Answers
Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum? No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.
the below is a reply to the above
That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims? That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft? Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc
the below is a reply to the above
Given your insight into how predators operate, do you have any advice for parents on protecting their kids? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up. Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings
Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness? Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.
Pedophiles who do not act on their urges should be given as much help as humanly possible.
Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird? there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to
How much these bad people really exist out there? Hundreds? Thousands? More? It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.
Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated
Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art
How accurate are the legends? Any legends in particular? For a lowdown copied from a post I made in another forum:
1Red Rooms  The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.
People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.
2.Hitman sites
I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.
3.Exotic animals  People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.
SO WHAT DOES HAPPEN ON THE DARK WEB?
1.People buy and sell drugs.
The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.
The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.
2.People buy and sell other illegal things
Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.
3.People access and create childporn  Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.
4.People talk about stuff
There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.
5.People anonymously release information
Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.
6.People surf the web anonymously
The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.
I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think? Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".
So yeah, rare, but it does happen. You might be the unlucky one
How do you find things on the dark web without search engines? There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.
I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses
Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods. If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.
Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.
How did you move from being a corporate lawyer to researching and writing about dark web? I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web? A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)
There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.
It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed
Is there anything good about the dark web? It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.
News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.
It bypasses firewalls and allows for secure communications under hostile regimes
the below is a reply to the above
How does this make you feel about the idea of the decriminalization of drugs? I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.
I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success
the below is a reply to the above
Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks! I've been writing it for about 14 hours. Going a bit loopy
How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them.... I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...
As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever
the below is a reply to the above
Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in? Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.
Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones
Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat? OOOOH, I know that name! Love & Light to you!
I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.
As long as I'm getting paid, I'm pretty happy!
the below is a reply to the question
I too remember your name Pluto! Such a decent human ❤ he is!! True OG right there <3
Is the dark web subject to more racism than its counterpart, the world wide web? There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter
Have you seen any consequential political or social organizing being carried out on the dark web? Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.
What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive? I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.
LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use
the below has been split into separate questions
1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety? I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.
2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret? We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.
3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work. Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though
these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help? Yeah both things have been answered in this thread, so I'll cut'n'paste
The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.
It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.
The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.
The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.
It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.
It was frightening because he was living proof that monsters walk among us and we never know.
[deleted] It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things
I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help? I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog
the below is a reply to the question
Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome. I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there
the below is another reply to the answer
Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line. Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly
Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash? I like the psychonaut communities. They just want peace, love and mungbeans for everybody
Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all. Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?
Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare? No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.
Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies? I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation
I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it. Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.
They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc
the below is a reply to the above
So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account. No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children
I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series Whenever you download anything from a pirate site you run the risk of infection
What do you think of QAnon? Wackjob conspiracy
the below is a reply to the above
Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia? The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)
So, those people
the below is another reply to the answer
Also how to we get people to stop believing in QAnon? Outside my area of expertise, sorry
do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk) No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument
So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable
I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!
There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.
What’s the one lingering unanswered question you have about SR? I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.
There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them
the below is a reply to the above
Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply! Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.
I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account
the below is a reply to the above
I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke? I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes
Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped? The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education
What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts! Casefile – the murder of Amy Allwine
Casefile – Blue Skies, Black Death
Casefile – Ella Tundra
Casefile – Dnepropetrovsk Maniacs
Casefile – Motown Murders
Casefile – Rebecca Schaeffer
Casefile – Sian Kingi
Casefile – John & Mark
Casefile – Shauna Howe
Casefile – Chloe Ayling
Casefile – Johnny Altinger
Casefile – Killer Petey
Casefile – The Santa Claus Bank Robbery
Casefile – Martha Puebla
Casefile – Leigh Leigh
Is there any way parents can keep their kids safe from this without being helicopter parents? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What does it take in terms of degrees and experience to get into this business? Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write
If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is? Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.
One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.
Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions
the below is a reply to the above
Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible? It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders
the below is another reply to the original answer
Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it?? Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money
On the subject of abused kids... did you ever help the kids in any way? I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.
Daisy has been taken into care and her identity changed. I hope she is doing okay
What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code. It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.
e.g. http://thehub5himseelprs44xzgfrb4obgujkqwy5tzbsh5yttebqhaau23yd.onion/index.php is the URL of a dark web forum. If you plug it into your normal browser you will get an error. If you plug it into the Tor browser you will get the registration page for The Hub
How do you keep yourself from hating all humanity? I am happy to report that, even on the dark web, the good people outnumber the bad
Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature? Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb
submitted by 500scnds to tabled [link] [comments]

Two Prime, under the radar coin worth looking into.

Two Prime has released their FF1 MacroToken.
"We show how this methodology can be applied as an Open Source application, in the vein of BTC and ETH, with all the creative and value generative potential that comes along with it. We leverage store of value functions of cryptocurrencies to arrive at value creation and accretion in the real economy by the intermediary of crypto exchanges on which we propose to provide protective measures. We detail treasury and reserve formation for the Open Source Finance Foundation, describe its relation to Two Prime and detail the emission of a new crypto-asset called the FF1 Token.
We seek liquidity for the FF1 treasury within the secondary exchanges for the purpose of applying M4 in the real world, both in the private and public sector. We first apply this to the vertical of cryptocurrencies while outlining the genericity and stability of the model which we indeed to apply to esoteric financial needs (e.g. Smart City financing). In so doing, we extend the scope and control of applications that a system of digital units of value stored on decentralized, public ledgers can aim to advance. We call this approach Open Source Finance and the resulting coin class a MacroToken.
MODERN MONETARY THEORY FRAMEWORKModern Monetary Theory states two interdependent phenomenological axioms and the banking system operates on a resulting syllogism:
In the past 10 years, the formation and emergence of BTC and ETH has verifiably falsified Axiom 2 [1]. The phenomenon of crypto-currencies has created ab-initio global stores of value of type 1a. Cryptoc Currencies have displaced trust by means of government violence and associated, implied violence, with instead, open source distribution, cloud computing, objective mathematics, and the algorithmic integrity of blockchain ledgers. The first “killer app” of these open source ledgers areis stores of value, e.g. Bitcoin, or “open source money” as it was first characterized by its semi-anonymous creators. Leading crypto-currencies have proven themselves as viable global stores of value. They are regulated as Gold is in the United States. However, as type 1a units of value, they have tended towards high volatility inevitably leading to speculative market behavior and near 0 “real” asset-” backing or floor price [2], albeit with an aggregate value of $350bn ab-initio creation.
We therefore advance Axiom 2 to Axiom 2’
At N < 1 we have dilutive debasement of fungible units of value, aka inflation. At 1, the new monies are therefore stable coins. At N > 1, these tokens are designed to grow with demand. Axiom Two Prime (or 2’) displaces government endorsed violence as our macro-socio organizing principle, with algorithmic objectivity and verifiable transparency. This occurs within the landscape we call Open Source Finance.
THE TWO PRIME MODEL
Two Prime refers to the financial management company managing the OSFF. FF1 refers to the Macro Token of the OSFF. The first stage is reserve and treasury formation, the second stage describes the mechanics of the public markets and the protective measures of the reserves and third stage is treasury liquidity via the Continuous Token Offering both in public and private markets. We will now describe these in more detail.
MACRO INVESTMENT THESIS AND RATIONALE FOR FF1The FF1 MacroToken is a synthetic token based on the proven killer applications of Cryptoc-Currencies. After 110 years since the inception of the blockchain technology, the killer apps of crypto are already here and they are primarily all financial, not technical. The historical killers apps are:
The FF1 MacroToken is a pot-pourri of these features, a synthetic token that mixes the best of breed practices of crypto mixing Store-of-Value, Capital Formation and Fractional Asset-Backing.
MACRO INVESTMENT THESIS AND RATIONALE FOR FF1Treasury Generation: Ab-Initio Store of Value On the supply side, The OSFFTwo Prime has created is creating 100, 000, 000 FF1 Macro Tokens, which it keeps in treasury. They are pure stores of value for they have no assets backing them at birth. They are ab-initio instruments. The FF1 Macro Tokens are listed on public crypto exchanges. Two Prime manages operates market- making for these stores of value.
Treasury Management: Supply- Side Tokenomics All FF1 are held in the Open Source Finance Foundation treasury. Crypto aAssets that enter into treasury are, at first, not traded. The FF1 supply will be offered upon sufficient demand. which Two Prime generates publicly and privately. The total supply will be finite in total units (100, 000, 000), but variable in its aggregate value for supply and demand will make the price move. The proceeds are the property of the OSFF (not Two Prime) and Two Prime places invests the liquid treasury (post FF1 liquidation) in crypto assets to protect against depreciation and create a macro-hedge reserve andor floor for the price. It should be noted that the price and the NAV of assets are, by design, not equal. In other words, the additional OSFF treasury is locked and can enter circulation if, and only if, there is a corresponding demand which is then placed invested in crypto assets with a target value N 1. This results in fractional asset- backing at first.
EXCHANGES, CONTINUOUS TOKEN OFFERING, AND DEMAND- SIDE TOKENOMICSPublic Exchanges Two Prime will maintain listings for the FF1 Tokens on behalf of the OSFF. Two Prime maintains market- making operations in public crypto exchanges on behalf of the OSFF.
Continuous Token Offering Two Prime works on creating new liquidity for the FF1 Macro Tokens to comply with the supply side constraints detailed above, namely that a token enters circulation when matched by demand. Two Prime does demand generation in public as above as well as private. This CTO results in something akin to a reverse-ICO, letting the reserves be set by public trading and then marketing to private purchasers investors (accredited US for example) after the public liquidity event. Demand generation is done via marketing to relevant audiences, e.g. as a macro way to HODL with exclusive private equity investments for crypto holders, and as a diversified and de-risked way to gain crypto exposure for FIAT holders (Sharpe ratio: 1.55, Beta to BTC: 0.75).
PARTNER NETWORK, USE OF PROCEEDS, ACCRETION AND FLOOR PROTECTIONThough this mathematical approach allows for a broad and differentiated set of financial applications and outcomes, Two Prime founding Members will first apply this work to the realm of project finance within the Blockchain space via algorithmic balancing of an equity and debt based treasury consisting of real crypto assets and future cash flows.
Proof of Value Mining in Partner Network Funds and projects can apply to the foundation for financing. This is the partner network and is akin to the way a network of miners secure the chain. Here a network of partners protects the value. The Foundation invests the proceeds in liquid crypto assets, interest bearing crypto assets and equity crypto assets via partner funds, creating a bridge to the real economy (crypto companies) in the last step. The foundation holds these (real economic) assets.
M4 Asset Mix The funds raised are invested in public and private sector projects. We consider the following mix
This completes the M4 step and the flow of funds for the FF1 Token. It shows a feedback loop, for the Foundation can buy back it’s token, leading to an idiosyncratic tokenomics: the FF1 Token has a fixed (and potentially diminishing) SUPPLY alongside (potentially increasing) endogenous and exogenous DEMAND."
This seems pretty interesting imo, thoughts?
submitted by Stock-Accountant to CryptoMoonShots [link] [comments]

Delightful Privacy

Delightful Privacy delightful

This is a collection of software, operating systems, and other miscellaneous tools to help the average user fight for their privacy and security online.

Operating Systems

Fedora

Fedora uses Security-Enhanced Linux by default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper, and does hardening for all of its packages by using compiler features such as position-independent executable (PIE). Wikipedia

Pop!_OS

Pop!_OS provides full out-of-the-box support for both AMD and Nvidia GPUs. It is regarded as an easy distribution to set-up for gaming, mainly due to its built-in GPU support. Pop!_OS provides default disk encryption, streamlined window and workspace management, keyboard shortcuts for navigation as well as built in power management profiles. The latest releases also have packages that allow for easy setup for TensorFlow and CUDA. Wikipedia

Debian

Debian is one of the oldest operating systems based on the Linux kernel. The project is coordinated over the Internet by a team of volunteers guided by the Debian Project Leader and three foundational documents: the Debian Social Contract, the Debian Constitution, and the Debian Free Software Guidelines. New distributions are updated continually, and the next candidate is released after a time-based freeze. Wikipedia

openSUSE Tumbleweed - Rolling Release!

Any user who wishes to have the newest packages that include, but are not limited to, the Linux Kernel, SAMBA, git, desktops, office applications and many other packages, will want Tumbleweed. openSUSE

For enhanced security

Qubes OS

Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems. Wikipedia

Tails

Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked. Wikipedia).*

Whonix

Whonix is a Debian GNU/Linux–based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this. Wikipedia

Web Browsers

For Desktop

Firefox Needs manual tweaking to be more secure! Use ghacks

Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Wikipedia Recommended addons: uBlock Origin | Https Everywhere | Privacy Badger | Privacy Possum | Decentraleyes | NoScript | CanvasBlocker

Tor

Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user. Wikipedia

UnGoogled-Chromium

Without signing in to a Google Account, Chromium does pretty well in terms of security and privacy. However, Chromium still has some dependency on Google web services and binaries. In addition, Google designed Chromium to be easy and intuitive for users, which means they compromise on transparency and control of internal operations.
ungoogled-chromium addresses these issues in the following ways:

For mobile

Bromite Android Only

Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser! Bromite

Firefox Focus Android - iOS

Firefox Focus is a free and open-source privacy-focused browser from Mozilla, available for Android and iOS. Wikipedia

Tor Browser for mobile Android - iOS

Tor protects your privacy on the internet by hiding the connection between your Internet address and the services you use. We believe Tor is reasonably secure, but please ensure you read the instructions and configure it properly. GitHub

Email

Tutanota

Tutanota is an end-to-end encrypted email software and freemium hosted secure email service. Wikipedia

Mailbox

There are many ears listening on the Internet, which is why all our services require mandatory SSL/TLS-encrypted data transmission. For additional security, we also use enhanced (green) security certificates ("EV") by the independent SwissSign trust service provider from Switzerland (Check the padlock symbol in your web browser's URL field). But this is just the beginning – there is so much more that we do. Mailbox

Disroot

Disroot is a decentralized cloud-based service that allows you to store your files and communicate with one another. Established by a privacy-focused organization of volunteers, if we look at Disroot as an email provider specifically, it stands out thanks to its emphasis on security with a completly free open-source approach. ProPrivacy

ProtonMail

ProtonMail is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland by scientists who met at the CERN research facility. ProtonMail uses client-side encryption to protect email content and user data before they are sent to ProtonMail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps. Wikipedia

Search Engine

Searx

searx is a free metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users. To this end, searx does not share users' IP addresses or search history with the search engines from which it gathers results. Tracking cookies served by the search engines are blocked, preventing user-profiling-based results modification. By default, searx queries are submitted via HTTP POST, to prevent users' query keywords from appearing in webserver logs. Wikipedia - Find public instances of searx here searx.space

Startpage

Startpage is a web search engine that highlights privacy as its distinguishing feature. Previously, it was known as the metasearch engine Ixquick, At that time, Startpage was a variant service. Both sites were merged in 2016. Wikipedia

YaCy

YaCy is a free distributed search engine, built on principles of peer-to-peer (P2P) networks. Its core is a computer program written in Java distributed on several hundred computers, as of September 2006, so-called YaCy-peers. Each YaCy-peer independently crawls through the Internet, analyzes and indexes found web pages, and stores indexing results in a common database (so called index) which is shared with other YaCy-peers using principles of P2P networks. It is a free search engine that everyone can use to build a search portal for their intranet and to help search the public internet clearly. Wikipedia

VPN

If you need anonymity and privacy online use Tor instead, if you are looking to bypass a geo-restriction, don't trust public WiFi, or are looking to Torrent, a VPN will help you.

Mullvad

Mullvad is an open-source commercial virtual private network (VPN) service based in Sweden. Launched in March 2009, Mullvad operates using the WireGuard and OpenVPN protocols. Mullvad accepts Bitcoin and Bitcoin Cash for subscriptions in addition to conventional payment methods.
No email address or other identifying information is requested during Mullvad's registration process. Rather, a unique 16-digit account number is anonymously generated for each new user. This account number is henceforth used to log in to the Mullvad service.
The TechRadar review notes that "The end result of all this is you don't have to worry about how Mullvad handles court requests to access your usage data, because, well, there isn't any." Wikipedia

ProtonVPN

ProtonVPN utilizes OpenVPN (UDP/TCP) and the IKEv2 protocol, with AES-256 encryption. The company has a strict no-logging policy for user connection data, and also prevents DNS and Web-RTC leaks from exposing users' true IP addresses. ProtonVPN also includes Tor access support and a kill switch to shut off Internet access in the event of a lost VPN connection.
In January 2020, ProtonVPN became the first VPN provider to release its source code on all platforms and conduct an independent security audit. ProtonVPN is the only VPN to do so, even though experts say this is a crucial factor in deciding whether to trust a VPN service. Wikipedia

For information about alternatives to software and services.

If you are looking for alternatives to proprietary services like Discord and Facebook, or an open-source alternative to Photoshop, check out our list about Awesome-Alternatives

Mirrors are kept up to date, this post may lag behind as we add stuff in.

submitted by CipherOps to LinuxCafe [link] [comments]

How much does it cost to develop a cryptowallet for business?

How much does it cost to develop a cryptowallet for business?
A cryptocurrency wallet is specific software that allows you to make global non-cash payments and keep your profit securely stored. There are multiple reasons why business owners switch to cryptocurrency wallets such as no government invasion, multi-currency operations, quickness, no physical currency involved. However, it is necessary to develop your personalized wallet if you want to scale your business and simplify financial transactions. In this article, we will discuss what is the average price of cryptowallet development and how it will benefit your business.
https://preview.redd.it/wxe1e9l5n5r51.jpg?width=2508&format=pjpg&auto=webp&s=5c0b9b94aba2bfe8f877b7aa3f27a0f0592ab5ce
Firstly, it is important to understand the necessity of cryptowallet for entrepreneurs:
  • some transactions require a long waiting period and verification in the bank:
  • high fees on international transactions and unprofitable currency exchange rate;
  • lack of privacy, since online money transfer through a bank is impossible without the provision of personal information;
How does cryptowallet work?
  • fast and secure transactions carried within a few minutes;
  • private keys are safely stored and the transaction is processed between blockchain network members:
  • transaction fees are relatively low in comparison with a bank;
  • a completely anonymous environment;
You should keep in mind a few things that will influence the cost before the development process
Wallet type
There are two main wallet types: the desktop (installed on the PC) and the mobile app that can provide users with constant access to their funds.
Bitcoin libraries
You can either create a cryptocurrency wallet using one of the libraries (e.g. Coinbase, BitcoinJ) for Android and iOS and synchronize it with various API’s or create an application from the scratch.
Size of the development company
If you decide to get a highly customized wallet app, the estimated price will largely depend on the size of the company you are choosing. Anyway, cryptowallet development requires large investments and even hiring a small-sized company will cost you from $15,000-$20,000. The pricing depends on the features included. Also, the type of coins you want to use in your wallet app is a factor that influences the cost. Since it is not possible to calculate the exact cost of development, we will present the average prices of the basic features that are compulsory in your app:
Backend development from $10,000
Design from $7,000
Web/Desktop $7,000
Also, you can add numerous features to secure and vary your transactions:
Secured authentication & authorization, Windows/Linux/Mac wallet, iOS app, Android app, push notifications, QR code scanner, customer support, multiple cryptocurrency, optional password protection etc.
The development of a cryptocurrency wallet is an innovative tool that can bring your business to the next level. Evercode Lab developed a unique multi-currency crypto wallets (Atomic Wallet and Guarda), guaranteeing the fastest transactions, maximum security, and anonymity. Our company provides a wide range of services from consulting to a full-time development team as well as crypto asset security.
submitted by Fantastic_Tour_6829 to u/Fantastic_Tour_6829 [link] [comments]

CoinEx Weekly Update, 21–27 September 2020

CoinEx Weekly Update, 21–27 September 2020

https://preview.redd.it/icb50teh4tp51.jpg?width=679&format=pjpg&auto=webp&s=e782ce2d29e8da61d2804a9e21b25f7b53bee66d
Dear CoinEx users, to keep you updated each week, we will share with you a recap of all the exciting events of the previous week. Below are major events that occurred in the ecosystem over the 21–27 September.

Termination of Services in Hong Kong

In compliance to Hong Kong’s regulations and regulatory requirements of central authority, starting from 23rd of october 2020, all IP visits from Hong Kong will be barred and users from the region are advised to withdraw their assets from CoinEx as soon as possible.
Moving forward: 1. ID verification: CoinEx will NO LONGER accept ID verification submission for users in Hong Kong; 2. App services: CoinEx APP will be offline from application markets in Hong Kong.

BCH Fork & Launch of Forked Coins Futures Markets

The Bitcoin Cash (BCH) network will undergo a semi-annual hard fork upgrade on November 15 as scheduled. CoinEx is a strong proponent of the BCH ecosystem, supporting trading markets with BCH as the pricing coin. To provide users with better services, we are going to launch futures markets of BCH forked coins on September 24, 2020.
Details
https://preview.redd.it/i5vr23ek4tp51.jpg?width=680&format=pjpg&auto=webp&s=10e312bd3799bf30d672c97eb1320df066a303c6

OneSwap

Add Liquidity and yield farm $ONES with OneSwap

OneSwap, invested by CoinEx, published a step by step guide how to farm ONES.
Details
https://preview.redd.it/ozgi16io4tp51.jpg?width=580&format=pjpg&auto=webp&s=be2dfe2791d495cbfecfa8ad8774928840d8b465

New Listing

AVAX Launched: Deposit to Share 20,000 AVAX

To provide users with more trading and investment options, CoinEx listed AVAX alongside a listing promo event with 20,000 AVAX in prizes.
Event 1: Deposit to share 13,000 AVAX, Event 2: Invite new users to deposit for 7,000 AVAX sharing.
https://preview.redd.it/phr8w2pr4tp51.png?width=801&format=png&auto=webp&s=72f1a66dc749d007b4fc6d6f32d67a564d51e5b4
About AVAX WebsiteExplorerWhitepaper Avalanche is an open-source platform for launching highly decentralized applications, new financial primitives, and new interoperable blockchains.
Details

Node Maintenance

NANO Deposit & Withdrawal Suspension
As a result of the upcoming maintenance of NANO, CoinEx has suspended NANO deposit and withdrawal to ensure our users’ assets security until successful completion of maintenance.
Details

CoinEx Research Report

RESEARCH REPORT ABOUT SWERVE FINANCE
This research report will introduce The Swerve Finance. Swerve Finance, developed by an anonymous user or team, announced plans to release a 100% community-owned fork of the popular stablecoin swap platform Curve Finance. Its website claims the forked protocol will be free from numerous issues that have allegedly occurred since launch, among them pre-mining and centralized control by founders.
Full report by Gamals Ahmed, CoinEx Business Ambassador
https://preview.redd.it/amhnqq5u4tp51.jpg?width=1148&format=pjpg&auto=webp&s=16f72c99cb4419b7eb943c5036723e91841f19d1

Important Services

ABOUT CoinEx

As a global and professional cryptocurrency exchange service provider, CoinEx was founded in December 2017 with Bitmain-led investment and has obtained a legal license in Estonia. It is a subsidiary brand of the ViaBTC Group, which owns the fifth largest BTC mining pool, which is also the largest of BCH mining, in the world.
CoinEx supports perpetual contract, spot, margin trading, and other derivatives trading, and its service reaches global users in nearly 100 countries/regions with various languages available, such as Chinese, English, Korean and Russian.
Click here to register on CoinEx
Reach CoinEx on TELEGRAM | TWITTER | FACEBOOK | WEBSITE | API| DOWNLOAD APP|
submitted by CoinExcom to Bitcoincash [link] [comments]

I found a tape I wasn’t supposed to listen to.

I plan on destroying this laptop after posting this and will soon be untraceable. I am reaching out because something is not right. I feel as if something just is not lining up right in the universe. I feel like I am out of place. I come to post because I am not sure how much longer I have. I was taking the trash out last week and I think I saw something I should not have. It was a full moon that night and I was doing my regular chores. Feed the dogs, clean the dishes, take the trash out. Easy stuff like any other night. When I got to the dumpster I saw a cassette player on the ground looking like it was to be thrown out. I thought to myself it was just trash but something caught my eye. There was a piece of tape on it with a sharpie written across it. It stated "LISTEN URGENT" so I put it in my pocket and took it home.
If I knew what was on that tape I would have not brought it home that night. I didn't have a pair of headphones to listen to it with or at least didn't care to look for one at the time. I had put the tape down on my desk and went to play some video games without thinking much of it at the time. You see I didn't have much going for me. My mother was a single mom and I was the man of the house. I liked to play video games because that is what made me happy. It was getting late so I turned off my monitor and went to bed.
I woke up the next morning thinking about the tape because I had a dream about it the night before. The dream consists of me going to the trash and finding the cassette tape then someone getting out of their car when I was walking home pushing me down and taking the tape from me. It was a man with a black overcoat but couldn't see much of his face since it was dark out. And as soon as he took it I woke up. I thought to myself that having a dream of it already had to mean something so I found some headphones and plugged them into the aux input and pressed play.
"What did you see that night" A man asked
"I was super drunk and all I remember was seeing some guy beat the shit out of some other guy outside the bar." A women said
"Where did this take place? The man asked
"In the alley besides the bar.... Can I please go now?" The women proclaimed.
"No, not yet we have some more questions for you..." The man said
"What was that?" The man asked
You could hear a crash or something and the tape cut out. What the fuck was I listening to? An interrogation with the police? All I know is there is more on the tape and I definitely shouldn't be listening to this. I clicked skip and play again and it started back up.
"Where were we... Sorry about the inconvenience miss." The man smirked
"Who are you guys anyways? The cops?" The women asked.
"Ahaha very funny... she thinks were the feds..." The man talking to his partner.
"You guys aren't the police???" "Then who are you guys?" The women starting to panic
"We are the guys they call when shit gets bad." The man said
"I think we are finished here... just state your name and age and your good to go."
"OK... Carly Johnson, 23"
Tape Ends
Who the fuck were they? Who is this girl Carly... I thought to myself what this tape was doing with me. I looked up this girl's name and I didn't believe my eyes. Here I am looking at her obituary. She died weeks ago. Cause of death: Suicide.
Where do I begin. I just heard a tape of seems to be the police interrogating Carly and she all of sudden kills herself what the actual fuck. I guess these are the guys they call when shit gets bad. It says she jumped over a bridge in the town over from me at midnight. Why would a girl just do this out of nowhere and sounded decently happy on the tape. But then I saw one last thing on her obituary... it said "There was no body found. She had left a note." So she went missing huh and they ruled it off as a suicide. I went back to the tape and to my surprise it had corrupted and I couldn't play anything back. Just great. I wanted to know who these guys were? Why did they want to talk to Carly? Why did Carly all of sudden disappear?
This was all so hard to wrap my head around. None of this should be my business but somehow I feel like it is. I never even knew Carly but some way I feel like I did. Weird right. Maybe you can tell me if I'm nuts or if it's humane to feel this way. I had another dream last night and to my surprise it had to do with the tape again. But this time it was very strange. I was on the bridge where Carly apparently did what she did and there was something on the ground in the middle of the bridge and I couldn't really make out what it was so I walked over and it was the same tape except the writing on it this time was "They did this." I then rubbed my eyes and woke up in a ton of sweat. So is this supposed to be a sign or something? Like what are these nightmares supposed to mean? I still am wondering who the men were that were talking with Carly. I started looking up cases of bar fights or anything to do with fights relevant to a bar. To my surprise I found the case. Case # 06-123 Bar stabbing leaving man dead. Looks like it was big in the local news. I do not watch the news much but now I know what they were talking to Carly about. This was much bigger than I thought. This is still an open investigation. I was skimming over the reports and one of the officers said that a private sector of the FBI would be taking over the case and no more was to be discussed publicly until the case is closed.
A private sector of the FBI is now involved what the fuck. In this tiny ass town the FBI is getting involved. This is all so much to take in. Seems like there is more to it though. The FBI got involved with some little stabbing at a bar. The news article said if there is any information to help the case to contact the link that was shared underneath the article. I clicked the link and it brought me to some government website to report tips or some bullshit. I started to read and it said "If there is any information on this case please contact this phone number [DISCLOSED INFORMATION]. I then read it said if anyone knew of a missing cassette tape that it is crucial to the investigation and no more information was shared after that. So wonderful, I now know that I am holding a crucial part of evidence of a case for the FBI and the contents were corrupted. I don't know what to do at this point... I still am going to be doing my research and I plan on getting rid of this cassette tape. I will be updating this post as soon as more information is shared or I find something. In the meanwhile I need to stay on the low because there could be and will be people looking for me and what I have acquired.
Ill post an update in 24 hours. Until then, Goodbye.
Update 2
I only got a few hours of sleep last night... thoughts running through my head constantly. I promised an update and here it is. I have been thinking of what to do with this tape. I think the best option would be to get rid of it but I think that would be a felony or something so that options off the list. The second option I have is to give it to them. Yes, I know it sounds crazy absolute delusional you might say. OK let me stop you right there. The plan is to drop it off at a discrete location and call in an anonymous tip. Seems easy right. I hope. I have wiped off all my prints on it and ripped off the tape on the front of it. I am going to go to a gas station about 45 minutes away from here. There should be a payphone and the angle the cameras are at should not see me if I pull my car up to the left of the building. I will wear gloves for prints and wear a hoodie. I should be fine, no evidence that I was there with the tape. I will get back to you after the job is done. Wish me luck.
Update 3
So it went exactly like planned. I parked my car where there was no surveillance and got out with my black hoodie and called the number that I saw online. I said "The cassette tape is in the bathroom of the gas station for case # 06-123 and hung up. I got out of there as fast as possible. I am now home and well. I am still curious and looking into Carly. I think I came upon something. It is very unusual. Her mother wrote a Facebook post saying "I know those cops are fucking corrupt... they never even looked into her case!" I thought to myself how weird this is. Her own mother must have known something was up too. No body found, A bridge that no one was on that night. I know no one was on it because there was a detour for maintenance on the bridge that afternoon. The last thing that doesn't add up is someone had to write on that tape stating LISTEN URGENT. If they were police wouldn't that tape be in evidence or something. Correct me if I'm wrong but this shit doesn't just go missing and wind up at my dumpster. I have a feeling that the bridge is one of the places that I will find something leading me to what happened to Carly and why the FBI are involved. I am going to take a drive to that bridge and see if I can find anything. I'll update you when I get back.
Update 4
I think I came upon something I wasn't supposed to once again... I found a necklace underneath the bridge. Here is a picture of what I found. necklace You see I don't think the police actually investigated or they would have already found this. Still we aren't even dealing with the local police anymore we are dealing with some special sector of the FBI. I also found one other thing and I feel as if posting a picture would compromise this second tape I found. I have not brought my headphones with me but have a feeling whatever is on this second tape that it will be great. I am very concerned about Carly and what happened to her. Maybe she is on this tape again, maybe it will lead me somewhere. If I post this on reddit I have a feeling the FBI will be notified or something like that. So for precautionary reasons I will not give the name of the bridge or any locations further that could potentially fuck this up. I plan on digging deep and will share it all with you. Why does the FBI want something to do with some girls suicide?? Who were those men on the tape???? Moments ago I just got a call from a blocked caller... I declined the call because I never normally accept blocked caller ids. They left a message. He said
"Turn your eyes away from this or else... You have been warned." ENDS CALL
I am very frustrated right now because they somehow found my phone number. I thought I took all the precautionary measures. I guess the government is always watching though. My feeling is that I will have to get rid of everything that ties me to this case. I have looked up how to destroy a hard drive and it is as easy as swiping a strong magnet over it.
I want to mention to whoever is reading this that if you know who Carly Johnson is and or have any clues on what happened to her please indulge me. Do not share anything with anyone else except my account. You see you may not realize the full extent of this situation but, no need to worry. I will encrypt everything that is sent and no information will get out to the Federal Bureau of Investigation.
Should I be scared? Because I am terrified. I need to know these answers because I am so devoted already. I was just warned to stop looking into this. I have no idea how they got my phone number. I believe we are dealing with not just a suicide but, possibly a government cover up or something worse. If anyone has any tips on what I could possibly do that would help please comment, I can take all the help I can get. They will probably see this post and what I have discussed with you all. I am going to upload all my research onto a USB and slide a magnet over my computer's hard drive now. I will reach back with more news after I have found a secure location to proceed with my updates. Until then....
-Colin.
Update 5
So I am currently posting this on a burner phone that I recently bought. I have booked a motel room with cash and I will use their wifi with a VPN. I would like to first express that whoever called me yesterday that I will not stop until I get the answers I need. I am sure with whoever has been reading my recent posts that they wouldn’t like me to stop looking either. I will bring justice for Carly and her grieving mother. I know that the government has something to do with this. I have got some feedback saying that the bridge might have another tape possibly. To my surprise there was and I just listened to it. I’ll replay it for you.
[Play]
“Hello… I don’t have much time to say what I need to say. I recently found something and it needs to be shared with the world. My name is Carly Johnson…”
“They are really close right now… I can see their flashlights through the trees. I am under some type of bridge.”
“I have recently come upon a file that was on a USB which was sent to my house…. Its title is Project Sight and the public needs to be aware of what I found.”
“It has many many documents containing all sorts of stuff including Area 51, The Roswell Incident, and various pictures of these very tall what seems to be creatures. So many classified documents on this file.
“I have made a backup of the file and it is located in my g---
[Cuts out]
Well shit, we finally know what we are dealing with. They brought out the FBI because it is a national threat which is out there on that USB. What was she about to say… she cut out saying something that started with a g but I have no clue. I am going to need help with this one. Please give me your thoughts on where she may have hid the backup. I have a feeling that they will find it before I do. I need to find that USB before it gets destroyed. I am not staying another night at this motel. I am going to switch it up so it is hard to track my footprints. I will be ok with my funds for now because I transferred what I had left in my savings and converted it into bitcoin. Hopefully I don’t have to explain why I did that. Once I am done packing up here and on the road I will proceed with another update.
Update 6
I stopped at a local convenience store near me and got myself some snacks and water for the road. This blue raspberry Slurpee is pretty good right now. I wanted to go to a local library to proceed with my updates but none of them are open because of this whole quarantine thing. I am probably better off in the motels though. I backed up the tape to my USB and set a password on it so no one can access it. I most likely am a current threat to the FBI so I don’t know how long I will have to stay moving. My plan is eventually to bunker down somewhere but until then I need to keep moving. I also have this cheap laptop I brought to access files that I cant on my phone. I was looking more into Carly's assets through some public info websites and such, you can use Whitepages plus to get a lot on someone. You can access background checks and look into someone's past, It is pretty crazy what you can get on someone. I also was looking through her Facebook and found an older post with her dad working on a project car. Looks like one of those storage garages that you can rent. She doesn’t post much. All family related stuff and a couple friends. Guess she kept more to herself. I am curious about when she said it was called Project Sight. Why would they call this file that in specific? Who knows. Do you think it would be a good idea to talk to her mom? Probably not, now that I am thinking of it. The FBI is probably all over her house. Hmm wait a minute, I remember that her mother had a Facebook page. Maybe I’ll send her a message where we could maybe meet up or something in private. She probably would give insight on what Carly said on the tape. I pulled into a parking lot that seems to be pretty empty. I want to try and take a nap and maybe wake up with a new idea or something.
Update 7
Fuck me. A cop just woke me up by knocking on my window…
“Hello officer, is there a problem?”
“I don’t think there has to be one, are you a little tired?”
“Yeah, I pulled over in this parking lot to clear my head and take a little nap.”
“Gotcha, you got any Identification on you?”
“Yes sir, can I grab it out of my glove box?”
“Yes, just no sudden movements.”
“OK, here is my registration and proof of insurance as well as my I.D.”
“Thanks for being so cooperative, let me run your stuff and you’ll be on your way shortly.”
He went back to his vehicle and I don’t know what he is going to find. What if the FBI put a warrant out for me or something?! I am probably just super anxious because of this situation. They want to keep everything top secret so they won't involve the police. He just got out and is walking back now.
“Here you are *hands back documents*.... You're a little ways from home aren’t you?
“Yeah, my Aunt lives out here and I came out to visit her.”
“Alrighty, I don’t see a need to cite you or anything so I’ll leave you with a verbal warning so just try to sleep somewhere else next time … OK? “Thank you again… have a good one.”
Well that could have gone a lot worse. I looked up the mother's address and it is only an hour from me. I am going to call her by the name Catie from now on. I made a Facebook account with this burner and messaged Catie on messenger saying “I know what happened to your daughter Carly… they faked it.” [SENT] Hopefully she sees this soon and we can chat a little bit and hopefully it helps to find that backup.
Update 8
So she read my message a moment ago and responded with “Who are you?” I responded with “Meet me at the Franksville park in 20 minutes, I am here to help not hurt. Please do not bring the police… they covered this up.” I am already parked here where I can see the parking lot but no one will be able to clearly see me staking it out. If the police roll up to the park I will exit through the back. If she comes and she is in a black jeep then I will text her again telling her to go to the bench across from her and wait for me. Hopefully all goes to plan.
[20 minutes later]
Great, she just pulled up and no cops. I messaged her the message and am waiting for her to do as directed. I talked to her for a while, probably a good half hour. I wrote down what I thought were the most important things she said.
“Father was a military officer”
“Dropped out of college”
“Top of her class”
“Public storage garage”
“Police searched Carly's house without proper consent”
“Computer and journal missing”
This was the farthest I have been in this case. Now that whoever is watching just know that I am currently one step ahead of you in every way now. I have developed different plans based on what might happen and every possible outcome and how to counter the bureau. I may not have the man power the FBI does, but I do have more knowledge now. So just know
I am coming for you … I will ruin you.
I am now taking the cellphone battery out and disposing of it. Until the next update….
Goodbye.
-Colin
Update 9
A lot happened yesterday, first of all it was mothers day. I was debating if I should go back to my moms house because someone could be posted out front waiting for me to return. I was wrong and the night went well. I left around 9 pm to find this USB. Someone that wants to remain anonymous direct messaged me and said they thought that the storage unit might be where she put the backup. I looked into it. I knew the number which I will not say for my own protection but Catie gave me the number of the storage garage. She said that she never had the key but she helped enough and that wouldn't be a problem for me. I went to the main office of the storage rentals and bought myself one near Carly's garage. This way I can have access to the property without suspicion. One thing that is really beneficial to having a pass code to the main gate now is that I can come whenever I choose. This place is 24 hour service. OK so now that I have developed a plan on how to get in now, I need to pick her lock.
It should be pretty easy if there are no cameras and if no one is working. I haven't really scoped anything out for assurances but hopefully it all goes to plan. On a side note I have been contacted again by that number, they sent me a picture of my car ... my actual car ... Shit. OK so they most definitely are watching me but that was from last night so I don't know if they are currently. If I do post this post just know that I am safe and have acquired the USB hopefully. I am going to take bolt cutters and a hammer to see if I can just break the tiny lock to get in. I will update you when I am back.
Update 10
OK I am going to choose my next choice of words very carefully. I found what I needed ... what I was looking for, for the last couple of days. I broke into the garage and there was this nice 1976 mustang cobra, what a beautiful car. I turned my phone's flashlight on and looked in the back of the garage. There was this tool box and I looked all through it, but didn't find anything in that. Next, I went to the car and it was open how fortunate ... I looked in the glove box and I found something. It was in this tiny envelope with the envelope saying "Insurance". OK I got what I came for and shut the door to the garage and left. I plugged the USB into my tiny laptop and it came up. First file "Project Sight", I clicked on it and 4 more files came up. 1st "Access point 51 [Classified]", 2nd file "Roswell, New Mexico [Classified]", 3rd file "JPEG File [Classified].
What was on these files I can't really describe. I need a little more time to wrap my head around all this information and figure out what to do with it. The weirdest of them all was the JPEG files, there were at least dozens of pictures that were all super blurry but mostly they all had one similar trait. At least 7 foot tall and a very large round head. They appeared to be a darker gray color and that's about all, The pictures were all in black and white though so that was not helpful. I need to know what to do with this USB. I think I am going to make a back up somewhere and place it somewhere where no one will find it. If these men do come for me I do not want them to win. So I set up some posts that will eventually post automatically within 48 hours of no account activity. I am still posting on a burner phone at the moment. All I ask if I go missing please don't let me end up like Carly. She said that this information needed to be shared with the world. I want to avenge her. The FBI will not get away with this. If these posts get deleted I have set up logs to be saved and they will all be backed up and reposted automatically as well. Nobody can stop that process too.
They know what type of car I drive and where I live. They know I have this classified information and will not stop until they get what they want. I don't want to die. I am scared for my own life and safety of my family at this point in time. At this time I am writing this on my phone, I can see a black SUV parked 4 cars to my left in the Walmart parking lot. It may just be my anxiety but there are two men sitting in the front. I may be dead within the next day or taken. Who put that fucking tape at my dumpster in the beginning? Was it them? Did they watch what I did everyday and find my daily routine and match that to when I would take the trash out? Could they have placed the tape at a spot I could visibly see all on purpose, knowing that I would pick it up and listen to it. All for what though? Why me? What is the point of going after a teenage kid? I might just be going crazy because of all this. I would like to express....
Whatever does happen to me, just know if you do find a cassette tape at the dumpster, don't play it.
Until next update,
-Colin
Note - My automatic posts I have set up go off in the next 48 hours of inactivity of the account. I have hid the USB and a GPS coordinate of where it is hidden will go out to someone that I trust very well.
submitted by idonthavemuchtime12 to creepypasta [link] [comments]

Cafe Casino $10 no deposit bonus and 100 free spins

Cafe Casino $10 no deposit bonus and 100 free spins

Cafe Casino Free Spins & Welcome Bonus
Join Cafe Casino and collect a $10 free chip no deposit bonus! Additionally, new players get 100 free spins and a 350% welcome bonus. This is one of the best online casino bonuses out there. No bonus code needed!
>> Get Free Bonus Now <<

Cafe Casino Review

Cafe Casino provides an unrivaled level of service in the online gambling industry. The site hosts a large selection of online casino games including slots, blackjack, video poker, and table games. Boasting a progressive combination of traditional and cryptocurrency payment options, funding your account at Cafe Casino has never been easier. Exciting promotions, free spins, and perks points are just some of the things that await you.
  • Traditional and cryptocurrency payment methods accepted
  • Enjoy a variety of promotions and benefits
  • Available for players in the United States

Cafe Casino Bonuses and Promotions

Cafe Casino has attractive bonus offerings for its new players. There are a few different options available depending on exactly what you’re looking for, but we think most players will find that at least one of these promotions is worth taking.
Let’s start our Cafe Casino review with everyone’s favorite reward: free stuff! When you first sign up for an account here, you’ll get the Cafe Casino no deposit bonus. In this case, it's free chips that you can use in the lobby. You can use this money to play on any game you want, but it does come with some wagering requirements. Also, you’ll only be able to keep a maximum amount from this promotion, meaning that you can’t dream of winning a jackpot while on this promo. Still, it’s a free offer, so even with its restrictions, we imagine many players will want to give this one a shot.
Next up in our Cafe Casino review is a 500% matching bonus worth as much as $5,000. This is a cashable bonus, meaning that you’ll be able to withdraw not only your winnings but any bonus funds left over once you’ve cleared the promotion. In this case, there is a playthrough requirement on the combined bonus and deposit amount, and your cash out will be limited depending on the amount you’ve deposited.
The final welcome offer we’d like to discuss in our Cafe Casino review is their Bitcoin exclusive deal. This massive 600% match bonus can only be claimed when making a deposit through the popular cryptocurrency. Much like the previously mentioned 500% offer, there are playthrough requires as well as cash out limitations.
That maximum cash out clause is a growing trend and not one we’re a big fan of. However, this site gives you a way around it via their No-Max Welcome Bonus, which is also cashable. This version of the promotion only offers a 100% match of up to $1,000 but comes with no maximum withdrawal. As an added benefit, there’s also only a smaller playthrough requirement than the larger offer.
We should note that not all games contribute equally to these bonuses. While all slots, scratch cards, keno, and other “specialty” games count for their full amount, other games contribute smaller percentages of their bets towards your wagering requirement.
>> Get Free Bonus Now <<

Cafe Casino Software and Other Games

Speaking of games, it’s time to take a closer look at what's available to play at Cafe Casino. You’ll find a mix of online gambling games from various providers, most notably Rival and Realtime Gaming (RTG). These two software providers offer up very different styles of gaming
As at most online gaming sites, slots make up most of your choices here. However, the use of RTG software means that you’ll be able to play a great number of table games and other selections as well. For instance, you don’t just have blackjack as an option, but several different variants of the game, including Single Deck Blackjack, European Blackjack, and a version with the Perfect Pairs side bet.
Plenty of other opportunities exist for table game players as well. Barracat, Craps, American Roulette, Tri Card Poker, and Pai Gow are just a few examples of the extensive list of table games available at Cafe Casino.
Plenty of video poker options are offered up as well, including classics like Jacks or Better, Deuces Wild, Bonus Poker, and Joker Poker. Many of these games are presented in a variety of different formats, ranging from single-hand machines to those that allow you to play 52 hands at once. You can also find scratch cards, bingo games, keno and more as you work your way through the software.
Most play on this online casino is conducted through an instant play, no download software platform that you can access directly from your web browser. No special software is necessary; it’s always best to keep your browser up to date to ensure compatibility, however. The site is also mobile-optimized, and easy to navigate on smartphones and tablets. Our Cafe Casino review team found it to work perfectly on both iOS and Android devices.
>> Get Free Bonus Now <<

Cafe Casino Banking and Cashouts

If you’re ready to make your first deposit here, you’ll find that common options are provided for, most notably the use of Visa or MasterCard credit cards. You’ll also be able to make deposits by Bitcoin, a cryptocurrency that offers a level of security and anonymity you won’t find in traditional payment methods. Our Cafe Casino review team finds Bitcoin is a fast and easy withdrawal method, though alternatives are available and are promptly processed.
Our review of Cafe Casino’s withdrawals reveals the same options available as deposits, with the addition of check by courier and bank wire. Bitcoin withdrawals are almost instant, and other methods can take between 4-7 business days to arrive. Regardless of your online gambling needs, Cafe Casino has a payment method that will see your earnings returned to you in a safe and timely fashion.

Support at Cafe Casino

If you ever have any questions when you play at Cafe Casino, the site comes equipped with a detailed FAQ section. Here you’ll find helpful answers to reoccurring questions, such as what countries are restricted, mobile compatibility, and withdrawal times.
Should the FAQ section not have the answer to your inquiry, we recommend contacting Cafe Casino’s qualified support staff. They are available 24/7 on phones, live chat, and email. We found their staff to be professional, polite, and informative whenever we required their assistance.

Our Verdict of Cafe Casino

Our Cafe Casino online review team found that this online gambling site has a lot of incredible elements. With good game selection, great bonus options, and the backing of a well-known network, this casino has established itself as a key player in the market. If you’re looking for a new site to add to your rotation or a place to get started with Internet gaming, we’d recommend giving Cafe Casino a shot.
Play at Cafe Casino today. With a special Cafe Casino no deposit bonus that does the job like a shot of espresso, and a choice of one of three generous welcome offers after that, this is an online casino that really knows how to keep you going.
>> Get Free Bonus Now <<
submitted by freespinsgaming to u/freespinsgaming [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethereum [link] [comments]

Bitcoin Privacy: Staying anonymous when buying, selling & using Bitcoin Cash HOW TO BUY BITCOIN with CASH - ANONYMOUSLY & QUICKLY Buying bitcoin completely anonymously - using gift cards Converting Bitcoins to Cash Anonymously from ATMs around the World How to make your BITCOIN Transactions ANONYMOUS & PRIVATE?

There are methods to buy Bitcoin anonymously with cash such as Paxful or Bitcoin ATMs. Furthermore, there are places that require minimal identification and not necessarily your true identity, like BitQuick. Lastly, to really get ‘off the grid’ and become completely anonymous you will require solutions such as Tor and TAILS, coin mixers, a VPN provider, and more. The price for anonymity is ... Bitcoin ATMs often use APIs directly linked to cryptocurrency exchanges to purchase coins, and naturally, the ATM operator will add a service fee on the transaction too. Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics. A large percentage of Bitcoin enthusiasts are libertarians, though people of all ... Bitcoin has many advantages as a currency including being very secure, but it's not private or anonymous. However, you can buy and pay with bitcoin anonymously if you take the right precautions. We explain how to do this step-by-step in this post. Bitcoin Cash will be launched soon. Bitcoinmix.org: Plans to Add a Bitcoin Cash Mixing Solution in 2020 Outstanding features, including in-house customer support, full HTTPS security backed by a legitimate SSL certificate, and complete user anonymity make Bitcoinmix.org the best crypto mixer for non-dark web users.

[index] [27588] [24239] [41609] [17375] [2713] [4313] [22147] [22404] [10790] [22890]

Bitcoin Privacy: Staying anonymous when buying, selling & using Bitcoin Cash

Buy & Withdraw your bitcoin with cash With PCS Mastercard & Other... Anonymous, quick BITCOIN CENTRAL SINCE 2011 Http://bitcoin-central.com/ This presentation will provide information on a range of topics, but will primarily focus on Bitcoin privacy and remaining anonymous when using Bitcoin Cash. - Buying/Selling Bitcoin Cash anonymously. Converting Bitcoins to Cash Anonymously from ATMs around the World, www.Exkash.com, bitcoin to cash anonymous, Canada Bitcoin to Cash, Australia Bitcoins ATM Card, india Bitcoin visa Card, how to ... Buy Bitcoin Anonymously Easy & Fast With Your Debit Card Or Gift Cards - Duration: 13 ... How to Buy or Sell Bitcoin Cash Anonymously in 2020 - Duration: 15:52. CoinSpice 13,309 views. 15:52. Make ... You may not be able to buy Bitcoin completely anonymously, but some ways do protect your privacy more than others. This video shows 5 ways you can try purchasing bitcoins anonymously! If you have ...

#