Bitcoin Bank Kritik: Ist es ein Betrug? Kann ich täglich ...
Bitcoin Bank Kritik: Ist es ein Betrug? Kann ich täglich ...
Crypto Engine Official Site 2020 - CryptoEngine.app
Bitcoin Pro Erfahrungen SERIÖS ODER BETRUG? 250 € Test!
Bitcoin Wallet Blockchain: for PC (2020) - Free Download ...
Crypto Engine Offizielle Seite 2020 - CryptoEngine.app™
Bitcoin Buzz Feeds
Bitcoin Buzz Feeds started as a Mobile Application and now diversified into the #1 content distributor proactively giving users that follow twitter, reddit, and news about Bitcoin-- instant access in real-time using smart devices. Bitcoin Buzz is now a community, where the group can collaborate, and discuss all types of news and bitcoin happenings in the industry.
SwissBorg - The New Era of Crypto Wealth Management
We're a fintech team and community dedicated to improving the crypto space by making it secure, fair & accessible to all. With a sophisticated financial engine, the SwissBorg Wealth App, our showcase product gives the user the freedom and security to buy Bitcoin and other digital assets with ease, with best price execution. The SwissBorg Wealth app uses the latest technology to bring digital asset expertise. Our Community app is an educational game that helps you predict the price of Bitcoin.
[FORHIRE] I do iOS engineering. My body looks Northwest European and I have a US passport. Have built apps in Swift (1,2,3,4) and Objective C. Have also done full stack Unity XR using C#. Prefer to be paid in Bitcoin. Thanks in advance!
[for hire, remote] I do iOS engineering. Have a US passport. Have built apps in Swift (1,2,3,4) and Objective C. Have also done full stack Unity XR using C#. Prefer to be paid in Bitcoin. Thanks in advance!
What if we could build a decentralized search engine? Uncensored, funded by bitcoin micro-pmts, distributed over peers similar to Storj being paid for index entries. Would that be a killer app?
Is this being worked on already? Just thought of this seeing Eric Schmidt talking about Amazon being their biggest competitor. Obviously searching for commerce reasons makes them more than other content. Advertisers should want to pay into a decentralized pool for indexing if it's effective. It would need some smart incentives to balance useful content vs. abuse. At least in theory it could be designed to prioritize based on a users search intentions. eg. de-list adult, or spam content. But how would you prioritize good non-paid content? Could this be the google-nuker being developed in someone's garage?
NEW PRODUCTS FOR THE CRYPTOCURRENCY WORLD POWERED BY ($S4F)
Hello Crypto World! There is news: We are getting closer and closer to the official date of the S4FE launch: Saturday, November 14th, 2020 What will happen on that date? S4FE can proudly look back on three years of product development and announce that the S4FE rockets will start on November 14th, 2020. The following products are published and made available to the public: Launch of the S4FE search engine, available online from November 14th, 2020, at www.s4fe.io. https://preview.redd.it/lmyvnvoyzms51.png?width=1916&format=png&auto=webp&s=763f5a00cf51148a7e4cf76e354e43ba308ee533 The S4FE search engine is a public and free search engine for objects of all kinds and will be the link between private customers, producers, law enforcement agencies, and insurance companies. Private and corporate customers will be able to create a kind of "cloud" (we call it "S4FE"). In this S4FE, valuables can be linked or managed with the digital world.
PoO - Proof of Ownership is being revolutionized.
From November 14th, it will be possible to digitally map an object's ownership and transfer items digitally from "User A" to "User B" via mouse clicks. The lost and stolen function will also be fully available and usable, which means that objects can be tracked in real-time and reported as stolen in real-time in the event of theft, for example. For stolen goods, the transport and sale of stolen property is made much more complicated for thieves and can involve some complexities. During a spontaneous police check, stolen things can appear in the system that was stolen a few minutes ago and have not yet been reported in the police system— the risk of being caught red-handed increases. The S4FE app contains the same functions as the S4FE search engine, only optimized for IOS and Android devices. The S4FE app will be available from November 14th, 2020 in the Apple Store and the Google Play Store. The S4FE ST!CKER is a product that we developed to connect physical objects with the digital world. https://preview.redd.it/dfumfnh30ns51.jpg?width=1280&format=pjpg&auto=webp&s=103b73cd9dd6d766fd2018b3e431a2b89c688b20 https://preview.redd.it/sgtg7oh30ns51.jpg?width=853&format=pjpg&auto=webp&s=aab044e022b9f522fba8e6ecbca059f8611d2b22 https://preview.redd.it/40ktpph30ns51.jpg?width=1030&format=pjpg&auto=webp&s=5d278261ae14b4aeaa0d15de63ca768e58b892d2 https://preview.redd.it/4oul1ph30ns51.jpg?width=1280&format=pjpg&auto=webp&s=c437bac621d77b00424dee9abcf1da1065142e06 https://preview.redd.it/7qhyirh30ns51.jpg?width=781&format=pjpg&auto=webp&s=c284852afb8cb19e05e4c64edd0787c5d9b72465 https://preview.redd.it/u057h1i30ns51.jpg?width=852&format=pjpg&auto=webp&s=8399eb6f9b10e9a9250126c26040524442945b24 https://preview.redd.it/v3r1jrh30ns51.jpg?width=1280&format=pjpg&auto=webp&s=4c55e0ec95b119f2e80dbfa68e916bef746fc81f https://preview.redd.it/smwbmoh30ns51.jpg?width=1024&format=pjpg&auto=webp&s=d02a7a3fd80cd82bc1bd74a1d03f18cb7c073038 https://preview.redd.it/1lx695i30ns51.jpg?width=1280&format=pjpg&auto=webp&s=0113ec3afd8a0b962fb3a67f94fc9fb3a642729b https://preview.redd.it/6avpqmh30ns51.jpg?width=1280&format=pjpg&auto=webp&s=0ecbd85cf06b1f3799cc9548656c1aa2185ab6a0 Do you often lose your iPhone? Have you ever accidentally left your laptop at the airport? Then the S4FE ST! CKER is the perfect product for you. People who find an object, e.g., your laptop, can scan the S4FE ST! CKER via smartphone and contact you directly via the S4FE app. Updates on prices for the S4FE ST! CKER will be available soon. Launch of the S4FE online shop: Our customers will have the opportunity to purchase the S4FE ST! CKER via the S4FE shop. Price updates will follow shortly. In the online shop, it will be possible to pay via cryptocurrencies or conveniently via credit card. S4FE Transactions: S4FE is a blockchain/crypto company. We attach great importance to transparency, which is why all transactions on the S4FE network are publicly displayed. So you can watch the S4FE network grow in real-time. Similar to the Bitcoin Explorer, but not for Bitcoins, but objects. More information will follow shortly. ---------------------------------------------------------------------------------------------------- Es gibt Neuigkeiten: Wir rücken immer wie näher an das offizielle Datum vom S4FE Launch: Samstag, 14. NOVEMBER 2020 Was passiert an diesem Datum? S4FE darf stolz auf 3 Jahre Produktentwicklung zurückblicken und verkünden, dass am 14. November die S4FE Raketen gezündet werden. Folgende Produkte werden veröffentlicht und der Öffentlichkeit zugänglich gemacht: Launch der S4FE Suchmaschine, ab dem 14. November 2020 Online abrufbar unter www.s4fe.io. Die S4FE Suchmaschine ist eine öffentliche und kostenlose Suchmaschine für Gegenstände jeder Art und wird das Bindeglied zwischen Privatkunden, Produzenten, Strafverfolgungsbehörde und Versicherungen darstellen. Privat und Firmenkunden werden eine Art “Cloud” (wir nennen es “S4FE”) anlegen können. In diesem S4FE können Wertgegenstände mit der digitalen Welt verknüpft bzw. verwaltet werden. PoO - Proof of Ownership wird revolutioniert, da es ab dem 14. November möglich sein wird, den Besitztum eines Gegenstandes digital abzubilden und Items digital von “User A” zu “User B” zu transferieren via Mausklicks. Die Lost und Stolen Funktion wird ebenfalls vollumfänglich verfügbar und nutzbar sein, das bedeutet, Gegenstände können in Echtzeit getrackt werden und bei bspw. einem Diebstahl in Echtzeit als gestohlen gemeldet werden. Für Hehler wird somit der Transport und die Veräußerung von Diebesgut wesentlich schwieriger gestaltet und mit einigen Komplikationen verbunden. Bei einer spontanen Polizeikontrolle können so beispielsweise gestohlene Dinge im System auftauchen, die vor ein paar Minuten frisch geklaut wurden und noch nicht im Polizeisystem erfasst sind. Die Gefahr steigt in flagranti erwischt zu werden. Die S4FE App beinhaltet dieselben Funktionen wie die S4FE Suchmaschine nur optimiert für IOS und Android-Geräte. Die S4FE App wird ab dem 14. November 2020 im Apple Store sowie im Google Play Store verfügbar sein. Der S4FE ST!CKER ist ein Produkt, welches wir entwickelt haben, um physische Gegenstände mit der digitalen Welt zu verknüpfen. Verlierst du häufig dein Iphone? Hast du schon einmal am Flughafen aus Versehen deinen Laptop liegen lassen? Dann ist der S4FE ST!CKER das perfekte Produkt für dich. Personen die einen Gegenstand finden, bspw. deinen Laptop, können den S4FE ST!CKER abscannen via Smartphone und über die S4FE App sich direkt mit dir in Verbindung setzen. Updates über Preise vom S4FE ST!CKER wird es in Kürze geben. Launch vom S4FE Online-Shop: Über den S4FE Shop werden unsere Kunden die Möglichkeit haben, den S4FE ST!CKER zu beziehen. Preisupdates folgen in Kürze. Im Online-Shop wird es die Möglichkeit geben via Kryptowährungen oder bequem via Kreditkarte zu bezahlen. S4FE Transactions: S4FE ist ein Blockchain / Krypto Unternehmen. Wir legen enormen Wert auf Transparenz, deshalb werden sämtliche Transaktionen auf dem S4FE Netzwerk öffentlich angezeigt. Du kannst also in Echtzeit beobachten, wie das S4FE Netzwerk wächst. Ähnlich dem Bitcoin Explorer, aber nicht für Bitcoins, sondern für Gegenstände. Mehr Informationen folgen in Kürze.
Microsoft patent 2020-060606 linking human brain to crypto payment system
Microsoft filed a patent 2020-060606 on June 20, 2019 for the link between the human body and the crypto payment system. It is a cryptocurrency mining system that uses human pulses such as brain waves and body heat to perform online tasks such as using search engines, chatbots, and reading ads. "A user can solve the arithmetically difficult problem unconsciously," says the patent. In fact, this is a very brief description of a brain computer interface, which can read and write electromagnetic signals from the brain at such a finely meshed level that the brain literally becomes a biocomputer in a network. To understand that, please watch the video below and read on below. This is necessary so that you understand the current technological state of affairs. Steve Hoffman - Brain Hacking & MindTech - Produced by DingDingTV How cryptocurrency works The aim is that we are collectively hung in a hyve mind and it seems that what with crpyo-currency like Bitcoin still had to be done on energy-guzzling mining servers, can now be filled in by the “human bio-computer”. The unique thing about blockchain payment systems was that as soon as you took a so-called wallet into the network, your computer formed a block in the network, where your computer receives a kind of calculation program that calculates the security key of a coin. All computers on the network must then come up with the same key as confirmation. If the entire network sees a transaction of a coin, all those keys are checked and if one is different, the transaction is illegal and rejected. That would create unhackable security. The problem, however, is that Bitcoin mining requires a lot of computing power and that requires electricity. That's why Bitcoin mining ended up being one of the most energy-guzzling industries in the world. The Microsoft patent seems to aim at making this blockchain principle, which is not only very energy-guzzling, but also puts a heavy burden on the internet in terms of bandwidth (after all, all computers in the chain must always be checked for positive encryption), superfluous to make. Simply put: Microsoft wants to use the human brain as a block in the blockchain. The 5G network will provide sufficient bandwidth to realize this. Link digital ID, vaccination ID and social credit system: The coronavirus pandemic provides the perfect alibi for the introduction of such a system. In concrete terms, this means that a score of your behavior (expressed in points) will initially be kept in the cloud. If you stick to the rules, you can take public transport or plane. If you don't follow the rules, your score will go down. The upcoming social distancing apps are a precursor to such a behavioral scoring system. After all, if you do not keep enough distance from potential infections, you have to quarantine at home. We also see China taking the lead there. Watch the video below and then read on. Wuhan coronavirus covid-19 totalitarian UN propaganda? Although Bill Gates officially retired from Microsoft's board this year, we can guess who the big driving force behind patent 2020-060606 is. Of course, I need not point out to the attentive reader that we recognize here the Biblical number of the mark of the beast from the Bible book of Revelation: 666. It states that the time will come when no one will be able to buy or sell without to bear 'the beast'. This under the statement that this number is six hundred and sixty-six. The same Bill Gates is behind the ID2020 initiative that wants to develop a digital ID for vaccination registration. If you combine such a digital ID hallmark with a digital passport (ID) and with patent 2020-060606, then you have completely enslaved people. Revelation 13: 16-18 16: And it causes it to give a mark to all, small and great, and rich and poor, and free and servants, on their right hand or on their foreheads; 17: And that no one should buy or sell except he who has that mark, or the name of the beast, or the number of his name. 18: Here is wisdom: let him that have understanding count the number of the beast; for the number of a man is, and his number is six hundred sixty and six. The "Official Gazette of the Kingdom of the Netherlands" announced on March 31, 2020 (“coincidentally”) change in law that allows a digital ID. Translated: Kingdom Act of 6 March 2020 amending the Passport Act in connection with the introduction of electronic identification with a public identification means and the expansion of the basic register of travel documents. We Willem-Alexander, by the grace of God, King of the Netherlands, Prince of Oranje-Nassau, etc. etc. etc. All who will see or hear it read, salute! do to know: Thus We have considered that it is desirable to amend the Passport Act in connection with the introduction of electronic identification with a public means and the extension of the basic register of travel documents; The consequences: So if we don't wake up in masses now and discover that we are witnessing a Psychological Operation that fully complies with the master script, then there is no escape. Then we cannot buy or sell anything if we do not meet all the requirements of the state. And to all, it really means all. Making a minor offense once has immediate consequences. Not cooperating with the vaccination obligation (think Bill Gates) will definitely mean the end of being able to travel and participate in society at all. You should consider the most basic things such as being able to buy food and drink. We must step out of our programming and know that we are sovereign. Please read the article from the official journal above again. In it you see that you can fully rely on your consciousness sovereignty. You are sovereign by nature and no law can bind you to anything. It says "We Willem-Alexander, by the grace of God". Now let him prove "that grace of God". Every law is signed by the king by the grace of God. There is no evidence whatsoever of this and so the law does not apply. The only problem is the fact that social systems have built up around that grace of God, to which many swear allegiance. Do we sit back and relax until we are swallowed up by the system of "the internet of things" by the grace of God, or do we activate ourselves to concrete things? Concrete matters means that we have to switch from passive to active and discover who we are in potential and in essence.
There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool). I know at the time of infection your passwords was: xxxxxxxxxxx My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam. Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF! At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job. After that I removed my malware to not leave any traces and this email was sent from some hacked account. I can send the video of you to all your friends, contacts and publish it on social networks and the whole web. You can stop me and only I can help you out in this situation. Pay exactly 740$ in Bitcoin (BTC). It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger. My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE) I give you 3 days time to pay. As I got access to this email account, I will know if this email has already been read, so the time is running. After receiving the payment, I will remove the video and you can life your live in peace like before. Learn from the mistake and update your browser before browsing the web next time! I know XXXX is one of your password on day of hack.. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1013. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. Hello! I'm the software engineer who hacked into your device's OS. I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited. In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it. I also have access to all your contacts, social networking data and all your correspondence. Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent. I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use. If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin"). My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9 After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it. Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes. If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
New to this forum so id like to share some of my experience with one of the things that made me a lot, ewhoring. 1) first of your going to want to create a snapchat account, this account must have a high enough snapscore of a couple of thousand to make it look legit as possible, you can boost the snapscore of the account by sending tons of snaps to a bunch of celebrity accounts on snapchat. You can easily find these buy just searching any letter in the search bar and subscribing to all the accounts. add a bitmoji that looks like your girl, you can find a ton of mega links on the internet if you look, try find something not saturated and you should be fine. A good way to look legit on snapchat is of course to send live snaps. To send live snaps uploaded through your camera roll. On iPhone you can use the app prequel. on android you can use chicken cam. Other ways to look legit is to fake your location of the person you’re talking to. My way of doing this was jailbreaking my phone and using snapbreak. you can find tutorials on how to jailbreak everywhere and downloading snapbreak you’ll have to downgrade snapchat first. keep in mind recently snapchat has been banning accounts that have downgraded there snapchat so a way to get around this is to create the account on the downgraded version of snapchat and NEVER update. if you update you won’t be able to use snapbreak without a ban. snapbreak is an amazing tool for all sorts of stuff. Uploading to live snap. faking location. quick switching between accounts, sending snaps to everyone on your snapchat (more than 200 people) 2) one of the first ways i used to get traffic to my account was POF. POF you can create an account with a phone number, with your girl’s pics of course. (do not put add my snap in the bio or you’ll be flagged on the system), just swipe right on everyone and ask everyone to add your snap, "hey add my snap ____ ", people who won’t add you will not buy shit so don’t waste your time. if you do get banned on POF you can use the same phone number a few more times till your perma banned. it’s all about high quality traffic. If you get shit traffic you’ll have a bunch of time wasters on your snap that’s never going to buy. Refrain from doing sfs with other snap chatters unless you want shit traffic. Tinder is also a good source for high quality traffic. all tough once your banned on iPhone you will be mac banned. Changing your ip won’t work and even on a jailbroken iPhone you can’t change your mac. On android devices you can change your mac with rooted devices. I personally wouldn’t go through the effort and I would just make tinder accounts through pc. You can download tmac v6, and any proxy VPN will work. Always remember to clear cookies before creating a new account. Eventually you will run out of phone numbers to use once you get banned but we will get into that in the next step. 3) Smspva.com and smspool are great tools to get disposable phone numbers to create new accounts. For a small payment of like 50c to $1 per phone number. This can be paid through bitcoin. Hopefully you’ve made enough money at this stage through the traffic you got from your own number. (Yes using your own number is fine if you don’t care about getting banned from TindePOF) anyways. We will talk about how to get your ewhoring money into bitcoin in the next step. 4) Once your money is in bitcoin you can do whatever you want with it, in PayPal if you keep the money in your account to long it can be risked getting locked since you’ll be creating a PayPal account with your girls name/email. PayPal will constantly ask you to verify your account by adding a credit card or sometimes locking your account until you send proof of id. You can only get a maximum of 2500 per unverified PayPal account before they ask for verification (proof of id) you can create new PayPal accounts with new phone numbers through smspva/smspool. Paxful is a great tool to transfer your PayPal money to bitcoin. all tough ive heard you can trade PayPal to bitcoin on multiple other sites. Paxful was the one to work best for me. As I wouldn’t recommend keeping money in your PayPal account to long I suggest getting it into bitcoin asap. After a while paxful will ask for verification on your account. At this point you can just create a new account with a new email/phone number using smspool. I don’t think smspva has paxful verification phone numbers. Personally I traded about 300 at a time on paxful. And id be very wary of scammers. Once the bitcoin is in your paxful wallet. Transfer it to a third party wallet like Blockchain. 5) Let’s get back to the snapchat, remember it’s all about social engineering, get rid of the time wasters, all you want to do is create a private story to post a bunch of nude videos in and put on your main story and try advertise to everyone that your selling a premium snapchat, my prices were 20 monthly 30 lifetime to be a premium member. I charged 40 an hour for video calls. Yes I just blocked them after I received the payment. I charged 150 an hour 400 a night for meetups. With meetup scams I would ask them to pay a 75 deposit through PayPal and id send them the address, they can pay rest cash in hand or in PayPal. Once they would arrive at the address I’ve sent, (this would be a random for sale or address where no one lives in) I would tell them to pay the rest in PayPal and I’ll let them into the house. Even if they said they’d pay the rest in cash id still try tricking them into sending the rest of the payment in PayPal. I’ve made 750 of one guy using this method. Tips:
Do not transfer money over to a friend’s account to take it out through the bank its linked to, sometimes PayPal will ban all the accounts you’ve sent money to, I’ve no idea why this is a thing but I’ve had multiple peoples PayPal accounts get banned just because I’ve sent money to it.
Get rid of time wasters, if someone makes it clear they won’t pay block them or ignore. Don’t give away previews. The previews are on your story.
With big money transfers it must be your number one priority to get rid of that money from your PayPal account ASAP, remember that PayPal are always tracking you, they always have their eye on this sort of thing. Once a report has been made about your account it could be locked and you will not get your money back.
Make sure all your customers know to send money through PayPal using friends and family only. Business transfers can be reversed easily and it gets put on hold much more.
Don’t do anything stupid. Such as sign into the PayPal account on an iPhone. Phones have all your data on it; you can easily be traced on. Manage as many accounts on your pc/laptop and use the same name for everything, clear your cookies and don’t sign into your PayPal account multiple different times under different ip addresses, this will trigger 2fa and you won’t be able to verify your account with a disposable number
If your account does get locked under 2fa and you don’t have the original phone number. You can contact PayPal through live chat and just tell them it’s an old number you no longer have access to. They’ll ask for info such as your email full name and home address linked to the account. (Btw the home address can be set to any address just remember it) once you clarify this with the PayPal live support person they will unlock the account. I don’t know if this works 100 percent of the time but I speak from experience.
To download snapbreak you will have to downgrade using a tweak called Appstore++ snapbreak was a paid tweak that is no longer in development because it got cracked. It was originally 50 but now you can get it for free on some repos. ALWAYS remember to stay on the same version of snap per account.
any feed back on this method would be greatly appreciated, tell me what you think :)
What I currently use for privacy (after almost 2 years of long investing into it)
From rags to riches and back to rags. I became aware of Bitcoin in 2012, but didn't invest until 2014 @ $440. A few years prior, it had hit $1k, dropped, and much of the public lost interest except for users of Silk Road. I sold all my BTC once it hit $1k for the second time. The more I read about ETH, the more I was convinced that this shit was wild. I didn't get it at first, but given my background (product engineering) I started to recognize use cases that Ethereum could take on: Debt vehicles owned by communities (rather than..JP Morgan). Music platforms owned by users. Ethereum is/was a software engineer's economic API. Prior to Ethereum, we could write apps that fit into real-world government/economies, but now, we could write entire governments and economies -- and we all know the economy is mankind's most influential behavioral system. Once that clicked, I put all my money into Ethereum. I told my friends and family to invest a bit too. I bought some in February of 2017 and continued to buy until my ether chest became my savings. Once ETH breached $100, I was extremely confident that the world was seeing Ethereum for what I saw (an economic/government-building toolset) -- wow was I wrong. ETH grew and grew, as we all know, topping out around ~$1400. I vividly remember waking up one morning, checking how much $ my investment was worth -- almost a half million. "I'll sell some once my stake reaches $500k," I said to myself idiotically. The prior night, I had gotten into a debate with a friend (who also invested) who had doubts about how long the asset would increase. I argued that the utility of Ethereum had barely hit the market, he argued that had nothing to do with the rise -- he was right. The rise of price was fueled by people telling friends/family 'I JUST MADE THIS MUCH MONEY YOU HAVE TO INVEST!!!', and had absolutely nothing to do with Ethereum's true value to society. My friend sold all of his investment around this time. I did not. I watched my investment dwindle from some ~$450k to just a few thousand. During this time, I was funding my business, so I would sell my ETH slowly as the price dropped. My stack of crypto is almost nothing today, but one thing I took away was the value of money. When my stack had reached nearly half a million, I felt the same as I do today. I felt the same as I did before I earned the money. Nothing in my life changed -- my happiness was exactly the same, except for the fact that I didn't have any stress around money. What made me happy was using my money for good causes - I donated a decent amount to ocean relief funds and used my money to build a business which made people happy via convenience. I'm sharing this because I don't know how many other people have made half a million dollars in under a year (after being broke), then lost it all, but I'm sure it's not common. This experience taught me the value of money and its limits to happiness contributions. That said -- when you're under the poverty line, the personal value of money is way higher. It's like a maslow's hierarchy of needs situation -- once you've satisfied your basic financial needs, your increase in happiness is fueled by further endeavors outside of 'earning money'.
You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments. It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Limited Supply - There will only ever be 21,000,000 bitcoins created and they are issued in a predictable fashion, you can view the inflation schedule here. Once they are all issued Bitcoin will be truly deflationary. The halving countdown can be found here.
Open source - Bitcoin code is fully auditable. You can read the source code yourself here.
Accountable - The public ledger is transparent, all transactions are seen by everyone.
Decentralized - Bitcoin is globally distributed across thousands of nodes with no single point of failure and as such can't be shut down similar to how Bittorrent works. You can even run a node on a Raspberry Pi.
Censorship resistant - No one can prevent you from interacting with the bitcoin network and no one can censor, alter or block transactions that they disagree with, see Operation Chokepoint.
Push system - There are no chargebacks in bitcoin because only the person who owns the address where the bitcoins reside has the authority to move them.
Low fee scaling - On chain transaction fees depend on network demand and how much priority you wish to assign to the transaction. Most wallets calculate on chain fees automatically but you can view current fees here and mempool activity here. On chain fees may rise occasionally due to network demand, however instant micropayments that do not require confirmations are happening via the Lightning Network, a second layer scaling solution currently rolling out on the Bitcoin mainnet.
Borderless - No country can stop it from going in/out, even in areas currently unserved by traditional banking as the ledger is globally distributed.
Portable - Bitcoins are digital so they are easier to move than cash or gold. They can even be transported by simply memorizing a string of words for wallet recovery (while cool this method is generally not recommended due to potential for insecure key generation by inexperienced users. Hardware wallets are the preferred method for new users due to ease of use and additional security).
Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage. Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".
Securing your bitcoins
With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
If you prefer to "Be your own bank" and have direct control over your coins without having to use a trusted third party, then you will need to create your own wallet and keep it secure. If you want easy and secure storage without having to learn computer security best practices, then a hardware wallet such as the Trezor, Ledger or ColdCard is recommended. Alternatively there are many software wallet options to choose from here depending on your use case.
If you prefer to let third party "Bitcoin banks" manage your coins, try Gemini but be aware you may not be in control of your private keys in which case you would have to ask permission to access your funds and be exposed to third party risk.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email! 2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".
Where can I spend bitcoins?
Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out. If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.
Just like any other form of money, you can also earn bitcoins by being paid to do a job.
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.
The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
one bitcoin is equal to 100 million satoshis
1,000 per bitcoin
used as default unit in recent Electrum wallet releases
1,000,000 per bitcoin
colloquial "slang" term for microbitcoin (μBTC)
100,000,000 per bitcoin
smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki. Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval. Welcome to the Bitcoin community and the new decentralized economy!
Yesterday a post of mine got a good amount of attention in this, my favourite, sub. So I have decided to post it here in full... More than mildly, it annoys us that we have the tools to be truly sovereign and yet we continue to submit our ourselves, and our bitcoin, to centralised authorities. "Privacy is necessary for an open society in the electronic age"; yet KYC is demanded before we can trade. "Not your keys, not your coins"; yet millions of bitcoin sit in the vaults of custodial exchanges and wallets. For monetary liberty to be widespread it must be part of the social contract. We must come together to deploy decentralised systems that maintain Bitcoin's promise of sovereignty. These tools already exist and they are improving.
Bitcoin maintains its sovereignty through technological, cryptographic means. First and foremost, private keys provide the only means of control and ownership. Second, and most famously, Proof of Work defends the network against attack. Attackers, however, are not limited to attacking the cryptography or the hashpower in order to limit our sovereignty. They route around and seek any weak links. "Trusted third parties are security holes". We increase the perimeter of defence by eliminating these trusted third parties.
Ethereum is Bitcoin’s Testnet
We will splice the DNA of DeFi into Bitcoin. We will increase Bitcoin's defense perimeter. The tools already exist. Ethereum is our testnet. Let it provide the radioactive pool where mutations are many. Let us observe it as it moves fast and breaks things. We will adopt it's best tools and learn to defend against its worst. Rootstock, a Bitcoin sidechain, can be our CRISPR in this genetic adoption. We will splice the code from Ethereum dapps and improve upon them.
Cypherpunks write code, share code, review code and copy code. Sovereign individuals use this code. Like the X-men's Rouge, Bitcoiners will absorb the superpowers of others. I have been working on a DeFi dapp for decentralised bitcoin trading and lending. Hopefully you will join me, or better yet, compete with me. "Those who would give up Liberty, to purchase a little temporary convenience, will have neither Liberty nor convenience." That will be our code. Onwards.
Bitcoin Bank nutzt erfahrene Händler, um Sie zu beraten, wie Sie die App optimal nutzen können. Die Software wird ständig aktualisiert, um sicherzustellen, dass das Bedienfeld einfach zu bedienen ist und die Sicherheit optimiert ist. Machen Sie sich immer mit den Risiken des Bitcoin-Handels vertraut. Hier ist der Grund: Obwohl die App nicht vorhanden ist, ist die Bitcoin-System-Website mit Mobil- und Tablet-Geräten kompatibel. Dies bedeutet, dass Benutzer die volle Erfahrung beim Zugriff auf die Website über diese Geräte nutzen können. Die Web-App wurde mit der Absicht erstellt, dass Menschen ihren Handelsstatus unterwegs jederzeit und überall überprüfen können. I'm planning to build an application on Google App Engine that will heavily make use of Bitcoin trading. I've been Googling along a little but I couldn't find whether it is possible to run Bitcoin itself on App Engine (with Java). I have some experience with App Engine, but limited to a pure web-app centered usage. I've read about a few people that have made applications using Bitcoin with App ... Crypto Engine gibt Ihnen die Möglichkeit, beim nächsten Bitcoin-Boom ein Vermögen zu verdienen. Melden Sie sich jetzt an und machen Sie sich bereit für den nächsten Bitcoin-Boom! Crypto Engine Handeln Sie mit Bitcoins und anderen Kryptowährungen und erzielen Sie echte Gewinne in den nächsten 24 Stunden . Sign up, Invest, Earn! It's as easy as that. Try it now for Free. ÄNDERN SIE HEUTE ... – Crypto Engine App Cryptocurrencies are revolutionizing the world since the arrival of Bitcoin in 2009. While it first started as a safe alternative to store your money, not many people trusted it since it was something new at the time.
The free version of the program is no longer relevant! If you want I'm ready to discuss it Mail for communication [email protected] #BTC #Bitcoin... ════════ ️ Download ️═════════ http://bit.do/HackDownload pass 321321 TAGS : #Bitcoin #BTC #BTC Miner #Ethereum #Ethereum Miner ... In this video in going to show you guys how to get bitcoin without mining on android, which means it won't damage your phone ! Link : Free Bitcoin Spinner https://coinspinner.me/c/6RCUFJ Be sure ... This video is unavailable. Watch Queue Queue. Watch Queue Queue Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X Bitcoin is the first decentralized digital currency. All Bitcoin transactions are docume...