The 5 Best Ways to Buy Bitcoin - Quickly & Safely [2020]

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Bob The Magic Custodian



Summary: Everyone knows that when you give your assets to someone else, they always keep them safe. If this is true for individuals, it is certainly true for businesses.
Custodians always tell the truth and manage funds properly. They won't have any interest in taking the assets as an exchange operator would. Auditors tell the truth and can't be misled. That's because organizations that are regulated are incapable of lying and don't make mistakes.

First, some background. Here is a summary of how custodians make us more secure:

Previously, we might give Alice our crypto assets to hold. There were risks:

But "no worries", Alice has a custodian named Bob. Bob is dressed in a nice suit. He knows some politicians. And he drives a Porsche. "So you have nothing to worry about!". And look at all the benefits we get:
See - all problems are solved! All we have to worry about now is:
It's pretty simple. Before we had to trust Alice. Now we only have to trust Alice, Bob, and all the ways in which they communicate. Just think of how much more secure we are!

"On top of that", Bob assures us, "we're using a special wallet structure". Bob shows Alice a diagram. "We've broken the balance up and store it in lots of smaller wallets. That way", he assures her, "a thief can't take it all at once". And he points to a historic case where a large sum was taken "because it was stored in a single wallet... how stupid".
"Very early on, we used to have all the crypto in one wallet", he said, "and then one Christmas a hacker came and took it all. We call him the Grinch. Now we individually wrap each crypto and stick it under a binary search tree. The Grinch has never been back since."

"As well", Bob continues, "even if someone were to get in, we've got insurance. It covers all thefts and even coercion, collusion, and misplaced keys - only subject to the policy terms and conditions." And with that, he pulls out a phone-book sized contract and slams it on the desk with a thud. "Yep", he continues, "we're paying top dollar for one of the best policies in the country!"
"Can I read it?' Alice asks. "Sure," Bob says, "just as soon as our legal team is done with it. They're almost through the first chapter." He pauses, then continues. "And can you believe that sales guy Mike? He has the same year Porsche as me. I mean, what are the odds?"

"Do you use multi-sig?", Alice asks. "Absolutely!" Bob replies. "All our engineers are fully trained in multi-sig. Whenever we want to set up a new wallet, we generate 2 separate keys in an air-gapped process and store them in this proprietary system here. Look, it even requires the biometric signature from one of our team members to initiate any withdrawal." He demonstrates by pressing his thumb into the display. "We use a third-party cloud validation API to match the thumbprint and authorize each withdrawal. The keys are also backed up daily to an off-site third-party."
"Wow that's really impressive," Alice says, "but what if we need access for a withdrawal outside of office hours?" "Well that's no issue", Bob says, "just send us an email, call, or text message and we always have someone on staff to help out. Just another part of our strong commitment to all our customers!"

"What about Proof of Reserve?", Alice asks. "Of course", Bob replies, "though rather than publish any blockchain addresses or signed transaction, for privacy we just do a SHA256 refactoring of the inverse hash modulus for each UTXO nonce and combine the smart contract coefficient consensus in our hyperledger lightning node. But it's really simple to use." He pushes a button and a large green checkmark appears on a screen. "See - the algorithm ran through and reserves are proven."
"Wow", Alice says, "you really know your stuff! And that is easy to use! What about fiat balances?" "Yeah, we have an auditor too", Bob replies, "Been using him for a long time so we have quite a strong relationship going! We have special books we give him every year and he's very efficient! Checks the fiat, crypto, and everything all at once!"

"We used to have a nice offline multi-sig setup we've been using without issue for the past 5 years, but I think we'll move all our funds over to your facility," Alice says. "Awesome", Bob replies, "Thanks so much! This is perfect timing too - my Porsche got a dent on it this morning. We have the paperwork right over here." "Great!", Alice replies.
And with that, Alice gets out her pen and Bob gets the contract. "Don't worry", he says, "you can take your crypto-assets back anytime you like - just subject to our cancellation policy. Our annual management fees are also super low and we don't adjust them often".

How many holes have to exist for your funds to get stolen?
Just one.

Why are we taking a powerful offline multi-sig setup, widely used globally in hundreds of different/lacking regulatory environments with 0 breaches to date, and circumventing it by a demonstrably weak third party layer? And paying a great expense to do so?
If you go through the list of breaches in the past 2 years to highly credible organizations, you go through the list of major corporate frauds (only the ones we know about), you go through the list of all the times platforms have lost funds, you go through the list of times and ways that people have lost their crypto from identity theft, hot wallet exploits, extortion, etc... and then you go through this custodian with a fine-tooth comb and truly believe they have value to add far beyond what you could, sticking your funds in a wallet (or set of wallets) they control exclusively is the absolute worst possible way to take advantage of that security.

The best way to add security for crypto-assets is to make a stronger multi-sig. With one custodian, what you are doing is giving them your cryptocurrency and hoping they're honest, competent, and flawlessly secure. It's no different than storing it on a really secure exchange. Maybe the insurance will cover you. Didn't work for Bitpay in 2015. Didn't work for Yapizon in 2017. Insurance has never paid a claim in the entire history of cryptocurrency. But maybe you'll get lucky. Maybe your exact scenario will buck the trend and be what they're willing to cover. After the large deductible and hopefully without a long and expensive court battle.

And you want to advertise this increase in risk, the lapse of judgement, an accident waiting to happen, as though it's some kind of benefit to customers ("Free institutional-grade storage for your digital assets.")? And then some people are writing to the OSC that custodians should be mandatory for all funds on every exchange platform? That this somehow will make Canadians as a whole more secure or better protected compared with standard air-gapped multi-sig? On what planet?

Most of the problems in Canada stemmed from one thing - a lack of transparency. If Canadians had known what a joke Quadriga was - it wouldn't have grown to lose $400m from hard-working Canadians from coast to coast to coast. And Gerald Cotten would be in jail, not wherever he is now (at best, rotting peacefully). EZ-BTC and mister Dave Smilie would have been a tiny little scam to his friends, not a multi-million dollar fraud. Einstein would have got their act together or been shut down BEFORE losing millions and millions more in people's funds generously donated to criminals. MapleChange wouldn't have even been a thing. And maybe we'd know a little more about CoinTradeNewNote - like how much was lost in there. Almost all of the major losses with cryptocurrency exchanges involve deception with unbacked funds.
So it's great to see transparency reports from BitBuy and ShakePay where someone independently verified the backing. The only thing we don't have is:
It's not complicated to validate cryptocurrency assets. They need to exist, they need to be spendable, and they need to cover the total balances. There are plenty of credible people and firms across the country that have the capacity to reasonably perform this validation. Having more frequent checks by different, independent, parties who publish transparent reports is far more valuable than an annual check by a single "more credible/official" party who does the exact same basic checks and may or may not publish anything. Here's an example set of requirements that could be mandated:
There are ways to structure audits such that neither crypto assets nor customer information are ever put at risk, and both can still be properly validated and publicly verifiable. There are also ways to structure audits such that they are completely reasonable for small platforms and don't inhibit innovation in any way. By making the process as reasonable as possible, we can completely eliminate any reason/excuse that an honest platform would have for not being audited. That is arguable far more important than any incremental improvement we might get from mandating "the best of the best" accountants. Right now we have nothing mandated and tons of Canadians using offshore exchanges with no oversight whatsoever.

Transparency does not prove crypto assets are safe. CoinTradeNewNote, Flexcoin ($600k), and Canadian Bitcoins ($100k) are examples where crypto-assets were breached from platforms in Canada. All of them were online wallets and used no multi-sig as far as any records show. This is consistent with what we see globally - air-gapped multi-sig wallets have an impeccable record, while other schemes tend to suffer breach after breach. We don't actually know how much CoinTrader lost because there was no visibility. Rather than publishing details of what happened, the co-founder of CoinTrader silently moved on to found another platform - the "most trusted way to buy and sell crypto" - a site that has no information whatsoever (that I could find) on the storage practices and a FAQ advising that “[t]rading cryptocurrency is completely safe” and that having your own wallet is “entirely up to you! You can certainly keep cryptocurrency, or fiat, or both, on the app.” Doesn't sound like much was learned here, which is really sad to see.
It's not that complicated or unreasonable to set up a proper hardware wallet. Multi-sig can be learned in a single course. Something the equivalent complexity of a driver's license test could prevent all the cold storage exploits we've seen to date - even globally. Platform operators have a key advantage in detecting and preventing fraud - they know their customers far better than any custodian ever would. The best job that custodians can do is to find high integrity individuals and train them to form even better wallet signatories. Rather than mandating that all platforms expose themselves to arbitrary third party risks, regulations should center around ensuring that all signatories are background-checked, properly trained, and using proper procedures. We also need to make sure that signatories are empowered with rights and responsibilities to reject and report fraud. They need to know that they can safely challenge and delay a transaction - even if it turns out they made a mistake. We need to have an environment where mistakes are brought to the surface and dealt with. Not one where firms and people feel the need to hide what happened. In addition to a knowledge-based test, an auditor can privately interview each signatory to make sure they're not in coercive situations, and we should make sure they can freely and anonymously report any issues without threat of retaliation.
A proper multi-sig has each signature held by a separate person and is governed by policies and mutual decisions instead of a hierarchy. It includes at least one redundant signature. For best results, 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.

History has demonstrated over and over again the risk of hot wallets even to highly credible organizations. Nonetheless, many platforms have hot wallets for convenience. While such losses are generally compensated by platforms without issue (for example Poloniex, Bitstamp, Bitfinex, Gatecoin, Coincheck, Bithumb, Zaif, CoinBene, Binance, Bitrue, Bitpoint, Upbit, VinDAX, and now KuCoin), the public tends to focus more on cases that didn't end well. Regardless of what systems are employed, there is always some level of risk. For that reason, most members of the public would prefer to see third party insurance.
Rather than trying to convince third party profit-seekers to provide comprehensive insurance and then relying on an expensive and slow legal system to enforce against whatever legal loopholes they manage to find each and every time something goes wrong, insurance could be run through multiple exchange operators and regulators, with the shared interest of having a reputable industry, keeping costs down, and taking care of Canadians. For example, a 4 of 7 multi-sig insurance fund held between 5 independent exchange operators and 2 regulatory bodies. All Canadian exchanges could pay premiums at a set rate based on their needed coverage, with a higher price paid for hot wallet coverage (anything not an air-gapped multi-sig cold wallet). Such a model would be much cheaper to manage, offer better coverage, and be much more reliable to payout when needed. The kind of coverage you could have under this model is unheard of. You could even create something like the CDIC to protect Canadians who get their trading accounts hacked if they can sufficiently prove the loss is legitimate. In cases of fraud, gross negligence, or insolvency, the fund can be used to pay affected users directly (utilizing the last transparent balance report in the worst case), something which private insurance would never touch. While it's recommended to have official policies for coverage, a model where members vote would fully cover edge cases. (Could be similar to the Supreme Court where justices vote based on case law.)
Such a model could fully protect all Canadians across all platforms. You can have a fiat coverage governed by legal agreements, and crypto-asset coverage governed by both multi-sig and legal agreements. It could be practical, affordable, and inclusive.

Now, we are at a crossroads. We can happily give up our freedom, our innovation, and our money. We can pay hefty expenses to auditors, lawyers, and regulators year after year (and make no mistake - this cost will grow to many millions or even billions as the industry grows - and it will be borne by all Canadians on every platform because platforms are not going to eat up these costs at a loss). We can make it nearly impossible for any new platform to enter the marketplace, forcing Canadians to use the same stagnant platforms year after year. We can centralize and consolidate the entire industry into 2 or 3 big players and have everyone else fail (possibly to heavy losses of users of those platforms). And when a flawed security model doesn't work and gets breached, we can make it even more complicated with even more people in suits making big money doing the job that blockchain was supposed to do in the first place. We can build a system which is so intertwined and dependent on big government, traditional finance, and central bankers that it's future depends entirely on that of the fiat system, of fractional banking, and of government bail-outs. If we choose this path, as history has shown us over and over again, we can not go back, save for revolution. Our children and grandchildren will still be paying the consequences of what we decided today.
Or, we can find solutions that work. We can maintain an open and innovative environment while making the adjustments we need to make to fully protect Canadian investors and cryptocurrency users, giving easy and affordable access to cryptocurrency for all Canadians on the platform of their choice, and creating an environment in which entrepreneurs and problem solvers can bring those solutions forward easily. None of the above precludes innovation in any way, or adds any unreasonable cost - and these three policies would demonstrably eliminate or resolve all 109 historic cases as studied here - that's every single case researched so far going back to 2011. It includes every loss that was studied so far not just in Canada but globally as well.
Unfortunately, finding answers is the least challenging part. Far more challenging is to get platform operators and regulators to agree on anything. My last post got no response whatsoever, and while the OSC has told me they're happy for industry feedback, I believe my opinion alone is fairly meaningless. This takes the whole community working together to solve. So please let me know your thoughts. Please take the time to upvote and share this with people. Please - let's get this solved and not leave it up to other people to do.

Facts/background/sources (skip if you like):



Thoughts?
submitted by azoundria2 to QuadrigaInitiative [link] [comments]

What I currently use for privacy (after almost 2 years of long investing into it)

First of all, my threat model: I'm just an average person that wants to AVOID the maximum I can to be monitored and tracked by the government and big corps, a lot of people out there REALLY hate me and I've gone through lots of harassment and other stuff, I also plan to take my activism and love for freedom more seriously and to do stuff that could potentially lead me to very high danger or even put my life on the line. That being said, my main focus is on something that is privacy-friendly but also something with decent security (no point having a lot of privacy if a script kiddie can just break into it an boom, everything is gone) anonymity is also desirable but I'm pretty aware that true 100% anonymity is simply not possible and to achieve the maximum you can of it currently you'd have to give up A LOT of stuff in which I don't think I really could. So basically, everything that I said + I don't want to give up some hobbies of mine (as playing games etc)
Here's what I use/have done so far, most of it is based on privacytools.io list and research I've done.
Mobile:
Google Pixel 3a XL running GrapheneOS
Apps: Stock apps (Vanadium, Gallery, Clock, Contacts etc) + F-DROID, NewPipe, OsmAnd+, Joplin, Tutanota, K-9 Mail, Aegis Authenticator, KeePassDX, Syncthing, Signal, Librera PRO, Vinyl, Open Camera and Wireguard.
I also use BlahDNS as my private DNS.
Other smartphone stuff/habits: I use a Supershieldz Anti Spy Tempered Glass Screen Protector on my phone and I also have a Faraday Sleeve from Silent Pocket which my phone is on most of the times (I don't have smartphone addiction and would likely advice you to break free from smartphone addiction if you have it). I NEVER use bluetooth (thank god Pixel 3a have a headphone jack so yeah, no bluetooth earphones here) and always keep my Wi-Fi off if I'm not using it.
Computer:
I have a desktop that I built (specs: Asus B450M Gaming, AMD Ryzen 3 3300X, Radeon RX 580 8GB, 16GB DDR4 2666Mhz, 3TB HDD, 480GB SSD) that is dualbooted with QubesOS and Arch Linux.
Qubes is my main OS that I use as daily driver and for my tasks, I use Arch for gaming.
I've installed linux-hardened and its headers packages on my Arch + further kernel hardening using systctl and boot parameters, AppArmor as my MAC system and bubblewrap for sandboxing programs. I also spoof my MAC address and have restricted root access, I've also protected my GRUB with password (and use encrypted boot) and have enabled Microcode updates and have NTP and IPV6 disabled.
Also on Arch, I use iptables as a firewall denying all incoming traffic, and since it's my gaming PC, I don't game on the OS, instead, I use a KVM/QEMU Windows VM for gaming (search "How I Built The "Poor-Shamed" Computer" video to see what I'm talking about) I also use full disk encryption.
Software/Providers:
E-Mails: I use ProtonMail (Plus Account paid with bitcoin) and Tutanota (free account as they don't accept crypto payment yet, come on Tutanota, I've been waiting for it for 2 years already) since I have plus account on ProtonMail it allows me to use ProtonMail Bridge and use it on Claws Mail (desktop) and K-9 Mail (mobile) as for Tutanota I use both desktop and mobile app.
Some other e-mails habits of mine: I use e-mail aliases (ProtonMail plus account provides you with 5) and each alias is used for different tasks (as one for shopping, one for banking, one for accounts etc) and none of my e-mails have my real name on it or something that could be used to identify me. I also highly avoid using stuff that require e-mail/e-mail verification for usage (e-mail is such a pain in the ass tbh) I also make use of Spamgourmet for stuff like temporary e-mail (best service I found for this doing my research, dunno if it's really the best tho, heard that AnonAddy does kinda the same stuff but dunno, recommendations are welcomed)
Browsers/Search Engine: As mentioned, I use Vanadium (Graphene's stock browser) on mobile as it is the recommended browser by Graphene and the one with the best security for Android, for desktop I use a Hardened Firefox (pretty aware of Firefox's security not being that good, but it's the best browser for PC for me as Ungoogled Chromium is still not there in A LOT of things + inherent problems of Chrome as not being able to disable WebRTC unless you use an extension etc) with ghacks-user.js and uBlock Origin (hard mode), uMatrix (globally blocking first party scripts), HTTPS Everywhere (EASE Mode), Decentraleyes (set the recommended rules for both uBlock Origin and uMatrix) and Temporary Containers as addons. I also use Tor Browser (Safest Mode) on a Whonix VM on Qubes sometimes. DuckDuckGo is my to-go search engine and I use DNS over HTTPS on Firefox (BlahDNS as my provider once again)
browsing habits: I avoid JavaScript the maximum I can, if it's really needed, I just allow the scripts temporarely on uBlock Origin/uMatrix and after I'm done I just disable it. I also generally go with old.reddit.com instead of reddit.com (as JavaScript is not required to browse the old client), nitter.net for checking twitter stuff (although I rarely have something peaking my interest on Twitter) and I use invidious.snopyta.org as youtube front-end (I do however use YouTube sometimes if a video I wanna see can't be played on invidious or if I wanna watch a livestream) and html.duckduckgo.com instead of duckduckgo.com other than avoiding JavaScript most of my browsing habits are just common sense at this point I'd say, I also use privatebin (snopyta's instance) instead of pastebin. I also have multiple firefox profiles for different tasks (personal usage, shopping, banking etc)
VPN: I use Mullvad (guess you can mention it here since it's PTIO's recommended) paid with bitcoin and honestly best service available tbh. I use Mullvad's multihop implementation on Wireguard which I manually set myself as I had the time and patience to learn how.
password manager: KeePassXC on desktop and KeePassDX on my smartphone, my password database for my desktop is stored on a USB flash driver I encrypted with VeraCrypt.
some other software on desktop: LibreOffice (as a Microsoft Office substitute), GIMP (Photshop substitute), Vim (I use it for multiple purposes, mainly coding IDE and as a text editor), VLC (media player), Bisq (bitcoin exchange), Wasabi (bitcoin wallet), OBS (screen recording), Syncthing (file sync), qBitTorrent (torrent client) and Element (federated real-time communication software). I sadly couldn't find a good open-source substitute to Sony Vegas (tested many, but none was in the same level of Vegas imo, KDENLive is okay tho) so I just use it on a VM if I need it (Windows VM solely for the purpose of video editing, not the same one I use for gaming)
Other:
router: I have an Asus RT-AC68U with OpenWRT as its firmware. I also set a VPN on it.
cryptocurrency hardware wallet: I store all of my cryptocurrency (Bitcoin and Monero) on a Ledger Nano S, about 97% of my money is on crypto so a hardware wallet is a must for me.
I have lots of USB flash drivers that I use for Live ISOs and for encrypted backups. I also have a USB Data Blocker from PortaPow that I generally use if I need to charge my cellphone in public or in a hotel while on a trip (rare occasion tbh).
I have a Logitech C920e as webcam and a Blue Yeti microphone in which I never let them plugged, I only plug them if it's necessary and after I'm done I just unplug them.
I also have a Nintendo Switch Lite as a gaming console that I most of the times just use offline, I just connect to the internet if needed for a software update and then just turn the Wi-Fi off from it.
Other Habits/Things I've done:
payments: I simply AVOID using credit card, I try to always pay on cash (I live in a third-world country so thank god most of people here still depend on cash only) physically and online I try my best to either by using cryptocurrency or using gift cards/cash by mail if crypto isn't available. I usually buy crypto on Bisq as I just don't trust any KYC exchange (and neither should you) and since there aren't many people here in my area to do face to face bitcoin trade (and I'm skeptical of face to face tbh), I use the Wasabi Wallet (desktop) to coinjoin bitcoin before buying anything as this allows a bit more of privacy, I also coinjoin on Wasabi before sending my bitcoins to my hardware wallet. I also don't have a high consumerism drive so I'm not constantly wanting to buy everything that I see (which helps a lot on this criteria)
social media/accounts: as noted, aside from Signal and Element (which I don't even use that often) I just don't REALLY use any social media (tried Mastodon for a while but I was honestly felt it kinda desert there and most of its userbase from what I've seen were some people I'd just... rather don't hang with tbh) and, althoug not something necessary is something that I really advise people to as social media is literally a poison to your mind.
I also don't own any streaming service like Netflix/Amazon Prime/Spotify etc, I basically pirate series/movies/songs and that's it.
I've also deleted ALL my old accounts from social media (like Twitter etc) and old e-mails. ALL of my important and main accounts have 2FA enabled and are protected by a strong password (I use KeePass to generate a 35 character lenght password with numbers, capital letters, special symbols etc, each account uses a unique password) I also NEVER use my real name on any account and NEVER post any pictures of myself (I rarely take pictures of stuff if anything)
iot/smart devices: aside from my smartphone, I don't have any IOT/smart device as I honestly see no need for them (and most of them are WAY too expensive on third-world countries)
files: I constatly backup all of my files (each two weeks) on encrypted flash drivers, I also use BleachBit for temporary data cleaning and data/file shredding. I also use Syncthing as a substitute to stuff like Google Drive.
Future plans:
learn to self-host and self-host an e-mail/NextCloud (and maybe even a VPN)
find something like BurneHushed but FOSS (if you know any please let me know)
So, how is it? anything that I should do that I'm probably not doing?
submitted by StunningDistrust to privacytoolsIO [link] [comments]

Sobre Tibia, gold farmers y un caso de ayuda y éxito PT2. Son muy buenos consejos de cómo comenzar a programar profesionalmente

Una vez más, reconocimiento al autor original de los post International-Unit-8
Hello,

I have gotten so many replies and messages since my last post in this thread, that I can't answer them all individually. Previous topic:

https://www.reddit.com/TibiaMMO/comments/h8tu5u/a_great_tip_for_brazilians_venezuelans_and_othe

It has been shared on multiple subreddits so I have no idea where to even post this. But I'd like to come up with a follow-up thread with some more information. The internet is the most powerful tool that mankind has ever invented. You have the ability to reach thousands, millions and even billions of people with just a computer and some internet access.

If you're on this subreddit, chances are you're already playing Tibia and you already have a computer and internet access. It doesn't need to be the best internet, but as long as websites will load (eventually) you are good to go.

In this topic I will go more in-depth on web development and software engineering. If you have a very slow internet connection, you may want to look into web development instead of software development. An application/software is much heavier (larger file size) than a website. And most developer jobs require that you send and download files, back and forth, between you and your company's server. So if you feel like your internet is too slow to send a lot of files - do not worry! There are plenty of jobs.

First, I will go through some more details on how to learn web development and software development. After that, I will list a few other kinds of jobs that you can do remotely. These types of jobs can be done from anywhere in the world as long as you have internet access.



Part 1: Some languages you should learn

What is web development? Well, it can be a lot of things. You perhaps make websites for shops/restaurants/hair dressers/dentists, or you work for a big company and work on their web application, like Outlook, Discord or Spotify (which can all be accessed via a browser: their web app). You can also work with design and user experience, instead of programming. Being a web developer can mean so many different things, it's impossible to name them all. But most web developers are just developers: they program. They make websites, and they either sell the websites to companies (as a consultant) or you work full/part-time for a company.

I can not provide in-depth information about every single thing, but I can give you some pointers. The very basics any web developer should know is this:

HTML (HyperText Markup Language) - it's what almost all websites use as a foundation. This is not a programming language, but it is a markup language. If you want to build websites, you pretty much have to know this language. Don't worry though, it is easy. Not so much to learn. You can learn all about it in a few weeks.

CSS (Cascading Style Sheets) - it's what will add colors and shapes to your website. If you want to focus more on design (also known as front end development) then this is where you want to gain a lot of knowledge.

Python - A very simple language to learn. This language is very often the first programming language that developers start using. You can use it for a lot of things. This language is used in the back of a lot of websites. Google has been using Python for years and still is. It's great for web scraping and making web requests. If you want a language to practice your algorithms, then this language is awesome.

PHP - This used to be a very popular language, but not so much these days. However, it is very good to know how this works because it's very simple to learn and also very functional in some cases. If you want to transmit or withdraw information from a database to your website, then this (in combination with SQL) is a great way to do so. Whenever you make a login system or a contact form, the data must be sent somehow to a recipient or a database. PHP will help you do that. It is a server-side language, which means it will run in the back of the website.

SQL - To be able to communicate with databases (for example: save data, update data, or insert data) you can use different languages for that. But SQL is probably the most widely used language for this. It is basically just a bunch of commands that you tell your website or app to do. If you have a web shop for example, you will need a database to store all your product information in. You can for example use MySQL as your database and then use the SQL language to extract data from your database and publish it as a list of products on your website.

JavaScript - Perhaps the most powerful language at the moment. Anyone who is good at JavaScript will be able to learn most other modern programming languages. In recent years, the demand for good JavaScript developers has skyrocketed. It's because more applications are becoming web based, and JavaScript is probably among the most useful languages to use. You can use it for so many things. Previously JavaScript was only being run on the client side of the website (that means in the user's browser). But in recent years, there has been massive development of this language and you are now able to build servers, connect to databases and do very powerful web applications using just this language. A great tutorial for JavaScript was made by Tony Alicea: https://www.youtube.com/watch?v=Bv_5Zv5c-Ts This video is "just" 3.5 hours, but it's the intro. There is a much longer version of it, and you can download it for free if you search for it. Just find it as a torrent and watch it. It's probably the best tutorial I have seen for JavaScript.

C# - It's pronounced as "C Sharp". This language has been dominating the software engineering market for decades at this point. Everyone loves it. It's relatively easy to learn and you can build a lot of stuff in C#. It's very much like JavaScript, but focuses more on application development rather than website development. I would however try to avoid learning this language if you have very slow internet, since you will most likely be sending a ton of files back and forth. But if application (computer & phone) is your thing, then this language is great. There are so many tutorials on this, but there is 1 channel on YouTube which teaches a lot of the basics in C# (and many other languages) and that channel is called ProgrammingKnowledge. Sure, his C# videos may be old now but most of it is still relevant and useful. You will learn a lot by watching his videos. It's always good to start from the beginning and then when you're familiar with that, you can learn more about the recent updates in C#. https://www.youtube.com/watch?v=V2A8tcb_YyY&list=PLS1QulWo1RIZrmdggzEKbhnfvCMHtT-sA

Java - This is pretty much 90% identical to C# as I wrote above. Widely used, relatively easy to learn the basics and there's plenty of jobs. If you like making android apps, this language is for you.



Part 2: Technologies and useful tools

To become a web developer you will need a few tools. You need a text editor, a FTP client, a SSH client and some other things. Also a good browser.

Text editor: Visual Studio Code, Atom, Sublime Text, Brackets - There are many different text editors but at the moment, I highly recommend Visual Studio Code. It has so many built-in features it's honestly the only thing you may need.Don't forget to install Notepad++ as well - this very basic editor is so handy when you just quickly need to edit some files.

File archiving: WinRar, 7-Zip - You need some way of archiving projects and send it to your customer or employer. These are basic tools anyone should use. I personally use Winrar.

FTP (File Transfer Protocol): FileZilla - This tool will allow you to connect to your website's file manager and upload your files to it. There are many tools for connecting to an FTP server but this is the most popular one, it's simple and it works great.

VPS (Virtual Private Server): Amazon Web Services, Google Cloud - If you want to practice building web applications or want to host your own website as a fun project, it's great to use a VPS for that. Both Amazon and Google offers 365 days of free VPS usage. All you need is a credit card. However, they will not charge you, as long as you stay below the free tier limit. A VPS is basically a remote computer that you can connect to. I highly recommend that, if you have a slow internet connection. Those VPS-servers (by Amazon and Google) usually have 500mbit/s internet speed, which is faster than most countries in the world. You simply connect to them via Remote Desktop, or by SSH. Depending on what type of server you are using (Windows or Linux).

SSH (Secure Shell): Solar-PuTTY, PuTTY - If you for example have a web server where you store applications and files, a great way to connect to it is by using SSH. PuTTY is pretty much the standard when it comes to SSH clients. But I really love the version created by SolarWinds. When you download that one, do not enter your personal details. Their sales people will call you and haunt you! Haha.

File Searching: Agent Ransack - When you have many files and try to locate a specific document or file, you may want to use something like Agent Ransack. Much faster than the traditional search feature in Windows and it is much more accurate.

IDE / Code Editor: Visual Studio - Great tool to use when you want to create applications in C# for example. Do not confuse this with Visual Studio Code. These are two very different tools. This tool (Visual Studio) is more designed for Windows applications. Not just websites. I only recommend getting it if you plan to make programs for Windows.

Web host & domain: NameCheap, Epik, SiteGround - If you develop websites on your own, or maybe want to create a portfolio website, you will need a domain name and web hosting. I have personally used all of these 3 and they are very cheap. NameCheap has some of the cheapest domains and great web hosting for a low price. Their support is also great. Same with SiteGround. And if you want to buy a domain anonymously (with Bitcoin for example), then you can use Epik. Low prices and great customer service on all these 3 websites.

Web Server: XAMPP, Nginx - If you plan to practice PHP, you will need to have a web server on your local computer. If you have Windows, I would highly recommend installing XAMPP (Apache). It is very easy to use for beginners. If you're on Linux, I would recommend Nginx. Also check our PhpMyAdmin if you want to quickly setup a MySQL database locally.Bonus tip: If you use Visual Studio Code to create websites in HTML, CSS and JavaScript: then install the extension "live server" and you can run your applications on a live server without setting it up yourself. Tutorial: https://www.youtube.com/watch?v=WzE0yqwbdgU

Web Browser: Mozilla Firefox, Microsoft Edge Insider, Google Chrome - You need one of the latest web browsers to create websites these days. Since I prefer privacy over functionality, I've always loved Firefox. But recently, Microsoft has been improving its new version of Edge a lot (based on Chromium) and it's also very popular. If you want all your personal details to be saved and have good tools for web development, then use Google Chrome. Don't forget to utilize the built-in developer tools. You can access it in any of these browsers by pressing F12.



Other things you may want to look into:

Web services, SSL certificates, Search Engine Optimization, Databases, API, Algorithms, Data Structures



Part 3: Learning platforms

https://www.youtube.com/

https://www.w3schools.com/

https://leetcode.com/

https://stackoverflow.com/



If you want to learn in-depth about algorithms, data structures and more. Then you can take a look at the curriculum of the top-tier universities of USA. Such as: UC Berkeley, Harvard and MIT. These courses are very hard and are specifically for people who want to become experts in software engineering. You can enroll some of them for free, like the one on Harvard. And by having a such diploma (which costs $90 extra) can get you a lot of job opportunities. You can enroll those courses if you want, but it can have a fee. But just take a look at what they are studying and try do their exercises, that is 100% free. Get the knowledge. It's mostly on video too! These course below are the very same courses that many of the engineers at Facebook, Google, Amazon, Apple, Netflix, Uber, AirBnb, Twitter, LinkedIn, Microsoft, etc. has taken. It's what majority of people in Silicon Valley studied. And it's among the best classes that you can take. These course are held by some of the world's best professors in IT.



UC Berkeley: CS 61a & CS 61b:

https://inst.eecs.berkeley.edu/~cs61a/fa19/

Video playlist here: https://www.youtube.com/watch?v=0_LryzvBxFw&list=PL6BsET-8jgYVAaK0jGVTWr9R5g7kSMQ8i

https://inst.eecs.berkeley.edu/~cs61b/fa19/

Videos: https://www.youtube.com/channel/UCNBSbBTFx8nFahcQyZOYOgQ



Harvard University: CS50 (free enrollment --- 90$ to get a certificate).

https://online-learning.harvard.edu/course/cs50-introduction-computer-science



MIT (Massachusetts Institute of Technology): 6.006

https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-006-introduction-to-algorithms-fall-2011/

Held by Erik Demaine. One of the best - if not THE best - professor at MIT. Just look at this resume. It's almost 50 pages long! https://erikdemaine.org/cv.pdf



Part 4: Finding jobs

https://www.linkedin.com/

https://marketing.hackerrank.com/

https://www.glassdoor.com/index.htm

Facebook groups for web developers, freelancing, remote work, etc.

Portfolio / Code Sharing / Source Control:

https://github.com/



Part 5: Other types of jobs you can work with (remotely) - with/without coding experience

SEO (Search Engine Optimization)

Translations (Spanish/Portuguese, etc.)

Affiliate Marketing (look into Clickbank.com - and use Facebook Ads to promote products)

Design (web design, photo design, etc.)

Copywriting (write sales letters for companies)

Database manager (monitor and administrate a company's database)

YouTube - make YouTube videos to gain views. Views = Money.

Dropshipping (use Shopify.com for example) and sell products in a webshop. Benefit with dropshipping is that you don't personally store the products.

Customer support

more...? Banking, economics, etc.



You can find information about all of the things I have mentioned by using YouTube or Google search.

Hope it helps.



And I hope that in 1 year, there will be at least some new web developers in Brazil, Venezuela and other countries in South America.
submitted by jesuskater to memezuela [link] [comments]

Why I stopped using the dark web

My story begins a few years ago I decided to use my computer skills to run a small darknet forum mainly just to share information without censorship.
At first I was extremely paranoid about my site getting hacked and having my anonymity being compromised so I went online and began to research everything that I would need to ensure my own safety.
After countless days of scouring blogs, forums and other material I decided I was ready now I didn't have any money so I couldn't just buy a VPS and host the site off shore or whatever, so I decided to use my old laptop after all I wasn't planning on running a major website.
So after setting the server up and what I thought was literally every single thing I could to do harden it against attack I put the site online, everything went great for a couple of months, donations rolled in as the the user base grew larger and larger.
After around 5 months the user base had gotten so big I had to upgrade and migrate everything to a new PC which I built just to host the forum and from there everything seemed perfect, the site was running smoothly and there were no issues with the migration until one day when I came home and noticed the PC had frozen I didn't think much to it maybe just a software bug caused it so I rebooted and that's when it was clear to me something was wrong the PC lit up and beeped a few times then shut off so I thought to myself ok so it's a hardware issue, after a few hours trying to diagnose the issue I figured it out and it turned out the ram had been corrupted I took it back to the store since it was still under warranty, the customer rep just told me it might have just been a faulty stick.
When I got home I replaced the stick of ram and had the site back up and running within a few hours, everything seemed to be perfect again I apologized to the users for the down time and everyone seemed to be happy enough.
Fast forward a few more months, the forums been up and running for a around a year and a half now this is when things started to get really weird. I finished work on a Friday, it was a gorgeous day in the middle of summer I came home had something to eat and sat down in front my PC and noticed I had a message, upon opening the message I realised that somewhere I'd messed up now don't get me wrong I'm not like Assange or anything so I don't really know why anybody would actually target me but the world is a crazy place so whatever.
The message had my details from my name, address, bank details, passwords, private emails, private messages everything from nearly every single device I owned I freaked out and immediately took the PC offline, turned my internet off but little did I know that this guy had done his research after a couple of hours pacing my room I received a text message.
"I know everything about you"
The message was sent via some type of SMS service so there was no way to trace it and then my phone rang.
"Don't talk just listen, I know everything there is to know about you all I want is 2 Bitcoin or things get worse, I'll send you a text with the wallet details"
The phone call ended just as quickly as it started, I opened my laptop up and checked my Bitcoin wallet there was enough left over from the donations just to pay this guy off and hope that would be the end of it, so I entered the guys details and sent the payment, my phone rang again.
"Thank you for complying, unfortunately someone I know really likes you."
He hung up, panicking I tried calling the number back an automated message began to play "the number you have dialled has not been recognised"
A few hours pass and I began to think to myself well maybe the last call was just him having fun and decided after a long day I'd just go to bed.
Sometime around 2am I was woken up by the sound of banging at my front door, I jumped out of bed and turned on all the lights grabbing a knife from the kitchen I walked slowly towards the window and looked out I could see someone standing by a car when they spotted me they got in and drove off I rushed to the door in hopes I might be able to get a license plate but by the time I'd opened it they'd already turned the corner as I turned I noticed an envelope on the floor I picked it up, went back inside and locked the door, closed the curtains and sat in the kitchen I placed the envelope on the counter and stared at it for around half an hour trying to muster up the courage to open it, did these guys really come to my home I thought to myself.
After the half hour was up I decided enough was enough I opened the envelope and pictures fell out onto the counter they were of me sleeping, these guys had not only been outside my house they'd been inside whilst I was sleeping the images had been edited and strange love hearts had been added next to me so now I was sufficiently freaked out, I didn't go back to sleep and when the sun broke the darkness I decided to head to the police station and tell them everything I hadn't broken any laws so I hoped they would just help me at least after hours of explaining everything to them they told me there was nothing they could do.
At this point I had never felt so alone in the world, I was scared of what this guy was planning for me, I didn't have the foggiest idea what I was supposed to do or expect so I decided to wipe everything my laptop, PC and phone I picked up everything I needed stuffed it all into a bag and decided to leave I had a couple of friends that I knew I could rely on so I called up my old buddy Marcus and we met had a few beers and I explained everything to him, he offered me a place to stay and I hoped that would be the end of it how wrong I was.
A few days later it happened again there was a knock at the door first thing in the morning, me and Marcus both went out to find another envelope on the floor, same thing pictures of me sleeping but these were in Marcus's house I started freaking out again and Marcus just said
"Ok well we need to do something maybe set a trap or something"
So we went over numerous ideas everything you could think of from cameras to baiting him and we settled on the idea of staying up during the night and locking him in the room, we filled the bed up with pillows, setup cameras and even barred the windows in the room we hid in the room next door after a few hours had passed we heard the lock rattling on the front door and we knew it was game time, we'd left the door just slightly ajar so we could see outside as he went past and the moment he went into the room we both sprung to action quickly as we could we closed the door and locked it from outside using a chair and a metal bar there was only one way he was getting out and he'd have to destroy the door we could see the silhouette of him as he paced the room quietly it was creepy as fuck, we called the police as we kept an eye on him.
At last I thought I can finish this and move on with my life just as the police arrived we noticed the guy take a gun out and place it to his head, he held a sign up which read "I love you" and he pulled the trigger, the police barged in guns drawn told us both to get the floor, we complied and shouted "he's in there" pointing at the door.
The police removed the makeshift lock and entered the room, called for an ambulance and put me and Marcus in the back of a police car.
I'd been sat in the interview room for a good couple of hours I guess whilst they carried out the investigation when a detective came in and say down in front of me opening a folder and placing pictures on the table "Do you know her" "Her?" I said looking at the pictures "no" I replied confused , he looked at me and said "this is the person who's been stalking you" and he then began to tell me they had visited her home and found a shrine with photos of me all over the place from restaurants to the gym even shopping.
He went onto tell me that she'd been the one that sent the messages, made the phone calls etc and they'd also found a diary which had some kind of future plans for me and her, she wanted me to be her husband and we'd been chatting for around a year and half from the moment I started the forum after I explained everything the detective said I was lucky to be alive, she had actually planned to drug me and kidnap me, she had even made some makeshift lock bed so I wouldn't be able to escape.
To this day I feel lucky and I haven't been on the darkweb since.
submitted by GoobleGayTennis to scarystories [link] [comments]

Why I stopped using the dark web

My story begins a few years ago I decided to use my computer skills to run a small darknet forum mainly just to share information without censorship.
At first I was extremely paranoid about my site getting hacked and having my anonymity being compromised so I went online and began to research everything that I would need to ensure my own safety.
After countless days of scouring blogs, forums and other material I decided I was ready now I didn't have any money so I couldn't just buy a VPS and host the site off shore or whatever, so I decided to use my old laptop after all I wasn't planning on running a major website.
So after setting the server up and what I thought was literally every single thing I could to do harden it against attack I put the site online, everything went great for a couple of months, donations rolled in as the the user base grew larger and larger.
After around 5 months the user base had gotten so big I had to upgrade and migrate everything to a new PC which I built just to host the forum and from there everything seemed perfect, the site was running smoothly and there were no issues with the migration until one day when I came home and noticed the PC had frozen I didn't think much to it maybe just a software bug caused it so I rebooted and that's when it was clear to me something was wrong the PC lit up and beeped a few times then shut off so I thought to myself ok so it's a hardware issue, after a few hours trying to diagnose the issue I figured it out and it turned out the ram had been corrupted I took it back to the store since it was still under warranty, the customer rep just told me it might have just been a faulty stick.
When I got home I replaced the stick of ram and had the site back up and running within a few hours, everything seemed to be perfect again I apologized to the users for the down time and everyone seemed to be happy enough.
Fast forward a few more months, the forums been up and running for a around a year and a half now this is when things started to get really weird. I finished work on a Friday, it was a gorgeous day in the middle of summer I came home had something to eat and sat down in front my PC and noticed I had a message, upon opening the message I realised that somewhere I'd messed up now don't get me wrong I'm not like Assange or anything so I don't really know why anybody would actually target me but the world is a crazy place so whatever.
The message had my details from my name, address, bank details, passwords, private emails, private messages everything from nearly every single device I owned I freaked out and immediately took the PC offline, turned my internet off but little did I know that this guy had done his research after a couple of hours pacing my room I received a text message.
"I know everything about you"
The message was sent via some type of SMS service so there was no way to trace it and then my phone rang.
"Don't talk just listen, I know everything there is to know about you all I want is 2 Bitcoin or things get worse, I'll send you a text with the wallet details"
The phone call ended just as quickly as it started, I opened my laptop up and checked my Bitcoin wallet there was enough left over from the donations just to pay this guy off and hope that would be the end of it, so I entered the guys details and sent the payment, my phone rang again.
"Thank you for complying, unfortunately someone I know really likes you."
He hung up, panicking I tried calling the number back an automated message began to play "the number you have dialled has not been recognised"
A few hours pass and I began to think to myself well maybe the last call was just him having fun and decided after a long day I'd just go to bed.
Sometime around 2am I was woken up by the sound of banging at my front door, I jumped out of bed and turned on all the lights grabbing a knife from the kitchen I walked slowly towards the window and looked out I could see someone standing by a car when they spotted me they got in and drove off I rushed to the door in hopes I might be able to get a license plate but by the time I'd opened it they'd already turned the corner as I turned I noticed an envelope on the floor I picked it up, went back inside and locked the door, closed the curtains and sat in the kitchen I placed the envelope on the counter and stared at it for around half an hour trying to muster up the courage to open it, did these guys really come to my home I thought to myself.
After the half hour was up I decided enough was enough I opened the envelope and pictures fell out onto the counter they were of me sleeping, these guys had not only been outside my house they'd been inside whilst I was sleeping the images had been edited and strange love hearts had been added next to me so now I was sufficiently freaked out, I didn't go back to sleep and when the sun broke the darkness I decided to head to the police station and tell them everything I hadn't broken any laws so I hoped they would just help me at least after hours of explaining everything to them they told me there was nothing they could do.
At this point I had never felt so alone in the world, I was scared of what this guy was planning for me, I didn't have the foggiest idea what I was supposed to do or expect so I decided to wipe everything my laptop, PC and phone I picked up everything I needed stuffed it all into a bag and decided to leave I had a couple of friends that I knew I could rely on so I called up my old buddy Marcus and we met had a few beers and I explained everything to him, he offered me a place to stay and I hoped that would be the end of it how wrong I was.
A few days later it happened again there was a knock at the door first thing in the morning, me and Marcus both went out to find another envelope on the floor, same thing pictures of me sleeping but these were in Marcus's house I started freaking out again and Marcus just said
"Ok well we need to do something maybe set a trap or something"
So we went over numerous ideas everything you could think of from cameras to baiting him and we settled on the idea of staying up during the night and locking him in the room, we filled the bed up with pillows, setup cameras and even barred the windows in the room we hid in the room next door after a few hours had passed we heard the lock rattling on the front door and we knew it was game time, we'd left the door just slightly ajar so we could see outside as he went past and the moment he went into the room we both sprung to action quickly as we could we closed the door and locked it from outside using a chair and a metal bar there was only one way he was getting out and he'd have to destroy the door we could see the silhouette of him as he paced the room quietly it was creepy as fuck, we called the police as we kept an eye on him.
At last I thought I can finish this and move on with my life just as the police arrived we noticed the guy take a gun out and place it to his head, he held a sign up which read "I love you" and he pulled the trigger, the police barged in guns drawn told us both to get the floor, we complied and shouted "he's in there" pointing at the door.
The police removed the makeshift lock and entered the room, called for an ambulance and put me and Marcus in the back of a police car.
I'd been sat in the interview room for a good couple of hours I guess whilst they carried out the investigation when a detective came in and say down in front of me opening a folder and placing pictures on the table "Do you know her" "Her?" I said looking at the pictures "no" I replied confused , he looked at me and said "this is the person who's been stalking you" and he then began to tell me they had visited her home and found a shrine with photos of me all over the place from restaurants to the gym even shopping.
He went onto tell me that she'd been the one that sent the messages, made the phone calls etc and they'd also found a diary which had some kind of future plans for me and her, she wanted me to be her husband and we'd been chatting for around a year and half from the moment I started the forum after I explained everything the detective said I was lucky to be alive, she had actually planned to drug me and kidnap me, she had even made some makeshift lock bed so I wouldn't be able to escape.
To this day I feel lucky and I haven't been on the darkweb since.
submitted by GoobleGayTennis to Scary [link] [comments]

Anonimity. Chapter 1. part 1.

First of all, i want to say Sorry, because i use computer interpeter for text of my book. English isn't native language for me. I can talk with you guys, but text is really difficult to translate manually.
This book about near future in Russia. Sometimes it's full of stereotypes and some manners which are hard to understand for people from USA, Europe and ohter world. Almost everything creations in cyberpunk jenre starting like it's actually happened. In 30\* year or so. No one talks how it started. I try to do it. Hope that U will like it.*
Thanks! Have a nice day!
p.s. I'm always in touch on twitter, facebook and etc. Actually since yesterday on Patreon, Lol.

Anonymity is an impersonal property by the meaning of the adjective; lack of individuality, originality.
I would like to be born earlier, say, in the eighties and nineties, and somewhere in Europe or the USA. The point is not that I am not a patriot, but that it was at this time that progress made leaps and bounds all over the world, it was then that the concept of "globalization" became a symbol of the word "progress".
No joke, the flourishing of car production, a breakthrough in aircraft construction, the beginning of the computer era ... Of course, the Soviet Union took an active part in this, only there is a significant factor that would not allow me to enjoy the above to the fullest. The union died in 1991 and hard times came for the inhabitants of the entire post-Soviet space. I could only stand on the sidelines of all this, remembering the first Nintendo, SEGA, PC and other things that were attributes of the life of adolescents in those days. We were shoved from blue screens, as a given, that everywhere and the grass is greener than the trampled parking lot in front of the house, and the sun shines somewhere brighter there.
The corridors of the educational building of the institute, in which I studied since 2020, looked more like the ruins of an ancient civilization. On the walls there were many portraits of scientists from past years, those who seriously looked at students who did not know what they want from life and why they went to a technical university at all.
With the advent of the Internet to the general public, everyone decided that now you can learn from any corner of the world, read books and perform other useful activities. What actually happened? But in fact, people bare all their vices, the traffic of sites with 18+ content is much higher than that of a site with physical and technical content, which is remembered when writing term papers or theses.
The group of students standing in front of room 203 was no exception. If you look at them from the outside, you can understand what this passage about sites of a narrow focus was about. Here is Maxim, he is dressed in tight trousers, a purse hangs on his shoulder, the key to a fresh BMW is in his hand, next to him is a pretty girl in a skirt with a plaid and a white blouse. She smells of some kind of perfume, from which the nose clogs up and the eyes begin to water. She communicates with him, practically dumping her bust out, which he willingly uses. But why should he - a resident of the capital, who already in life everything worked out from the start, a girl from Ryazan province, who came to conquer Moscow - is unclear. First of all, it is not clear to Kirill and Mishka, the two ringleaders of the group, they live in the same room in a hostel and come to the institute in broken-down Zhiguli car. How many years have passed, and these piles of iron still plow the vastness of the universe. The guys do not boast about it, they work part-time in the delivery of pizza and sushi. The work is difficult in places, but if they are here, then they survived. They came from the Orenburg region in the hope of gaining a foothold here, who brought whom - we still need to think, but one thing I can say for sure, everyone needs friends, which means they will not be lost. They are standing with Vit'ka, a resident of the Moscow region, and therefore not in the hostel. The non-rubber dorms in Non-rubber city are beauty. And what he spends, like many of the group, two hours on the road, few people care. I stood in the corner and crammed notes. The rest of the group worried me a little, because I practically did not communicate with them, only on institutional matters. There were a total of twelve people, and in fact almost twenty heads were enrolled in the first year ... - Hey, Kit, look, - said Mishka, who came up to me, nodding at Max.
- I don’t see what to look at,- I looked up from the notes for a second and again buried myself back.
-She’ll strangle him with her airbags now,- he continued.
- Well, at least then Maxim will die happy, I suppose.
- It's already good to cram, the last exam. And then - final exams are handed over, and - freedom. Good already. You have everything on the ointment with the teacher, - Kirill jumped cheerfully.
- On "ointment" does not mean that I will not have to answer questions and take the test part. And there is a commission from all over the department.
- Listen, it's good to fill in, well, - Vitya joined us, - the whole department adores you. The one who needs to worry is her, - he nodded again at Max's interlocutor, - her whole brain will now fall out into the street, and by the age of thirty it will sag to the navel. It’s not the "same coat" now.
- Not understood?! Have you checked, or what? - Mishka and Kirill responded in unison, bulging their eyes at Vitya. - What's the difference whether I checked it or not. I'm just as uninteresting to her as you two are, - He answered.
- No, no, no, come on in more detail here, - said Mishka, folding his arms over his chest, which made his shirt start to crack at the seams. The guys got stronger from physical work.
- Yes, a couple of years ago, I arrived at the institute in my aunt's car. She lives in Moscow, near Sadovoe ring, - began Vitya.
- Well, I remember, she seems to have a Mercedes E-class. We rode at night, - with their conversation, they did tear me away from repeating the material.
- Well, - he continued, - my aunt was leaving for Cyprus for two weeks to rest. She loves me, she cannot have children, so she spoils her nephew. So she said: "Here are the keys to the house, here are the keys to the car. Simple equipment is harmful." I already refused, but she did not accept objections. We rode with you on the third day, and at the end of the week, this madam approaches, - he nodded towards Max, - and it began, everything is the same, the chest is protruding, hints and so on.
- And then what ?! - asked Kiril.
- Next, I collected a scholarship, borrowed it from you, and went for a walk. And that, then it seemed to me, the girl is not bad. We went to Cafe, walked around Zaryadye guide-park. Word for word, we ended up at my aunt’s house, and I’m not taking her to my area. Well, that's all, as they say in the novels.
- And the details? - put in Mishka, - Let's paint, otherwise we see the object, the fantasy works, but here it is.
- There will be no details, I'm talking about the bed in the bed, where you can't get, Misha. I can only say that next week after, we did not get out of it. And then my aunt arrived, and I again returned to my mother in the village. And she said, "let's go for a drive, and let's go to you." Well, I said that I live in a village near Yegoryevsk. She even threatened to declare to write, they say, I forced her all week ... It's good that the threats remained so.
- What are we going to do, Max is swimming, apparently, - I said, looking at how our friend's cheeks melt and his eyes grow cloudy.
- Don't piss, Keith. Look here, - Mishka winked and confidently walked towards the couple.
- Mishka, you would at least wash the dirt from under your nails!- Kirill shouted after him, to which he was sent with his middle finger over his shoulder.
- Let's see how the matter ends, do not distract him, - I asked Kirill.
It is worth making a digression here. Maxim was the son of the head of a department of some multinational corporation. He was not a typical daddy's son, he did not shine with intelligence, but he was not stupid either. He was also not a spoiled major. He dressed modestly, but tastefully, for the first two courses he took the metro, then moved with the help of his father to a second-hand German car. In the first year, we helped each other, all five, and on that one we became friends. When we could have tied a few lines of code together, Max's father started throwing hack for us. Also, he asked to help his younger talent. Who would have thought that from the fourth year the talent itself would be interested in everyone and the money of his father would be spent by all of us on a joint revelry, now in the hostel, then in the country. But we have postponed something. By the way, Max was always ashamed of his father's dachas and loved our simple dachas, in which there was nothing but a house and a bathhouse. And about the fact that we all slept - anywhere, I will not tell. The father gave Max a new car only the other day, when he realized that his son deserved a gift for the end.
The death of Vitya's father brought us even closer, it seems, in his third year ... His father was a strong man who himself left the city closer to the earth. He started a household and so on ... We turned out to be the healthiest foreheads, and carried the coffin to the cemetery. It so happened that he and his mother had few loved ones, and even those old people. Oncology did not ask whom to pick up. Vitya did not live with his aunt, although she always had a room ready for him. He told her: "Who will I leave my mother to?" So we were friends with our five all the time.
In the meantime, Mishka confidently approached the couple, taxied behind Max, shook him by the shoulders, said something, which made Madame's face turn red, and this could be seen even through the foundation, and now they already walked towards us.
- Grandmaster, not otherwise, - Kiril said on exhalation.
- I suggest everyone go out for a smoke, - I said as the guys approached, and we headed for the stairs.
So we, with our motley company, migrated to the entrance to the educational building. The big sign "NO smoking" got an ashen smiley with a mustache, beard, and who was not so cultured, painted what is usually painted on fences in the village. In general, the spirit of student unity was evident here as well. We lit a cigarette with our friendly company.
- Well, what, the last exam, eh?- I began.
- Yes, finally, and then already tired, the sun is outside, girls in skirts, and we are sitting here, - picked up Max.
- Yeah, is it you who fell for the skirt, or just got confused? - I poked him.
- Yes, she came, word for word, so, chatter about nothing, and I see that she constantly props her chest with her hands, but the look itself fell there, - Maxim began to make excuses.
- Yeah, and when the bodice is removed and stops propping up, I guarantee that you will want to put a basin, as if from a drink. This good will fall, like the bitcoin rate in tenths, and everything will end either with a wedding on a fake pregnancy, or you will pay off so that she does not apply for you, - Vitya continued.
- And how do you know, Vitos? You're still a quiet one. Probably, he didn't even hold on to the handle, - Maxim tried to continue the excuse.
- The best defense is offense? - Kirill interjected.
- Hush, Kir. Max, just the same with her and held on to the handle. Remember the third year, when we rode in my aunt's car.
- Let's say. I remember.
- So she was gone for two weeks, and we drank one. The second week I was busy with her, or rather, she suggested it herself, and I did not refuse. I ended up borrowing money from you in order to pay off her. As I remember, a shiver breaks through.
- So you said that on a wheelbarrow, which he threw as soon as he bought, - Max refused to believe.
- As you understand, I didn't buy a car, but paid Madame for services, - Vityok involuntarily grimaced.
- Oh, - Max realized, - I apologize, and thanks for the warning. I just lacked the Ryazan milkmaid.
- Do not forget about saggy tits, - added Mishka.
- Yes, Ryazan milkmaid with sagging tits, - repeated Max and threw out the cigarette butt. We followed suit and returned to the corridor.
There were still a couple of minutes before the start of the exam, there were even more people, room 203 was an amphitheater, which made it possible to conduct exams for a large number of students. Organized groups of students crowded, according to my estimates, at least three, which means about fifty people. That's really, wholesale is cheaper.
- So, gentlemen graduates! - the head of our department, a woman in years, but with an iron grip, and, moreover, an excellent teacher, came out of the office. - I ask you to take seats in the audience.
We are located on the same row, all of our five. As per the precepts, not far, but not close to the commission. If you sit close - you will be in plain sight as a crammer, if from behind - as a gouge. The tactics were working, the answer cheats were prepared in paper, jammers were knocking out the Internet and all kinds of wireless headphones. White noise was reproduced in the headphones, but our Galya (Ryazan milkmaid) was not ready for such a scenario, and upon switching on she began to look around the audience helplessly. We did not gloat, but we did not deprive ourselves of moral satisfaction.
Sweating over the ticket, I wondered, what will happen after school? I didn’t understand at all why I was going to become a programmer. I studied a little, something and somehow, but do I see myself in the profession ??? Not sure. Okay, war will tell the plan. I quickly wrote answers to three out of four questions, thought for a long time, but did not win. Okay, one more four, one less. Kiril and Mishka tensed, their foreheads were covered with sweat, but they write something tirelessly. The commission was already minding its own business and paid less attention to us.
- Pssss, - Max shouted to me.
- What? I replied in a whisper.
- After the exam we are going to my village house, to have a carouse. And I do not want to know the refusal. Pass on. Dad threw off the SMS, I didn't have time to say.
- So you wrote everything? - You offend! I got a favorite topic. And how many business card-sites we riveted, I will keep silent. So that.
On this wonderful note, all students were asked to submit papers. Traditionally, only those with a controversial assessment were personally interviewed. None of our company got into this number, so we loaded into the Maxim's BMW and drove out the City.
The Moscow heat, who has been, knows how hot it is in the megalopolis in summer, especially when the changed tiles get hot for the hundredth time, but the breeze is gone. We left the building happy and tired. The presentation of the diplomas was expected in a month, and today two B grades, A grade for Vitya and C grade for Kirill and Mishka. We went out, Max opened a pack of cigarettes that his father had brought him from Cuba, I think "Cohiba", knocked out a cigarette for everyone and gave them a light. Silently we dragged on simultaneously and headed to the car.
- So, - Max said sternly, - we don't smoke inside!
- I see, - we answered and finished smoking, standing near the apparatus.
I sat in front, as the tallest, the rest of the guys were in the back. Mishka was unlucky most of all, he was pushed into the middle, consider that he rode more inconveniently and higher than all those present, and the village-house was already beyond Sergiev Posad. So from time to time on the hummocks our friend switched to falsetto, while the others enjoyed the ride. Father gave Max a five-sreies with many options in the cabin, but not a very voluminous engine, so that there was no desire to drive beyond measure.
- Max, are we going to stop by the store? Is there meat, booze? - I asked when we drove onto the Yaroslavl highway, breaking through the Moscow traffic jams.
- No, Dad organizes everything. For everyone. There are booze, meat, baths and other joys of life. The whole house is at our disposal, - Max answered calmly and the joyful hubbub of our comrades was heard from the back row.
After some time, we drove into the woods, where we turned into an elite village. Someone lived here permanently, while someone here just had a summer residence. The father of our friend belonged to the second type of people. It's easier to do things when you live next to work and Moscow City is just a stone's throw away, then in general it is beyond praise. Max pressed a button and the gate obediently slid to the side.
- Wow, a house, - drawled Mishka.
- Wow. I saw this in the picture, and even then not often, - Kira echoed.
- And you would pay more attention to common girls when my father called us to celebrate the launch of their product on the market, - Max answered.
- So you were here?
- Yes, we were once,
- I answered.
- Uh-huh, - said Vityok.
There was something to be surprised at. A two-story European-style mansion among trees, with a large veranda on which stood a heavy oak table and chairs. There was also a tennis court at some distance. There was a large garage and a barbecue corner on site. In front of the house there is a lawn with various conifers. Before leaving the car, we smelled the smell of meat.
- Apparently, the father of his cook asked to cook everything, so you guys won't be able to leave hungry, - Max began, getting out from behind the wheel.
- So we were not going to !! - he heard the chorus from behind, and we left the ship.
We decided to go through the house, washing our hands along the way. Heavy oak planks didn't even think to creak when we fell out of the house. These are not modern plastic boards that prick and knock, while crackling like a Chinese bouncy. We went to the table, on which there were already salads, an aperitif was poured into the glasses. We drank.
- And what is this sweet muck? - Mishka responded.
- This is an aperitif, served before meals, so that you want to crackle more, Mish, - Maxim answered.
- Is it like - beer before vodka? Got it, - Kirill responded.
- Okay, I propose to start our celebration, otherwise, you never know, you will take whiskey for used oil, - Maxim continued as the owner.
- Young people. I am glad to welcome you! - a man in a cook's jacket appeared and began to tell us what dishes were on the table. In addition to the Greek salad, there was a warm tuna salad, and some other appetizers, the names of which I did not remember. From his speech, only Max understood the names, and we sat with our mouths open. Well, Vitya and I understood something, but Kirill and Mishka were sitting, frankly with the lower jaw on the floor.
- He's not cursing now? - asked Cyril when the cook left.
- No, he told me what was on the table and what would be on the hot. So, if I were you, I would pour it already, graduates!
- So we will pour! - Mishka took a bottle of Chivas, poured himself, - Who else? he asked briskly.
- Give it to me, - Kiril answered, for which he received his glass of whiskey.
- No, I'm white wine,- Vitya replied, taking a bottle of semi-dry wine.
- I thought there were no girls among us! - Mishka responded with a challenge.
- Misha, don't get to the bottom of him, I'll have vodka and juice myself, so as not to fly to the first space flight ahead of time, - I interjected.
- Let's have a drink already, otherwise you are pouring for three hours, - Max finished the squabble with a glass of vodka. - For the passed certification!
The owner of the house raised toast after toast, we ate dishes on both cheeks. To say that it was delicious is to say nothing, it was wonderful! The funniest thing was to look at Mishka and Kirill, who for the first time saw tuna not in a can, but in a salad, and it was also pink in color. Then the salads were replaced by meat, rack of lamb, ribs in sauce, steaks and various grilled vegetables. Freshly cooked fries teased with flavor ..
submitted by Suharrik to u/Suharrik [link] [comments]

How to buy Bitcoins with debit card or Paypal - ZERO fee's ... Buy and sell Bitcoins anonymously: Short tutorial on cryptoexchanges without ID or limits Is Bitcoin Anonymous How to Buy Bitcoins With PayPal - Avoid Scams! 100% Safe Bitcoin  How to earn Bitcoin  How to buy Bitcoins  How ...

Copy the login and password to a text file and save it — you will need this… Open in app. Become a member. Sign in. How to purchase bitcoin 100% anonymously without ID. Darkside of Freedom ... Buy crack online According to the Australian Taxation Office, between 500,000 and 1 million residents of the country already own crypto assets. Bitcoin.com.au said it hopes to increase that number via its new collaboration. Buy crack online “Our mission is to make bitcoin safe and easy for every Australian”, Arians added. “For many people ... There are Ways to Buy Bitcoin Anonymously. In the early days of Bitcoin, there were no Know Your Client (KYC) regulations to follow. Crypto exchanges had a free hand to deal with whoever they wanted to, and crypto users didn’t have to worry about much. Now, major exchanges are coughing up their clients’ records to the government. Things have changed drastically over the last few years ... Where to start buying bitcoin anonymously? Getting a Bitcoin address is easy. ... The way it differs from Bisq is that it uses SMS text codes to facilitate purchases. In this case, it’s a good idea to use a phone number that is not linked to your identity. reactions. Another peer-to-peer place where you can find someone who is willing to sell Bitcoins for cash or a bank deposit is Paxful. On So, now you know how to buy Bitcoin anonymously. How to Buy BTC Using an ATM. Next, you have the Bitcoin ATM option. Another great choice if would like to buy Bitcoin without using your ID. At a Bitcoin ATM, you can buy Bitcoin with cash or with a debit/credit card. Source: qz. However, Bitcoin ATMs are hard to find, and they are limited to only the countries that allow them. There are also ...

[index] [19947] [22796] [22334] [31507] [47190] [21300] [16879] [35173] [33667] [5081]

How to buy Bitcoins with debit card or Paypal - ZERO fee's ...

Get your FREE Wirex account here: https://wirexapp.com/r/moocharoo Once you are signed into to your verified wirex account you'll be able to buy all the bitc... This short video explains why Bitcoin isn't completely anonymous. For the complete text guide visit: http://bit.ly/2PpHLGS Join our 7-day Bitcoin crash cours... Bitcoin - How to earn Bitcoin - How to buy Bitcoins - How to Mine Bitcoin বিটকয়েন, বিট কয়েন, বিটকয়েন আয়, বিটকয়েন ... The method in this video no longer works as Virwox has shut down. However, there are alternative methods in our my text guide: http://bit.ly/2Pv9s02 Join our... [email protected] for dark web credit card.....!!!!! MY PERSONAL NUM :- 972-848-0890 TEXT ONLY.....!!!!! whatsapp link : = 91+8296741793 PAYPAL ...

#