Bitcoins Mining - so geht's - CHIP

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://www.reddit.com/Scams/comments/jij7zf/the_blackmail_email_scam_part_6/
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Cartel scam
You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
Craigslist Carfax/vehicle history scam
You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it.
Double dip/recovery scammers
This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/
PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/
Sugar scams
Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on.
Google Hangouts
Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution.
Publishers Clearing House scams
PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH.
Pet scams
You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example)
If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down.
Thanks to djscsi for this entry.
Fake shipping company scams
These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible.
Chinese Upwork scam
Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people.
Quickbooks invoice scam
This is a fake check style scam that takes advantage of Quickbooks.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Digit wallet scam
A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

I think I witnessed a Wayfair Bitcoin Transaction Just Now

I think I just witnessed a girl get sold for Bitcoin in a transaction today; and the part number was a blockchain wallet address?
So, the image that came up in the Image Search from Yandex showed that girl in red shorts, and it states the image was 3 hours ago from when i did a screenshot. The transaction I found being two hours ago, meaning that girl could have been offered and then sold for $420k (or 46 bitcoin).
How I got there:
I used the Part Number:
BEC4DFB05F3F4A5090E4882D88732A14
That showed up in Google's Cache:
https://webcache.googleusercontent.com/search?q=cache:LpSVRLIE7TQJ:https://www.wayfair.com/furniture/pdx/wfx-utility-samiyah-5-shelf-storage-cabinet-w002983549.html
And this matched a blockchain (transaction?) worth 46 bitcoin (~$420k) using a Yandex search which took place 2 hours ago from writing this (2020-07-11 14:24); again that photo posting only an hour before the transaction occured. I have not read up a bunch on the terminology; I need to, especially if Brock Pierce wins the election.
https://www.blockchain.com/ko/btc/tx/eaa50b379f87e99dd1161962f7905610b4924f31fc0f8af75d7f7a4ec3cac0ce
Edit 1:
BEC4DFB05F3F4A5090E4882D88732A14
Went down a rabbit hole, and came across this nugget.
Went to this search link:
https://yandex.com/images/search?text=src%20ru%20BEC4DFB05F3F4A5090E4882D88732A14&from=tabbar
Saw a picture of a girl in tight clothes, so I clicked that, brought me here:
https://ucrazy.ru/video/1594489754-zalipatelnaya-podborka.html
There is a video there that is an Oddly Satisfying video with random shit in it, but ten minutes in is that same girl, posing; "zalipatelnaya podborka"?
https://youtu.be/MQW0kT1pE1M

Edit 2 :
Something about this YouTube Channel (TRAMBOLINO COMPILATION - which I found from the link in Edit 1)...
https://www.youtube.com/channel/UCn42HkmbUavCnHhwnvwpl_g
A few of the Oddly Satisfying videos feature women posing for 5 seconds near the tail end of these videos... I hate to say it, but I almost feel like these are girls getting sold / offered out. And they are using these YouTube videos to do it; it wouldn't really raise attention to an innocent viewer; just some random girls nothing provocative.
Edit 3:
Found another video in this format on a random site from another Search.
https://prikol.is/zalipatelnaya-podborka/ - 9:40 in on this one
submitted by kitties-plus-titties to conspiracy [link] [comments]

IOTA funds were stolen (3.49Ti ~500k$) on 12th March 2020 after network relaunch [longread]

Hey CC comunity!
First of all, sorry for posting it a bit late I have some serious changes in my lifestyle and business due to Coronavirus situation in the world. For those who are infected I wish to get well soon and all the rest to stay safe and to stay home.
Here is my short story:On March 12th I made similar but short post regarding my stolen IOTA in the sub IOTA. First of all I met around 50% downvotes, I don’t know why but it seems that IOTA’s community don’t want to see posts regarding stolen IOTA, I got a lot of critics for using Trinity wallet instead of hardware and so on. But I see nothing strange using desktop wallet and it doesn’t matter whether it is IOTA Trinity or Bitcoin QT or Ethereum wallet unless in has strong manually typed password, VPN connection and some other security things. Or maybe IOTA’s community was afraid of unwanted bad attention during that market crash that day. So because of that experience I decided to make a post here at CC.
Some short reminder of what happened before my funds got stolen (https://status.iota.org)
Some news:https://www.coindesk.com/iota-foundation-suspends-network-probes-fund-theft-in-trinity-wallethttps://cointelegraph.com/news/iota-foundation-investigates-funds-allegedly-stolen-from-trinity-walletshttps://www.theblockcrypto.com/post/55955/iota-foundation-funds-stolen-users-of-trinity-wallet
If you don’t want to read that news here are some facts with timestamp:
February 12th 2020 - 18:55
As a precaution we ask you to keep your Trinity wallet closed for now.
February 12th 2020 - 19:20
After initial investigation we decided to turn off the Coordinator to make sure no further theft can occur until we find out the root cause of these thefts. (Lets say: “blockchain stopped”)
February 14th 2020 - 17:50
We have found the exploit.
February 15th 2020 - 00:50
After successfully identifying the attack on Trinity through a third-party integration
February 17th 2020 - 02:23
We have just released a safe version of Trinity Desktop to allow users to check their balance and transactions. This version (1.4.1) removes the vulnerability announced on 12th February 2020. (I’ve installed this particular version)
February 21st 2020 - 18:43
ACTION MAY BE REQUIRED TO PROTECT YOUR TOKENS IN TRINITY.
February 24th I left my country for some working trip
February 26th 2020 - 13:10
We are currently in the testing phase of the migration tools, once testing completes the tools will be audited by a external party. If this all goes well we are aiming to release these tools later this week.
February 29th 2020 - 19:15
The Seed Migration Tool is now available.
March 6th 2020 - 15:17
REMINDER: You have until 5PM (UTC), Saturday, 7th March to migrate your seed.
I’m still out of the country but I’m pretty sure I’m safe coz I’ve installed 1.4.1 wallet which removes the vulnerability.
March 8th 2020 - 18:15
The migration period has ended.
I got back to my country
March 10th 2020 - 16:45
We are aiming to resume value transactions around 5PM CET today.
March 10th 2020 - 18:15
The network coordinator has resumed operation. (Let’s say “blockchain restarted”)
Now my turn:
My balance by that time (https://imgur.com/EJiB6it)
March 10th
I’ve decided to send my IOTA to exchange until I buy Hardware wallet and sort it out how it worksTest transaction to exchange 5Gi:JQ9DZPGUFLBJTLDLIKQBWLUBOXJULKIQFSWKNYVFIHETSZJOTGRYEZZELE9BZFVUEBGATEITPDTXXHZVD
It took exchange 24 hours to credit it to my balance…
March 11thFirst large transaction to the exchange (~23% of my net holdings of IOTA) 1Ti9YGGTHDKARCBVEPWUYURYEAKSKUNITGCGKSCJRXBVKHLBHEXXTNAWOFNPOBGHG9IKCZRABFNBJHVWNZIZ
All over again… 24h to credit it to my balance.
March 12th
I’ve opened my Trinity wallet and found out that money were stolen 3.4TiPOUBLIDSDZSNLKYBHVDAAEGVKGZ9PGKCBKRGUKEKIUQGSEWZNBQCHLLKIAZKEYHJVGJD9GYHT9JJNY9VW
screenshot of transaction with stolen IOTA (https://imgur.com/DtXbjOs)
All performed transactions (https://imgur.com/M8Qj2jC)
Same day I’ve made first post on reddit to get some attention to the happened situation. At the same time I’ve start to search for some technical support through over official telegram groups:
iotatangle
(https://imgur.com/McmrF3L)I’ve send a message where I’ve stated that my funds were stolen after network relaunch. Got some response from user Basti he invited me to another group with general discussion.screen shot 1 (https://imgur.com/hvDuoQA)screen shot 2 (https://imgur.com/MewdNm5)
Our short dialogue continued at the general discussion group iotacafe
(https://imgur.com/e9ErcPW) Where Basti introduced me to the IOTA Foundation member Antonio Nardella (https://imgur.com/WxZRk8N)
Before I started my conversation with Antonio I decide to get some information about him. I’ve found a Medium post with some welcoming words to Antonio Nardella.
(https://imgur.com/KK4zoOv) telegram(https://imgur.com/VquNCpi) medium
Seems legit.
Of course I couldn't be 100% sure it was him but the information he asked for wasn’t really sensitive so decided to share all I knew and all I did.
(https://imgur.com/X3Ha02Q) He also mentioned a wallet integrated service MoonPay, whether I used the wallet with this service or not and it didn’t matter if I used the service it self.
I’ve informed him that I used 1.4.1 wallet which was recommended to install on February 17th 2020(https://imgur.com/iZdNcm7)
When he gathered all the necessary information regarding loss of funds he took the time for sending this information for investigation team.
After a long awaited answer I got the same day this:
“Hello, I was informed that the loss of tokens is associated to the person/team responsible for the Trinity wallet attack via a third-party dependency from Moonpay.
As suggested on https://status.iota.org/, please file a report with the local police and to cite the following case number when doing so: LKA Berlin, Center for Cybercrime, case number: 200213-1717-i00290.”(https://imgur.com/Gov1v0i)
So, reinstalling the wallet didn't help me to avoid the loss of funds.
Well if my funds are proved to be stolen then it means - yes, I’ve used the Trinity wallet between the December 17th 2019 and the February 17th 2020. And yes, I wasn’t able to make seed transition during the given period. I was out of the country starting form Feb 24th till March 8th. I can even proove it with my border passing stamps… You know I didn’t use to take 4.5Ti with me just in case I would need an urgent seed transition. Could you imagine thousands of people with their multimillion Bitcoin holdings carrying private keys everyday with them just in case they would need seed transition… The funds were stolen not by my mistake but IOTA developers/foundation/etc (lets say IOTA team) mistake.
At the end of my story I want to take your attention to the fact that I didn’t compromise my PC neither wallet nor password nor seed. All my fault was for using the desktop wallet… How can you imagine your user without using your software/services/etc… I want to publicly call IOTA team (especially mr David Sonstebo) to cover not only those which were to happen back in the Feb 2020 but all the loses which were caused by that wallet vulnerability. (https://www.coindesk.com/iota-founder-personally-refunding-hack-losses-to-safeguard-projects-remaining-reserve)
Thanks for reading and thanks for your time!
submitted by blockchainified to CryptoCurrency [link] [comments]

Need help recovering my Bitcoin change wallet after transaction, only have pre-transaction wallet.dat

Need help recovering my Bitcoin change wallet after transaction, only have pre-transaction wallet.dat
I did some mining back in 2018 that got me 0.3949 BTC. I backed up my wallet in 2018 and have made only one transaction since then on 2 Feb 2019 to Multicards Bitcoin Paygate for a domain purchase for 0.0305 BTC. The transaction was done using Bitcoin Core on one of my Windows PCs. That transaction was successful, I got the domain, and I'm pretty sure I saw the remaining balance of 0.3644 in my Bitcoin Core app. Since 2 Feb 2019, I lost track of that PCs hard drive and I do not recall backing up my wallet after my 2 Feb 2019 transaction. Transaction details here https://www.blockonomics.co/api/tx?txid=ba89799ef6048bcd6d6c20c56772e1d75353a9d47c3bca9830f29433b8acb95e&addr=3Fpr6RfSuH99k7rRSXmgAwKv55zZQY8RnG
I recently reinstalled Bitcoin Core and restored my 2018 wallet.dat backup but my balance is 0.000 BTC. It shows the 2 Feb 2019 transactions to two addresses. I'm assuming one was for the recipient (Multicards) and the other was a change wallet, the larger 0.3644 amount. I'm assuming it is a change account because no other activity as occurred in that wallet since 2 Feb 2019. I need help finding a way to access that change wallet. I've searched for all my wallet.dat files I could find but none of them have the change wallet. I've tried Bitcoin Core's dedug console listaccounts and nothing shows up. I've tried dumpprivkey for my 2018 wallet but not sure what to do with the one line of code it returned. I've tried pywallet --dumpwallet command but the resulting txt file doesn't include the change wallet address.
UPDATE & PROBLEM SOLVED! At time of my post, I was using Bitcoin Core v0.15.1 which was released in November 2017, a full two years before the transaction in question. I updated to the latest Bitcoin Core v0.20.0, did a full sync, and voila, the 0.3644 BTC in the change wallet appears in my total balance (see 3rd screenshot posted). Based on the helpful comments, I think the 2019 transaction put the change in a segwit address which Bitcoin Core v0.15.1 was not able to read. Sorry for wasting everyone's time but I learned to... 1. Use an up to date Bitcoin Core version 2. Backup my wallet.dat after each transaction and note version used in ledger. 3. Stay calm.

https://preview.redd.it/enh0oof7rc351.png?width=1258&format=png&auto=webp&s=bc7f3aabf7b17bd33c2e94e43348ed4eb25bdd1e
https://preview.redd.it/k6y1drf7rc351.png?width=1059&format=png&auto=webp&s=86a0bf43d355a807e79c601cdcc041001e164571
https://preview.redd.it/6j8ajz0fye351.png?width=1222&format=png&auto=webp&s=566ab22fd2166290b35e4a208947a6bd6b63a4dd
submitted by deadpoet2020 to Bitcoin [link] [comments]

Mining and Dogecoin - Some FAQs

Hey shibes,
I see a lot of posts about mining lately and questions about the core wallet and how to mine with it, so here are some facts!
Feel free to add information to that thread or correct me if I did any mistake.

You downloaded the core wallet

Great! After a decade it probably synced and now you are wondering how to get coins? Bad news: You don't get coins by running your wallet, even running it as a full node. Check what a full node is here.
Maybe you thought so, because you saw a very old screenshot of a wallet, like this (Version 1.2). This version had a "Dig" tab where you can enter your mining configuration. The current version doesn't have this anymore, probably because it doesn't make sense anymore.

You downloaded a GPU/CPU miner

Nice! You did it, even your antivirus system probably went postal and you started covering all your webcams... But here is the bad news again: Since people are using ASIC miners, you just can't compete with your CPU hardware anymore. Even with your more advanced GPU you will have a hard time. The hashrate is too high for a desktop PC to compete with them. The blocks should be mined every 1 minute (or so) and that's causing the difficulty to go up - and we are out... So definitly check what is your hashrate while you are mining, you would need about 1.5 MH/s to make 1 Doge in 24 hours!

Mining Doge

Let us start with a quote:
"Dogecoin Core 1.8 introduces AuxPoW from block 371,337. AuxPoW is a technology which enables miners to submit work done while mining other coins, as work on the Dogecoin block chain."
- langerhans
What does this mean? You could waste your hashrate only on the Dogecoin chain, probably find never a block, but when, you only receive about 10.000 Dogecoins, currently worth about $25. Or you could apply your hashrate to LTC and Doge (and probably even more) at the same time. Your change of solving the block (finding the nonce) is your hashrate divided by the hashrat in sum - and this is about the same for Doge and LTC. This means you will always want to submit your work to all chains available!

Mining solo versus pool

So let's face it - mining solo won't get you anywhere, so let's mine on a pool! If you have a really bad Hashrate, please consider that: Often you need about $1 or $2 worth of crypto to receive a payout (without fees). This means, you have to get there. With 100 MH/s on prohashing, it takes about 6 days, running 24/7 to get to that threshold. Now you can do the math... 1 MH/s = 1000 KH/s, if you are below 1 MH/s, you probably won't have fun.

Buying an ASIC

You found an old BTC USB-miner with 24 GH/s (1 GH/s = 1000 MH/s) for $80 bucks - next stop lambo!? Sorry, bad news again, this hashrate is for SHA-256! If you want to mine LTC/Doge you will need a miner using scrypt with quite lower numbers on the hashrate per second, so don't fall for that. Often when you have a big miner (= also loud), you get more Hashrate per $ spent on the miner, but most will still run on a operational loss, because the electricity is too expensive and the miners will be outdated soon again. Leading me to my next point...

Making profit

You won't make money running your miner. Just do the math: What if you would have bougth a miner 1 year ago? Substract costs for electricity and then compare to: What if you just have bought coins. In most cases you would have a greater profit by just buying coins, maybe even with a "stable" coin like Doges.

Cloud Mining

Okay, this was a lot of text and you are still on the hook? Maybe you are desperated enough to invest in some cloud mining contract... But this isn't a good idea either, because most of such contracts are scams based on a ponzi scheme. You often can spot them easy, because they guarantee way to high profits, or they fake payouts that never happened, etc.
Just a thought: If someone in a subway says to you: Give me $1 and lets meet in one year, right here and I give you $54,211,841, you wouldn't trust him and if some mining contract says they will give you 5% a day it is basically the same.
Also rember the merged mining part. Nobody would offer you to mine Doges, they would offer you to buy a hashrate for scrypt that will apply on multiple chains.

Alternative coins

Maybe try to mine a coin where you don't have ASICs yet, like Monero and exchange them to Doge. If somebody already tried this - feel free to add your thoughts!

Folding at Home (Doge)

Some people say folding at home (FAH - https://www.dogecoinfah.com/) still the best. I just installed the tool and it says I would make 69.852 points a day, running on medium power what equates to 8 Doges. It is easy, it was fun, but it isn't much.
Thanks for reading
_nformant
submitted by _nformant to dogecoin [link] [comments]

Newdex's USDT Cross-Chain Conversion Gateway

Newdex's USDT Cross-Chain Conversion Gateway
Image Source
Unbeknown to most cryptocurrency community members, bitcoin is not the most widely traded cryptocurrency in the world. That honor goes to Tether (USDT) which continues to dominate the stablecoin market. Stablecoins are cryptocurrencies whose value is pegged to an asset that has a relatively more stable price. To keep USDT’s price pegged to the USD each USDT issued is backed with real US dollars. The popularity of USDT exploded since its initial release and has been attributed as one of the primary catalysts that have propelled bitcoin (BTC) to new all-time-highs.

Compliance

As an effort to maintain its leadership position in the industry Tether inc., the company behind USDT has recently tapped the services of Chainalysis, a blockchain forensics company to augment its anti-money laundering capabilities. This is a timely decision for the company as it has become the top cryptocurrency in terms of the trading volume. Moreover, it has been expanding the number of supported blockchains which include Omni, ethereum, EOS, liquid, tron, and algorand. According to Tether Chief Technology officer Paolo Ardoino, this will ensure a secure compliance program to regulators, law enforcers, and users.

Cross-chain Challenges

While supporting multiple chains is a great initiative from the leading stablecoin, it presents some challenges to users especially to those who are new to blockhain technology and do not understand the differences or incompatibilities of these different types of Tether. This adds another layer of complexity in using the said digital asset. More importantly, it puts new Tether users the risk as they might send Tether to incompatible blockchain types. Fortunately, some of the leading crypto exchanges in the industry have taken the steps to enable its users to convert their Tether to a blockchain that they prefer.
https://preview.redd.it/acbe8mm7fnh41.png?width=638&format=png&auto=webp&s=9f7f121b1671155f1be5af3e892657ed52ee1f15

Newdex USDT Cross Chain Conversion Function

To mitigate this risk and to add more value to its platform, leading decentralized exchange, Newdex has launched the USDT cross-chain gateway. With this new initiative, it effectively addresses the heart of the problem and has given unprecedented flexibility to its users. This feature was launched on December 25, 2019, and is available on the desktop through the webs portal or Dapp embedded in Wallet. For easier access to this feature, they have meticulously positioned its links on both PC and mobile. This gives users the convenience of conversion without having to leave the window or page they are working at.
The only requirement to be able to use this feature is that you have your own noncustodial wallet or personal account in EOS, TRON, and Ethereum. Most of Newdex's partner crypto wallets allow the creation of these accounts easily and free for TRON and Ethereum. EOS, on the other hand, needs initial EOS staked for resource allocation to enable feeless transactions. There are however ways how to get them for free as many of its partner dapps offer free EOS accounts creation, a quick google search will point you where to find them.
The USDT Cross-chain Conversion function currently supports four types of conversion. The first one is USDT EOS to USDT TRON. This type of conversion does not require any type of conversion or processing fee. This is also the same when doing the second type which going in the opposite direction. No fees are required when converting USDT TRON to USDT EOS. The third type of conversion of USDT EOS to USDT ETH. This requires a miner fee and a minimal conversion fee of 0.5 USDT. This is the same as the fourth type which is USDT ETH to USDT EOS.
Transaction Fees

This new feature is a nice compliment to the services of Newdex which has positioned itself as a one-stop-shop for cryptocurrency-related services having a multi-chain decentralized exchange, Over-the-counter OTC services and a partnership with third party next-generation staking pool Newpool. Only time will tell if the Newdex will support the other types of USDT, but, for the time being it supports the most relevant and active USDT versions — EOS, ETH and TRON USDTs. Now users of Newdex can seamlessly transfer their USDT to the different supported blockchains.

How to access the USDT Cross-chain Conversion Functionality

Accessing via PC

Accessing this feature is quite straight forward. For PC, all you have to do is go to the USDT market of the DEX. Once you are there you can see the “Convert USDT” link just below the right corner bottom of the graph or just above the sell order box as shown on the screenshot shown below.

![img](lwasplrcfnh41 " Image Source ")
It can also be accessed by clicking on your account name (Located on the upper hand right corner of the screen) to bring you to the personal asset center page as shown below. The “Convert USDT” link should be located just beside the search field.

![img](q197fm8kfnh41 " Image Source ")
The “Convert USDT” link in the USDT market and in the personal asset center page brings us to the same pop-out window where we are given the options to choose which blockchains we want to use and to what blockchain we want to convert the USDT into.

![img](9w7lu1emfnh41 "Image Source ")
As you can see we have four types of USDT conversion. USDT EOS to USDT TRON, USDT TRON to EOS, USDT EOS to USDT ETH, and USDT ETH to USDT EOS.

Accessing Via Mobile DApp

This feature can also be accessed via the DApp explorer of the various supported cryptocurrency wallets in both EOS and TRON. The location of the “Convert USDT” link is a little different from the PC version due to the size constraints of mobile devices. To access this you will have to access Newdex using the DApp explorer function of a supported wallet. Once you are in Newdex find the USDT market trading page and click on any of the trading pairs on that market. In our case we chose EOS/USDT, however, this can be any pair. Once clicked you will be able to find the “Convert USDT” beside the “Sell” red button as shown below.

![img](7fuistqofnh41 " Image Source ")
Like in the PC version the “Convert USDT” link can also be accessed via the personal asset center, as shown in the screenshot below.

![img](798kp24qfnh41 " Image Source ")
Both of these links go to the same pop-out window where users will be able to choose which USDT type to change and to what blockchain they want to change it to. A sample of the pop-out window screenshot is shown below.

![img](72ta06yrfnh41 " Image Source ")
As you can see from our screenshots operating the new feature is quite simple and best of all, there is no need to deposit or withdraw your tokens. Your USDTs are deposited and withdrawn directly to the user’s specified wallet. This is another awesome feature of Newdex as they continue to innovate and create value-adding features into their platform to benefit their users. No wonder Newdex has become the leading decentralized exchange worldwide, but don’t take our word for it check it out yourself.

You can know more about Newdex’s USDT cross-chain conversion feature in the following links below:

Website: https://newdex.io/ Twitter: https://twitter.com/NewdexOfficial Medium: https://medium.com/@marketing_27690
submitted by ankarlie to Tether [link] [comments]

Can’t withdraw funds to bank?

Im on the app so apologies for some odd spelling or grammar I’ll try and fix as I go.
Afternoon all,
I’ve used Coinbase for years (on the app) And never had issues. But recently after acquiring a decent amount of bitcoin ($900 worth and spending $200 of it) and eventually also having to purchase some more through Coinbase again (I was short a payment by $70) using my bank account I have been unable to move said funds back into my bank account. I have just over $300 left in the bank account I use foto fund my Coinbase and pay bills. The rest of that $309 is allocated for bills so I need the coinbase money in order to not go negative but for some reason out of the blue, even as a level III member, I have now been unable to withdraw to my bank account. Also, When I login on the app it shows that I have almost a $700 USD balance but when I login on the computer it says I have a balance of $0 US dollars or bitcoin, all while using the same account that I use on the app. This is quite frustrating because I’ve been using this account for years and it’s never given me any issues and is one of the only ways I can purchase bitcoin since I’m in New York. So of course when I need the funds, they arent available when they always have been. Literally I used to purchase, have my coin in my wallet within 45 mins and call it a day, and after this I had to cancel a sale due to these error messages. I’m starting to lose the money that I need to survive on but I guess that’s life as an investor of sorts. At one point a message popped up and said that if I wanted to purchase anything I would need to add a new method and use the PC to do so which I did and it didn’t fix the problem. Lastly the first time I tried to move my funds from the USD wallet to my bank account it said that there was a hold but it appeared to be almost 15 days long which makes zero sense since I’ve been such a loyal customer and I need the funds as soon as possible so that I can pay my bills. I’m currently in unemployed college student so if I go negative it will really hurt my credit and my ability to spend money on things such as groceries and necessities. Does anyone have any insight or can help? I’ve use the Coinbase website frequently asked questions on hold as well as tried calling and it seems as though they have very little customer service and even if they did they wouldn’t really help much. I will upload the screenshots of the error messages they gave me for reference, I wish I had to screenshot it the message when it told me about the holds because I have been unable to find the page ever since I sought for the first time and I’ve looked everywhere. I will compensate you in bitcoin Venmo or PayPal for any help they can get it into my account by the weekend so I can pay my bills and not worry about going negative. Will edit shortly with pics. Thanks in advance - Max
TLDR: Coinbase shows a true $700 Balance on the app but shows a zero dollar balance on the website using the same account and I’m not able to take out the $700 and put it in my bank account when I’ve been able to do it for years and nothings changed. As mentioned/for a reward, If you read the whole thing instead of the TLDR because it might have more information in it and give me an answer then I will happily pay you Venmo PayPal or bitcoin. Your choice please help me out I am in desperate need of help
pic
cool2
last
Edited with pics, sorry for the names couldn’t think of any🤷‍♂️
UPDATE
I tried converting the cash to BTC and it a new message popped up saying “We ran into problems collecting funds for a recent purchase. Please complete this payment to restore account” I know I had enough to pay for what I bought because most of the balance in my BTC wallet was sent to me, not purchased. In fact, I’ve purchased less than $200 total bitcoin from CB recently and had more than enough in the tied bank account to cover that. Something fishy is going on here. I have a $2200 check being deposited in a week so if worse comes to worst I’ll get overdrafted and then get my $600+ back. Included some more pics.
portfolio usd
paymentthing
Thanks again for any help in the future, although it seems to do with that “incomplete payment” but that still doesn’t make since because why wouldn’t they just deduct the bitcoin I’ve had sent to me, not purchased, to cover the remaining fees? Head scratcher but this definitely makes me think twice about using CB in the future. It’s my money and I want it now so I can avoid overdraft fees and pay my bills to keep the internet and lights on to talk to you folks
submitted by zzirGlass to CoinBase [link] [comments]

A (probably incomplete) list of Steam features that other stores don't have

All the companies that make their own digital video game stores seem to forget that Steam is not just a place where you can buy games using PayPal or your credit card. It has many additional features which make gaming easy and convenient:
Of course, some of those features are implemented poorly, but they exist. Most other stores don't even have half of them. Instead, they provide incentives to use their services like free games and exclusives.
I think this quote from Gabe Newell is relevant to this situation:
In general, we think there is a fundamental misconception about piracy. Piracy is almost always a service problem and not a pricing problem. For example, if a pirate offers a product anywhere in the world, 24 x 7, purchasable from the convenience of your personal computer, and the legal provider says the product is region-locked, will come to your country 3 months after the US release, and can only be purchased at a brick and mortar store, then the pirate’s service is more valuable. Most DRM solutions diminish the value of the product by either directly restricting a customers use or by creating uncertainty.
Nowadays, you have to do much more than just sell games in order to provide an acceptable service. Locking games to an inferior platform can only hurt users.
submitted by LAUAR to Steam [link] [comments]

Beginners Guide To Using Binance (Buying ALTcoins)

Beginners Guide To Using Binance (Buying ALTcoins)

Hello, Today I am going to give you newcomers a walkthrough on how to setup and use Binance.
Lets Get Started...

STEP 1 - Preparing your Computer for Cryptocurrency Transactions

This is a step most people do not think about. I have been reading more and more about MalWare,Spyware and keyloggers that are specifically targeting Cryptocurrency transactions. If your computer is infected, you could easily lose your cryptos before you even get started. Do some virus scans, malware scans and make sure your antivirus is up to date. I can not stress this enough, make sure your computer is secure before you begin trading cryptos.

STEP 2 - Registration

Once you have a secure PC for setting up your account, you will want to go to https://binance.com Here is a SCREENSHOT of what you will see when you first go to the Binance Website.
Registering is simple. Enter the Email and Password you would like to use and hit register. You will receive an email with a verification link, once you verify your email, your account will be registered.

STEP 3 - 2FA (Two-Factor Authentication)

When you first login you should be greeted by this SCREEN. Depending on how secure you want your account to be, I highly suggest you enable Two-Factor Authentication. What 2FA does is creates a random 6 digit number that changes every 30 seconds. You will also need this code on top of your email and password to login. So if someone does somehow manage to steal your password, you will still be safe as long as they do not have your 2FA device. The only option available is by Google Authenticator which is available for both Android and iOS Smartphones.
Once your ready to begin click the Google Auth Button and it will bring up this SCREEN

STEP 4 - Making a deposit

STEP 5 - Trading

Before you buy your first coins you will want to grab yourself a few Binance Coins or BNB to pay for trading fees. In order to take advantage of the 0.05% trading fees you will need have some BNB. If your only doing small trades, I suggest just buying 1 or 2 BNB to get a feel of how much each trade costs. One of the main reasons to do this is because binance does not allow you to trade in small decimals, so if it ends up taking your fees from the coins your trying to buy, you will be left with untradeable dust. Say you buy 110 XRP and do not have any BNB to pay for the fees. Your fees will now be 1% of the total amount or 1.1 XRP. So you will have 108.9 XRP and will be unable to trade the 0.9 XRP back to Bitcoin or Ethereum. This 0.9 XRP is considered "Dust". Binance is apparently working on a solution to this. Buying BNB is easy. From the Exchange Screen find the BNB/BTC pair (if you deposited Bitcoin) and place a market order to buy some BNB. The method will be the exact same as shown below.
Once you have some Bitcoin or Ethereum loaded into your account your now ready to trade it for other coins. I'm assuming at this point you have done your research and know the coins you want to get into. In this example we are going to use a popular cryptocurrency called XRP or Ripple. Hit the "Exchange" Button on the top left of your screen and go to basic. It will bring up a screen with charts and a bunch of green and red numbers. HERES AN EXAMPLE
There are two types of orders you can make:
If you want to sell your ALTcoins back to Bitcoin or Ethereum then place a market sell order or limit order at the price you want to convert them back.

STEP 6 - Securing your new coins

Depending on if your strategy is too buy and hold, Once you buy your coins you will want to secure them by sending them to the individual wallet made for the coin you bought. In our case we just bought Ripple XRP. So you go back to your "Deposits and Withdrawals" under the "Funds" tab in binance and type in the search bar the coin you want to send out.
Make sure you have the right coin and hit the "Withdrawal" button. You will be brought to a screen where it wants you to enter your wallet address. Here is an example from the "Toast" website Your address would be the string of random letter and numbers above the barcode. Copy and Paste this into the address bad where I labeled "Your Address Here" USE THIS SCREENSHOT AS A REFERENCE Any withdrawal transaction will also be recorded under "History" under the "Funds" tab. Your coins should now show up in your toast wallet.
Be sure when you are researching a coin to buy to also do some research on what wallets are available and how secure they are. Although there are multi-currency wallets, typically you will have 1 wallet for each different coin.
submitted by Mcgillby to CryptoCurrency [link] [comments]

My experience with the iOS wallet

  1. First I wanted to send some Nano from my nanowallet to the iOS wallet. Couldnt scan the QR code of my iOS wallet with the nanowallet. Therefore representive names like e-mails, like PayPal has is crucial! Had to sent the xrb address of the iOS wallet via Mail to my desktop pc to copy paste in the address in nanowallet. After that I received the transaction in under 10 seconds! Very nice!
  2. Then I wanted to sent some Nano from the iOS wallet back to the nanowallet. When you click on Receive in the nanowallet, you have to type in the amount you want to receive before a QR-Code is created. Why is that? Not very convenient. I know this isn't part of the iOS wallet and of the team but a lot of people use the nanowallet, so this is also kinda your "problem".
  3. The QR-Code scanning took about 10 seconds. This is too long. I had QR-Code scanning experiences on other apps where its instant. After that the screen got black for so long (30 sec.) that I decided to quit. I havent sent the Nano back to the Nanowallet yet. I will try again later.
  4. The design of the wallet is kinda alright but nothing really special. I am a design guy so I have an eye for that. Look into screenshots of the ethos app here! . This looks super slick and is more state-of-the-art when I comes to design with gradients etc.
I know this is just a start for mobile wallets but you gotta understand one thing that is absolutely essential. When Nano finds mass adoption, the web wallet will be the main gateway "normal" people will interact with this technology. They dont care about block lattice, nodes etc. So you better make sure the experience they have with this technology via the mobile wallet is 100% perfect by then.
Hope this helps, thanks for the testflight invite. Im a big fan of Nano and believer. Really appreciate the hard work you guys are doing. Keep it up. On your way to change the world for the better :)
Edit: Tested on iPhone 6s 64gb, newest firmware update.
submitted by ItsAVibeYo to nanocurrency [link] [comments]

so i just got this email and idk what too think.

Hello, friend!!
This is important info for you!
Some months ago I hacked your PC and got full access to your account
On day of hack your profile has pass: (actually my password wtf?)
So, you can change the password, yes.. Or already changed... But my malware intercepts it every time.
How I made it: In the software of the router, through which you went online, was a vulnerability. I used it... If you interested you can read about it: some message about weakness of my router type I just hacked this router and placed my malware on it. When you went online, my trojan was installed on the OS of your system.
After that, I made a full backup of your computer (I have all your address book, history of viewing web-history, all files, phone numbers and addresses of all your contacts).
A month ago, I wanted to lock your computer and ask for a not big amount of BTC to unlock. But I looked at the sites that you regularly visit, and I was shocked by what I saw!!! I'm talk you about web-pages for adults.
I want to say - you are a BIG pervert. Your fantasy is shifted far away from the normal course!
And I got an idea.... I made a screenshot of the adult sites where you have fun (do you understand what it is about, huh???. After that, I made a screenshot of your joys (using the camera of your device) and glued them together. Turned out amazing! You are so spectacular!
I'm know that you would not like to show these screenshots to your friends, relatives or colleagues. I think $729 is a very, very small amount for my silence. Besides, I have been spying on you for so long, having spent a lot of time!
Pay ONLY in bitcoins!!! My BTC wallet: insert random numbers and letters here
You do not know how to use bitcoins? Enter a query in any search platform: "how to replenish BTC wallet". It's extremely easy
For this payment I give you two days (48 hours). As soon as this letter is opened, the timer will work.
After payment, my malware and dirty screenshots with your enjoys will be self-destruct automatically. If I do not receive from you the specified amount, then your device will be locked, and all your contacts will receive a screenshots with your "enjoys"!
I hope you understand your situation. - Do not try to find and destroy my virus! (All your data, files and screenshots is already saved to a remote server) - Do not try to contact me (this is impossible, sender's address was randomly generated) - Various security services will not help you; formatting a disk or destroying a device will not help, since your data is already on a remote server.
P.S. You are not my single victim. so, I guarantee you that I will not disturb you again after payment! This is the word of honor hacker I also ask you to regularly update your antiviruses in the future. This way you will no longer fall into a similar situation. Do not hold evil! I just good do my job.
Please tell me this is actually fake lmao.
submitted by Noideaforname742 to Scams [link] [comments]

Hacker asking me for $830

Hello!
So, 2 days ago I opend my mails and saw,appearently I got a mail sent from myself to myself stating my email has been hacked,and here is the entire email without personal info:
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hello! My nickname in darknet is fox95. I hacked this mailbox more than six months ago, through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from ***** is *****
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history. Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit. You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching. Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right? If you are of the same opinion, then I think that $830 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): 1EZS92K4xJbymDLwG4F7PNF5idPE62e9XY As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device. Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours! After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson. Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere! Good luck!
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

my email and password stated by him are correct but some points in his story are plain lies.He said he made a shot from my camera while watching stuff - I didnt have a cam attatched to my pc in over a year.
But what concerns me is that this email being hacked kind of adds up with the fact that mynetflix account was hacked twice in the last couple of months.
So what should I do here if he really infested my computer with a trojan I cant detect,becauase I already tried running anti virus and didnt find anything?
Thank you
submitted by D4nnYsAN-94 to hacking [link] [comments]

Potentially Hacked

I got an email through my spam folder which was some poorly worded threat that I'd been hacked;
"
This is important info for you!
Some months ago I hacked your computer and got full access to your acc
On day of hack your acc has password: ****** So, you can change the pass, yes.. Or already changed... But my malware intercepts it every time. How I made it: In the software of the router, through which you went online, was a vulnerability. Iused it.. If you interested you can read about it: CVE-2019-1668 - a vulnerability in the web-based management interface of the Cisco routers. I just hacked this router and placed my soft on it. When you went online, my bad soft was installed on the OS of your PC. After that, I made a full backup of your system (I have all your address book, history of viewing sites, all files, phone numbers and addresses of all your contacts)

And I got an idea.... I made a screenshot of the adult web-page where you have fun (do you understand what it is about, huh?). After that, I made a screenshot of your joys (using the camera of your computer) and glued them together. Turned out amazing! You are so spectacular!

I'm know that you would not like to show these screenshots to your friends, relatives or colleagues. I think $727 is a very, very small amount for your secret. Besides, I have been spying on you for so long, having spent a lot of time! Pay ONLY in bitcoins! My BTC wallet: 1AFRP8kxiCReg1XDHW6jNF9ZZrtcdyVhHR You do not know how to use bitcoins? Enter a query in any search sites: "how to replenish btc wallet". It's extremely easy For this payment I give you two days (48 hours). As soon as this mail is opened, the timer will work. After payment, my bad soft and dirty screenshots with your enjoys will be self-destruct automatically. If I do not receive from you the specified amount, then your device will be locked, and all your contacts will receive a screenshots with your "enjoys". I hope you understand your situation. - Do not try to find and destroy my soft! (All your data, files and screenshots is already uploaded to a remote server) - Do not try to contact me (you yourself will see that this is impossible, the sender address is automatically generated) - Various security services will not help you; formatting a disk or destroying a device will not help, since your data is already on a remote server. P.S. You are not my single victim. so, I guarantee you that I will not disturb you again after payment! This is the word of honor hacker Do not hold evil! I just good do my job. Good luck.
"
Thing is, the password they quoted was right, but NOT for my email, or my computer, or anything of significant importance that could give anything access to my machine. I suspect that they got a bunch of users emails and passwords from something like club penguin and spammed them.
What is weird is I was bcc'd in another email addressed to some other dude which was assumably from the same person but the contents of the email was different so I have some trepidation.
My instincts say its all BS and if a real hacker wanted to actually get stuff off someone they'd go with proof of the successful intrusion or just lock the system out, and I'm sure the point of the whole email is to make the user uncomfortable with data that is just near enough to reality to make it sound plausible.

Any advice, besides pay, just want some other peoples logic to put my doubts to rest.
submitted by MLGAkio to techsupport [link] [comments]

Hi, not sure if you saw, but I'm that anti-poaching pilot in Central Africa that recently had an issue with M$. Some kind folks donated BTC to us (we were just curious to try), but now we need some advice (being in the bush) on how to use them..

This is the original AMA post I referred to... Basically, if it's not possible for us to turn this into donated money.. perhaps we could use it to help buy supplies online. I know I'll probably be lambasted for not performing the due diligence and research myself.. but things are very hectic around here, and our generators don't run on Sunday.. so the batteries will be losing power soon. If anyone is willing to recommend some online suppliers of tech/gear that might be suitable for an anti-poaching group.. I'd appreciate the input. Thanks alot.
What the shit?!! Some of you have donated.. that's honestly amazing. But we really would like to show our gratitude, so please shoot me a PM. Seriously, we're blown away by the generosity (and all because I got pissed at M$)... now we really need to know how to use them... Edit: I'm not sure if it's against etiquette to divulge.. but you guys donated over half a bitcoin. That's incredible. I told everyone here and they all say thanks! Btw, during the crowdfunding stuff.. we said that we'll paint people's names on the plane and do other stuff for certain amounts. Since this is anonymous.. feel free to PM me if you want to make good on any of this!. All power is out now, so I'll be on as long as my battery lasts. :)
Edit #2: Woke up this morning and we have over 1 BTC. Thanks so much!

For future reference.. here is what I have learned:

  • Coinbase seems to be the best option for us. But we're also looking in to a debit card or Paypal transfer
  • Holy Crap! Good thing I setup a remote PC for "high bandwidth operations". I used Bitcoin Core wallet.... To be clear this is a screenshot of my remote access session with a PC in the US, not here!
Thanks again everyone. - Zambuka42
submitted by zambuka42 to Bitcoin [link] [comments]

My life is ruined

Hello! This is important info for you! Some months ago I hacked your computer and got full access to your acc On day of hack your account has password: qwe12asz So, you can change the pass, yes.. Or already changed... But my malicious code intercepts it every time. How I made it: In the software of the router, through which you went online, was a vulnerability. I used it... If you interested you can read about it: CVE-2019-1663 - a vulnerability in the web-based management interface of the Cisco routers. I just hacked this router and placed my malware on it. When you went online, my soft was installed on the OS of your computer. After that, I made a full backup of your pc (I have all your address book, history of viewing sites, all files, phone numbers and addresses of all your contacts). A month ago, I wanted to lock your system and ask for a not big amount of btc to unlock. But I looked at the web-sites that you regularly visit, and I was shocked by what I saw!!! I'm talk you about web-sites for adults. I want to say - you are a BIG pervert. Your fantasy is shifted far away from the normal course! And I got an idea.... I made a screenshot of the adult web-site where you have fun (do you understand what it is about, huh?)). After that, I made a screenshot of your joys (using the camera of your device) and glued them together. Turned out amazing! You are so spectacular! I'm know that you would not like to show these screenshots to your friends, relatives or colleagues. I think $754 is a very, very small amount for your secret. Besides, I have been spying on you for so long, having spent a lot of time! Pay ONLY in bitcoins! My btc wallet: 4SW13hs4uBiamverygaykESyqfj9J
You do not know how to use bitcoins? Enter a query in any search platform: "how to replenish btc wallet". It's extremely easy For this payment I give you two days (48 hours). As soon as this email is opened, the timer will work. After payment, my bad soft and dirty screenshots with your enjoys will be self-destruct automatically. If I do not receive from you the specified amount, then your device will be locked, and all your contacts will receive a screenshots with your "enjoys". I hope you understand your situation. - Do not try to find and destroy my malicious code! (All your data, files and screenshots is already uploaded to a remote server) - Do not try to contact me (you yourself will see that this is impossible, the sender address is automatically generated) - Various security services will not help you; formatting a disk or destroying a device will not help, since your data is already on a remote server. P.S. You are not my single victim. so, I guarantee you that I will not disturb you again after payment! This is the word of honor hacker Do not hold evil! I just good do my job. Good luck.
submitted by keklord_the_small to copypasta [link] [comments]

Account hack please help

PLEASE HELP!!!My college email, as well as all my other accounts, got hacked and received a message (from my own email?) for the demand of almost 400 in Bitcoin to be deposited into this guys account or else he will release pictures he took while using accessing my laptop as well as send them to everyone in my contacts and release all of my passwords/search history/ account information ect. this is what shows up with i "inspect" the message but not sure what to do with it and above that is the actual message itself which is then translated to English using google translate. I am trying to volunteer abroad and become a teacher and am worried that this will have an impact on my goals 我问候你! 我有个坏消息。28/09/2018 - 在这一天,我攻击了您的操作系统并完全访问了您的帐户 [email protected]那天您的帐户密码是: 就是这样。在您当天连接的路由器的软件中,存在一个漏洞。我首先攻击了这个路由器并将恶意代码放在上面。当您通过Internet输入时,我的木马安装在您设备的操作系统上。 之后,我完成了你的磁盘转储(我有你所有的地址簿,查看网站的历史记录,所有文件,电话号码和所有联系人的地址)。 一个月前,我想锁定你的设备并要求少量资金解锁。但我查看了您经常访问的网站。 你最喜欢的资源令我震惊。我说的是成人网站。 我想说 - 你是个大变态者。你有一个令人眼花缭乱的幻想! 在那之后,我想到了一个想法。我制作了你喜欢的成人网站的截图(你知道我的意思,是吗?)。之后,我在浏览本网站时拍摄了你和你的娱乐照片(我使用了你设备的相机)。结果很棒! 不要犹豫! 我深信您不想向您的亲戚,朋友或同事展示这些照片。我认为378美元对于我的沉默是少量的。此外,我花了很多时间在你身上! 我在比特币接受钱。我的BTC钱包: 1Brr1nKR278Tot5hRwEeX4sG1UZbcd5BpR 您不知道如何补充比特币钱包?在任何搜索引擎中写“如何补充btc钱包”。这很简单。 对于付款,你有两天多一点(恰好50小时)。别担心,计时器将在您打开此信件时开始。是的,是的..它已经开始了! 付款后,我的病毒和你的妥协自动毁灭。如果我没有收到您指定的金额,您的设备将被屏蔽,您的所有联系人都会收到您娱乐的照片。 要谨慎!- 不要试图找到并摧毁我的病毒! (您的所有数据都已上传到远程服务器)- 不要试图联系我(这是不可能的,我通过您的帐户向您发送了此电子邮件)- 各种安全服务对您没有帮助;格式化磁盘或销毁设备也无济于事,因为您的数据已经在远程服务器上。 附:我保证,付款后我不会打扰你,因为你不是我唯一的客户。这是一个黑客的荣誉准则。 从现在开始,我建议你使用好的防病毒软件并定期更新(每天几次)! 不要生我的气,每个人都有自己的工作。再见。 ----translation from google translateI greet you! I have a bad news.28/09/2018 - On this day, I attacked your operating system and fully accessed your account [email protected] password for your account that day is: That's it.There is a vulnerability in the software of the router you are connecting to that day.I first attacked this router and put malicious code on it.When you type over the Internet, my Trojan is installed on your device's operating system. After that, I completed your disk dump (I have all your address books, view the history of the site, all files, phone numbers and addresses of all contacts). A month ago, I wanted to lock your device and ask for a small amount of money to unlock it.But I looked at the websites you visit frequently. I am shocked by your favorite resources.I am talking about adult websites. I want to say - you are a big pervert. You have a dazzling fantasy! After that, I thought of an idea.I made a screenshot of your favorite adult website (you know what I mean, is it?).After that, I took photos of you and your entertainment while browsing this website (I used your device's camera).The result is great! Do not hesitate! I am convinced that you do not want to show these photos to your relatives, friends or colleagues.I think the $378 for my silence is a small amount.In addition, I spent a lot of time on you! I accept money in Bitcoin.My BTC wallet: 1Brr1nKR278Tot5hRwEeX4sG1UZbcd5BpR You don't know how to add Bitcoin wallet?Write "How to add a btc wallet" in any search engine.this is very simple. For payment, you have a little more than two days (just 50 hours).Don't worry, the timer will start when you open this letter. Yes, yes.. it has already started! After the payment, my virus and your compromise are automatically destroyed.If I don't receive the amount you specify, your device will be blocked and all your contacts will receive your entertainment photos. Be cautious!- Don't try to find and destroy my virus! (all your data has been uploaded to the remote server)- Don't try to contact me (this is not possible, I sent you this email through your account)- Various security services don't help you; formatting a disk or destroying a device doesn't help, because your data is already on a remote server. PS: I promise that I will not bother you after payment, because you are not my only customer.This is a honour criterion for hackers. From now on, I recommend that you use good anti-virus software and update it regularly (a few times a day)! Don't be angry with me, everyone has their own work.Goodbye. Received: from BYAPR06MB5720.namprd06.prod.outlook.com (2603:10b6:5:100::49)by MN2PR06MB5727.namprd06.prod.outlook.com with HTTPS viaDM6PR03CA0072.NAMPRD03.PROD.OUTLOOK.COM; Mon, 24 Dec 2018 12:07:08 +0000Received: from CY4PR0601CA0037.namprd06.prod.outlook.com(2603:10b6:910:89::14) by BYAPR06MB5720.namprd06.prod.outlook.com(2603:10b6:a03:14d::33) with Microsoft SMTP Server (version=TLS1_2,cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1446.18; Mon, 24 Dec2018 12:07:05 +0000Received: from BY2NAM05FT006.eop-nam05.prod.protection.outlook.com(2a01:111:f400:7e52::202) by CY4PR0601CA0037.outlook.office365.com(2603:10b6:910:89::14) with Microsoft SMTP Server (version=TLS1_2,cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1446.17 via FrontendTransport; Mon, 24 Dec 2018 12:07:04 +0000Authentication-Results: spf=neutral (sender IP is 139.135.10.136)smtp.mailfrom=edgewood.edu; edgewood.mail.onmicrosoft.com; dkim=none (messagenot signed) header.d=none;edgewood.mail.onmicrosoft.com; dmarc=noneaction=none header.from=edgewood.edu;Received-SPF: Neutral (protection.outlook.com: 139.135.10.136 is neitherpermitted nor denied by domain of edgewood.edu)Received: from mail.edgewood.edu (139.135.10.136) byBY2NAM05FT006.mail.protection.outlook.com (10.152.100.143) with MicrosoftSMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id15.20.1471.7 via Frontend Transport; Mon, 24 Dec 2018 12:07:04 +0000Received: from EML233.edgewood.edu (139.135.10.136) by EML233.edgewood.edu(139.135.10.136) with Microsoft SMTP Server (version=TLS1_2,cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Mon, 24 Dec2018 06:06:46 -0600Received: from EML213.edgewood.edu (139.135.10.26) by EML233.edgewood.edu(139.135.10.136) with Microsoft SMTP Server (version=TLS1_0,cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1415.2 via FrontendTransport; Mon, 24 Dec 2018 06:06:46 -0600Received: from EML220.edgewood.edu (139.135.3.53) by EML213.edgewood.edu(139.135.10.26) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 24 Dec2018 06:06:46 -0600Received: from bl17-105-108.dsl.telepac.pt (188.82.105.108) byEML220.edgewood.edu (139.135.3.53) with Microsoft SMTP Server id 14.3.408.0;Mon, 24 Dec 2018 06:06:40 -0600From: <[[email protected]](mailto:[email protected])>To: 1apple23 <[[email protected]](mailto:[email protected])>Subject: *=?utf-8?B?Kj8=?=SPA=?utf-8?B?TT8=?=** [[email protected]](mailto:[email protected]) =?utf-8?B?6KKr6buR5LqG77yBIOeri+WNs+abtOaUueWvhuegge+8gQ==?=Date: Mon, 24 Dec 2018 10:54:40 -0100Message-ID: <[[email protected]](mailto:[email protected])>MIME-Version: 1.0Content-Type: multipart/alternative;
boundary="----=\_NextPart\_000\_0048\_01D49B81.0669AF3D" 
X-Mailer: Microsoft Office Outlook 11Thread-Index: Acef9qdl0l84i685ef9qdl0l84i68s==X-MimeOLE: Produced By Microsoft MimeOLE V6.1.7601.17514Return-Path: [[email protected]](mailto:[email protected])X-NAI-Spam-Flag: YESX-NAI-Spam-Level: ********X-NAI-Spam-Threshold: 3.8X-NAI-Spam-Score: 8.7X-NAI-Spam-Report: 9 Rules triggered
\* 5 -- TS\_MSG\_REP\_50 \* 1.5 -- CONT\_TPE\_INV\_OE\_W\_NAI\_BAD\_T \* 1 -- BOUNCE\_SUBJ\_UTF8\_W\_NAI\_BAD\_T \* 1 -- NAI\_BAD\_T \* 0.1 -- BOUNCE\_SUBJ\_UTF8 \* 0.1 -- CONT\_TPE\_INV\_OE \* 0 -- EDT\_SDHA\_ADR\_FRG \* 0 -- EDT\_SDHA\_DMN\_FRG \* 0 -- RV6445 
X-NAI-Spam-Version: 2.2.0.9309 : core <6445> : inlines <6989> : streams<1808052> : uri <2769281>X-OrganizationHeadersPreserved: EML213.edgewood.eduX-MS-Exchange-Organization-ExpirationStartTime: 24 Dec 2018 12:07:04.8980(UTC)X-MS-Exchange-Organization-ExpirationStartTimeReason: OriginalSubmitX-MS-Exchange-Organization-ExpirationInterval: 2:00:00:00.0000000X-MS-Exchange-Organization-ExpirationIntervalReason: OriginalSubmitX-MS-Exchange-Organization-Network-Message-Id:e7068013-580b-409c-6b04-08d6699851deX-EOPAttributedMessage: 0X-MS-Exchange-Organization-MessageDirectionality: OriginatingX-MS-Exchange-Organization-Antispam-Report: DV:3.3.16631.866;OrigIP:188.82.105.108X-MS-Exchange-Organization-SCL: -1X-CrossPremisesHeadersPromoted:BY2NAM05FT006.eop-nam05.prod.protection.outlook.comX-CrossPremisesHeadersFiltered:BY2NAM05FT006.eop-nam05.prod.protection.outlook.comX-Forefront-Antispam-Report:CIP:139.135.10.136;IPV:CAL;SCL:-1;CTRY:US;EFV:NLI;SFV:SKN;SFS:;DIR:INB;SFP:;SCL:-1;SRVR:BYAPR06MB5720;H:mail.edgewood.edu;FPR:;SPF:None;LANG:zh-cn;X-Microsoft-Exchange-Diagnostics:1;BY2NAM05FT006;1:1OMzemCK7d7n60+7IxIz13WYHW3rQsZ4cxyaX2qZkDJ60yBrg85zS0uevWG5p0gOyFniFOa+wQ2hNFJFw2mLUACF3pD+CoyXonyZ36CFrlBVaiHALDyZ8nDG9f7wb49ZX-MS-Exchange-Organization-AuthSource: EML220.edgewood.eduX-MS-Exchange-Organization-AuthAs: AnonymousX-OriginatorOrg: edgewood.eduX-MS-PublicTrafficType: EmailX-MS-Office365-Filtering-Correlation-Id: e7068013-580b-409c-6b04-08d6699851deX-Microsoft-Antispam:BCL:0;PCL:0;RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7153060);SRVR:BYAPR06MB5720;X-Microsoft-Exchange-Diagnostics:1;BYAPR06MB5720;3:bF46Kk8eLcEu+mihYDtM91jlAPR4w3ovMaPNLATiuIQ7cG+dV9qk9D1WsxW9FBcuj0dxFIDnjOBy8oRqqI5yW1cwXk5t6eIzhkycMPnTcf/q9cLkQyzECtcA8QpEExFh0cHZYx6na0UDQbYoNiyYzMl/CEA59nXXIAM3MJyfGJc0Xz9r+FuRtUtfhh39eygrdBxmnh3s5evp0sRaD8h1DlV5p8sTh6UhnpRBHCkdCBp6jtKuEl0v/U238XnU/kJwgqDBclmgWFZFQhPAf0XgheGrA4ln5lhV+wq3rhavD29w4bSzSZ9vU7+nFE2tDl9e8y/zZCg7UKcKlh6m4r32uSDIGoIseyKeucAQRazBAtI=;25:OtilhI8a5hyYO19/7FHDtJhUXEIfZayb4M5ILWOIzQNJpvEYREEpXPniB6AhRENAs0G41npoLb76NxhspddQOKBZel7PG2dLSP4biIQG1sMo7UzC0TiRlV5rZ+CU5qw9Xbke2f4Vw20hnLBomY+5FoZ7rPFcPy4JIN+iGodM6m+4ACzf57Hh9gDxNmQ5Ttdw/hZ2qS+C7MfM1Rl7WOuB4fGQJE3rZKif2xksnKsKKEzf3oIgzyJrTx0sIkeqZUBvoUpKfbBqdBmKar8VZEfNZdsXRgMci/eTUHk+cwio2nWJVFwy3fmuE6rUlE5ySDkwRrIVCylgmIbYgJ1dPa4G4w==X-MS-TrafficTypeDiagnostic: BYAPR06MB5720:X-MS-Exchange-AtpMessageProperties: sap=1;slp=1;X-Microsoft-Exchange-Diagnostics:1;BYAPR06MB5720;31:epDk4Nc7dgzaoOig6D9Iszts30+IgNgqBTFXHzXcYqxjRmg/Ts0Lu8rV9SzeaJuuBgiLQ4TBGq0Fu6cmLU/fJvvXSSAkNHuHcVhDAv0wBPafSIlOLXbYKoZ6XZtNscCvsIEDbdZu+3ie8Mp696rx7Hg/kXZO/QW4WAeqONM9ml/xa/NVBWfTgJ3hLaqQSAWzZSiHR+/suejJkBYtcQWbHqI93mge0xfc1eQOMOv2lNE=;20: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-Exchange-Antispam-Report-CFA-Test:=?us-ascii?Q?BCL:0;PCL:0;RULEID:(8211001083)(3230021)(901025)(902075)(908?==?us-ascii?Q?002)(913088)(999002)(7045084)(20180801075)(1310107)(20180212?==?us-ascii?Q?00217)(2018011200283)(2401047)(8121501046)(2018021201217)(20?==?us-ascii?Q?18011210174)(2018011211064)(2018011212028)(2018011213028)(20?==?us-ascii?Q?18011214028)(2018011215028)(2018011216028)(2018011217028)(20?==?us-ascii?Q?18011218028)(2018011219092)(2018011220252)(2018011221063)(20?==?us-ascii?Q?18011222027)(2018011223027)(2018011224027)(2018011225035)(20?==?us-ascii?Q?18011229035)(2018011232269)(2018011233052)(2018021202149)(98?==?us-ascii?Q?810176)(2018021203149)(98815176)(823300264)(823335107)(82345?==?us-ascii?Q?0130)(823476124)(823411253)(10201501046)(3231475)(944501520)?==?us-ascii?Q?(9300010083)(9301004419)(52103095)(52102170)(111716171)(5210?==?us-ascii?Q?5112)(52106170)(52411095)(1250107)(98823107)(88801588)(52408?==?us-ascii?Q?095)(98821027)(98822027)(52401380)(52601095)(52505095)(52406?==?us-ascii?Q?095)(52305095)(52203115)(88860335)(52409095)(88380075)(93006?==?us-ascii?Q?095)(93003095)(3002001)(201708071742011)(7699051)(76991095)(?==?us-ascii?Q?62203095)(7701012);SRVR:BYAPR06MB5720;BCL:0;PCL:0;RULEID:;SR?==?us-ascii?Q?VR:BYAPR06MB5720;?=X-Microsoft-Exchange-Diagnostics:1;BYAPR06MB5720;4:Xc86gYT9xmodPkcQf3ZaUHcyLIU761z+QkTaWH6DRkGBwYFSEY4oPNbmioszWY0kJmV8aF0Zn7MhO2rltY1SBHJnv/ItS2Z1yVsYavHjCJ43E1RpKNgij69yR5EU3oNlc0M7bt1J11W+DoIeE7MHbeFJTwtKzVLF6Z1gbgbCk3Zo4WmgmGtSpL8FY78gBBYxSUHPQiSL1mGF0WZKjc9OxSRcu26jopp6yf3ghUblWA9bcs1GG9vXsxSOBFVBvq4m0mmYfhc/rCKhO59XGKZp5A==;23:tm6IBbEPPqWpYs18NXhgynXdgSKuOaLtliPtwqSTfrtTgGgLDeT8cjSTejrKtm6KR2uMkJUrtzwOSvb8Hg2gdbhepJkXepScW0+mDmYPTqo+X6nvyTCQbcvP8bZPsIHMnie0BJ4DNifTCr4Y/MqD6A==X-Microsoft-Exchange-Diagnostics:1;BYAPR06MB5720;6:3QkVx5WxxDHosOy5j2TksPkunhYhpLXuj6Jb9omyg57VsEBDQoYxFJ5nFDlA4PXHYXIYTEj92RcQHdWGEtvz3q1FSOwQnVTensSAt4CqgEzFBSrtTrGJqHgkvX5psEGmQscWbpVAo6vydRStV8MkcEgrTF7u6OEHMeUU71POtAGNaNNw3qxtG7YJg+Sq3sMK8q3/NGL/jXhXN74PlzaMfEmLh7I7oQp8p/u/0gKLtinrFI9qeRNq9TcvaSbUEPF+gmENYVToKB+gW4Au79LzJ21gIQB3K++3rWbtt6ac/u8YQUoUHyDuAi9tOqbkDGGNoEnHsiO/Ds41OaKu2guqq6+tlgCAbLI/3VaumhTiWx9g5v5/vfTXpAC1i0uxtmM0iRH9sG2miCmxD04Jk5S/6duUE/AzvO8ejtue+RxtxvROM11423OajhvWl2ZTUqrwZB7HpVHKXbqmOQVNBcAlOHdy0PuVG/C0bzEIQhx8DjvPrVvjkZiz+1+rQP3PUDr2;5:MPUo3uvrVjPiW5EItQi6bi2oig4Kr6NunJfC6wTq5JqjX9TJUm+i+T/Gt9563aKZzRPqXwlbrASlrfE8B46OhB7eoetz6KO4IlG3oMWv2eEt5mBrQhnJTvhzyBtMCD7TEn7Mdq0R6Vz/fu2Gj4jAH5SjrYqatDH02lDIU2btZip4HC9DN84ZWX9nUJZL6Jf0;7:gJG1NdvsZUKNlbw54u2YW9C3XOtnTVHXR2C9vFrNkQNBEWknUz1ONGUKUooLgYb78rUxoSN0ETRinNDWkfpcAdTt40snodFQbHXjDt2mi58/VD7+F21IHkRLfRLoPECx7hkC3gI4f6MfJlpmafOP1A==X-MS-Exchange-ATPSafeLinks-Stat: 0SpamDiagnosticOutput: 1:99SpamDiagnosticMetadata: SKNX-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Dec 2018 12:07:04.6792(UTC)X-MS-Exchange-CrossTenant-Network-Message-Id: e7068013-580b-409c-6b04-08d6699851deX-MS-Exchange-CrossTenant-Id: 482866d2-7864-4e09-966c-d7ba598f6184X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=482866d2-7864-4e09-966c-d7ba598f6184;Ip=[139.135.10.136];Helo=[mail.edgewood.edu]X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPremX-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR06MB5720X-MS-Exchange-Transport-EndToEndLatency: 00:00:03.4462156X-MS-Exchange-Processed-By-BccFoldering: 15.20.1446.022X-Microsoft-Exchange-Diagnostics:
1;MN2PR06MB5727;9:DHnx8f/OzRWhyd6jvaRjs0t4Z5bFyrahHur3cizSrQDil66+ZRaBoZ7mMK+lIshwtkzQQ9NY107pDBMT1FC+ZjgNNOqDNPw0GwezpO6OXQ9OdWQoUtlGhuXj6LrUcMV4 
X-Microsoft-Antispam-Mailbox-Delivery:
ucf:0;jmr:0;ex:0;auth:0;dest:I;ENG:(750119)(520011016)(944506303)(944626516); 
X-Microsoft-Antispam-Message-Info:
=?us-ascii?Q?NmBz0wEGA91+Ek6NZ62OAH/aS+xa54nLuhR6OaHLrtGsgkd7uQhDzVhKLq4L?= 
=?us-ascii?Q?SCh9nwUs1y9YVO1a4J/u579stmLM0QBNf3st6xnq1+7BXRVeYZvsRI6On9f5?==?us-ascii?Q?PtnKIEKiYb49r5iFO5J9BscCn0hmvdyNRsHfD0RNipfFyGolo13hQ2/2GMoi?==?us-ascii?Q?DchI7+GarSli496pk9tFZpNjNgumEiARPE+Y9CcAoBqxqq7FNHdnqP9DLhy/?==?us-ascii?Q?4zj/BikRv80sI5IeeBZ3eaUISnCLZuVgDKJIVIAJYnrDActNQmumPENllI?==?us-ascii?Q?k+RpKzelOteTAGTs9VMoPzwMWWyfrEtzUliGFm9Ot1Xm7YrsSvUbC9Gr60+y?==?us-ascii?Q?eBaffT0vm17lgJE7I171bf0IqcNcH7FEv/QZ5gX4KM1SnsNuyvAPLUfpmSef?==?us-ascii?Q?6YDQpXpgoxlbqi1GqWBplHnyDdLARwXPVf9uuU547bYJeKZCsRMrsfIU+syq?==?us-ascii?Q?YkVmvOnjmf4a0BfIdXBCQBP4tBhfpuLhc7uPX8werJmTPMxYiP6mWpNJ3K8Z?==?us-ascii?Q?BYp3IX7m5kjEby4U3iPSyiNR4+ZJnJoxw9BWznAoWOIK8QQFiVt6XgrYrM0z?==?us-ascii?Q?ai61ppR4x/XJtN8+r03QU2RSOf2k/MvmPKe2n6RCT+Wno6o3Ez5eoxBm46Hj?==?us-ascii?Q?N85o1m64Izbq8TCmeYkYZyNRiyT4Ym89ZNI2FhYw+1KwSugIObTw2IkxY5Qr?==?us-ascii?Q?FZfjPnPcXaI5gozjP7FjJU+Xfsb8UnkzGjGHqvqgJm3u4c2sjXEMbgDEkL4A?==?us-ascii?Q?S8YALuc1296mU8seV/kniZufzuglAn6un8IsLMzQH5Bn3dM+QM3DUGbxVgvB?==?us-ascii?Q?gVOOSnHOUrqvK2Ji24a8UJKYOuXCv7Q2iHbrzWouPn87bSRJOpk7VkQw8e+q?==?us-ascii?Q?k7wTCFkwHOcIdZkJx2igaO6f4FZLZOVyCBlxCdlQGM03SUrlaByqAEvsE0k6?==?us-ascii?Q?KSnJmswJ6ygOZmbkB3Dn2xopgHBgMCuslkHOaUJbx/KjgJ4rvPTY0t2Y/Wmr?==?us-ascii?Q?ASLJqJ309SAM3Ndbi+f0rfDXPw=3D=3D?=X-Microsoft-Exchange-Diagnostics:
1;MN2PR06MB5727;27:Svw/r3gwDNHifhXmM8SFuqUcI2IS9BlBIruuhe6txQqL3hEbAe1B9MH9/aZ0/5W+x61sasxH8EGDEeFBw9tgsehKXShVdxI1IwMUCvw0fiYSW1vqKM6Uk7TIPdK9TN7K5De+EnxcDJKBVpwLX7/uC3WajNYNEWzrR3iCL5nd4tAB0rRAVa862ia6mJNo4F3lf4YeB6VmI91VmKBFk6YlmCzHvExVjzRGgYUT9BqATweFgf6BxBuvlhfQSPCUY0N3lORaWIuRC2EtxKAjWYOsau6/wy5LlMS9SR+XcZ8Q+DZw4cURQFHwGkInYvCkKzK73sW2gypuXwrqNhVUa8ed2X3q46qlc1r17l5kcpmAiyKLvOWrIXqD+L57BjebP2 1;MN2PR06MB5727;27:Svw/r3gwDNHifhXmM8SFuqUcI2IS9BlBIruuhe6txQqL3hEbAe1B9MH9/aZ0/5W+x61sasxH8EGDEeFBw9tgsehKXShVdxI1IwMUCvw0fiYSW1vqKM6Uk7TIPdK9TN7K5De+EnxcDJKBVpwLX7/uC3WajNYNEWzrR3iCL5nd4tAB0rRAVa862ia6mJNo4F3lf4YeB6VmI91VmKBFk6YlmCzHvExVjzRGgYUT9BqATweFgf6BxBuvlhfQSPCUY0N3lORaWIuRC2EtxKAjWYOsau6/wy5LlMS9SR+XcZ8Q+DZw4cURQFHwGkInYvCkKzK73sW2gypuXwrqNhVUa8ed2X3q46qlc1r17l5kcpmAiyKLvOWrIXqD+L57BjebP2 
submitted by EmilyannB77 to Bitcoin [link] [comments]

email I received

Date: May 20, 2019 at 8:12 PM Subject: Think how to solve it
Hello, dear!
This is important information for you!
Some months ago I hacked your device and got full access to your acc
On day of hack your acc has password: dragon99
So, you can change the pass, yes.. Or already changed... But my malicious code intercepts it every time.
How I made it: In the software of the router, through which you went online, was a vulnerability. I used it... If you interested you can read about it: CVE-2019-1664 - a vulnerability in the web-based management interface of the Cisco routers. I just hacked this router and placed my soft on it. When you went online, my malicious code was installed on the OS of your computer.
After that, I made a full backup of your pc (I have all your address book, history of viewing sites, all files, phone numbers and addresses of all your contacts).
A month ago, I wanted to lock your device and ask for a not big amount of btc to unlock. But I looked at the sites that you regularly visit, and I was shocked by what I saw!!! I'm talk you about sites for adults.
I want to say - you are a BIG pervert. Your fantasy is shifted far away from the normal course!
And I got an idea.... I made a screenshot of the adult web-page where you have fun (do you understand what it is about, huh?))). After that, I made a screenshot of your joys (using the camera of your PC) and glued them together. Turned out amazing! You are so spectacular!
I'm know that you would not like to show these screenshots to your friends, relatives or colleagues. I think $621 is a very, very small amount for my silence. Besides, I have been spying on you for so long, having spent a lot of time!
Pay ONLY in bitcoins! My BTC wallet: 1NfX7Z8oTLo3CpcHYZETv4b88VGuXm7DgW
You do not know how to use bitcoins? Enter a query in any search engine: "how to replenish btc wallet". It's extremely easy
For this payment I give you two days (48 hours). As soon as this mail is opened, the timer will work.
After payment, my malware and dirty screenshots with your enjoys will be self-destruct automatically. If I do not receive from you the specified amount, then your device will be locked, and all your contacts will receive a screenshots with your "enjoys".
I hope you understand your situation.
Do not try to find and destroy my soft! (All your data, files and screenshots is
already uploaded to a remote server)
Do not try to contact me (you yourself will see that this is impossible, the
sender address is automatically generated)
Various security services will not help you; formatting a disk or destroying a
device will not help, since your data is already on a remote server.
P.S. You are not my single victim. so, I guarantee you that I will not disturb you again after payment! This is the word of honor hacker Do not hold evil! I just good do my job. Good luck.
submitted by craisin_bran to copypasta [link] [comments]

Malware: Do not download cryptocointrader from sourceforge. Those who have ran the program on your PC, please format ASAP

There was a post few mins ago which provides a link to download a open source trading program call cryptocoin trader.
Original link here
One user claimed that the source code is safe but i decided to run the precompiled exe on my VM to be sure.
The program extracts qtbitcoin trader client and some suspicious executables (bridgemigplugin.exe, vbc.exe).
brigemiplugin.exe description on task manager is open broadcaster software.
After some googling, it is obvious that the program is doing a live/recording video stream through a open source program from open broadcaster software http://obsproject.com/
Here are the screenshots
Even though the post has been deleted, there are 46 people indicated on sourceforge who have downloaded the program, please reformat your pc to prevent any potential wallet hacks.
Always be mindful of open source programs. Even though the source code looks clean, the precompiled executables can be malicious.
Update: I've ran wireshark to sniff the network traffic produce by the malware, the malware connection is initiated from 185.17.1.222, Russian. ISP, Longbow Electric Llc. screenshot here
Update 2 I've done a search of the IP address. I believe it doesn't belongs to any tor node, proxy or VPN. Hence it is very likely that 185.17.1.222 is either a dynamic or static IP from Longbow Electric Llc.
Update 3 I'm a undergraduate at NUS majoring in computer science security. I hope that this post will act as a warning for all potential future hackers who attempts to perform similar attacks (The community is watching you). Thanks everyone for the tips as well, it sure helps a little with my high tuition debt. :) This is so much I can do for now, as I'm having papers from tomorrow onwards. Stay safe fellow bitcoiners!
submitted by strongleaf to Bitcoin [link] [comments]

Coincidence or have I actually been ransomed

I received one of those ransom emails last night at 11pm, at nearly two am my computer whent black and turning it on resulted in a normal unexpected shutdown>restart normally, safemode etc sequence, but then again, went black. Powering up again only resulted in the pc lights turning on, before again, everything shut off.
Here is the email, I’m sure it’s bs because I don’t even have a webcam, unless they somehow hacked my iPhone?
“Hello!
I'm a hacker who cracked your email and device a few months ago. You entered your password on one of the sites you visited. I intercepted it.
Of course, you can change it or change it already. But that's not a problem, my malware has updated it every time.
Please don't contact me or try to find me. That is impossible. I sent you an email from your account, so
Through your email, I uploaded malicious code into your operation system. I saved all of your contacts with friends, colleagues, relatives, and saved a complete history of your visits to Internet resources. I also installed a Trojan horse on your device.
You are not my only victim, I usually block the device and seek ransom. However, I was shocked at the site of intimate content that I frequently visit.
I am shocked by your fantasy! I have never seen something like this!
So, when you enjoy on the site (you know what I mean!) Created a screenshot using your camera program. Then I combined them with the content of the site currently being viewed.
It may be great to send these photos to your contacts. But I'm sure you don't want it.
Therefore, I expect payment from you for silence. I think $ 625 is a good price!
Pay via Bitcoin. My BTC wallet: 1K6bUuopj2v9azMSGTDmH3TXQ9tAnK9E3P
If you do not know how to do this-enter "How to transfer to BTC wallet" to Google. Not difficult. Once the specified amount is received, all compromised materials are destroyed automatically. My virus is also removed from your own operating system.
My Trojan has an automatic alert. I will receive a message after reading this email.
I give you two days for payment (exactly 48 hours). If this does not happen-all your contacts will get crazy shots from your dark secret life! Your device is blocked (also after 48 hours) so that you do not disturb
Don't be stupid! Police and friends do not help you ...
ps. I can give you future advice. Do not enter a password on an unsafe site.
I wish you the prudence. Farewell.”
submitted by superneutral to techsupport [link] [comments]

IRC Log from Ravencoin Open Developer Meeting - Aug 24, 2018

[14:05] <@wolfsokta> Hello Everybody, sorry we're a bit late getting started
[14:05] == block_338778 [[email protected]/web/freenode/ip.72.214.222.226] has joined #ravencoin-dev
[14:06] <@wolfsokta> Here are the topics we would like to cover today • 2.0.4 Need to upgrade - What we have done to communicate to the community • Unique Assets • iOS Wallet • General Q&A
[14:06] == Chatturga changed the topic of #ravencoin-dev to: 2.0.4 Need to upgrade - What we have done to communicate to the community • Unique Assets • iOS Wallet • General Q&A
[14:06] <@wolfsokta> Daben, could you mention what we have done to communicate the need for the 2.0.4 upgrade?
[14:07] == hwhwhsushwban [[email protected]/web/freenode/ip.172.58.37.35] has joined #ravencoin-dev
[14:07] <@wolfsokta> Others here are free to chime in where they saw the message first.
[14:07] == hwhwhsushwban [[email protected]/web/freenode/ip.172.58.37.35] has quit [Client Quit]
[14:08] Whats up bois
[14:08] hi everyone
[14:08] hi hi
[14:08] <@wolfsokta> Discussing the 2.0.4 update and the need to upgrade.
[14:08] <@Chatturga> Sure. As most of you are aware, the community has been expressing concerns with the difficulty oscillations, and were asking that something be done to the difficulty retargeting. Many people submitted suggestions, and the devs decided to implement DGW.
[14:09] <@Tron> I wrote up a short description of why we're moving to a new difficulty adjustment. https://medium.com/@tronblack/ravencoin-dark-gravity-wave-1da0a71657f7
[14:09] <@Chatturga> I have made posts on discord, telegram, bitcointalk, reddit, and ravencointalk.org from testnet stages through current.
[14:10] <@Chatturga> If there are any other channels that can reach a large number of community members, I would love to have more.
[14:10] <@wolfsokta> Thanks Tron, that hasn't been shared to the community at large yet, but folks feel free to share it.
[14:10] When was this decision made and by whom and how?
[14:10] <@Chatturga> I have also communicated with the pool operators and exchanges about the update. Of all of the current pools, only 2 have not yet updated versions.
[14:11] <@wolfsokta> The decision was made by the developers through ongoing requests for weeks made by the community.
[14:12] <@wolfsokta> Evidence was provided by the community of the damages that could be caused to projects when the wild swings continue.
[14:12] So was there a meeting or vote? How can people get invited
[14:12] <@Tron> It was also informed by my conversations with some miners that recommended that we make the change before the coin died. They witnessed similar oscillations from which other coins never recovered.
[14:13] only two pools left to upgrade is good, what about the exchanges? Any word on how many of those have/have not upgraded?
[14:13] <@wolfsokta> We talked about here in our last meeting Bruce_. All attendees were asked if they had any questions or concerns.
[14:13] == blondfrogs [[email protected]/web/freenode/ip.185.245.87.219] has joined #ravencoin-dev
[14:13] == roshii [[email protected]/web/freenode/ip.41.251.25.100] has joined #ravencoin-dev
[14:13] sup roshii long time no see
[14:14] <@Chatturga> Bittrex, Cryptopia, and IDCM have all either updated or have announced their intent to update.
[14:14] == wjcgiwgu283ik3cj [[email protected]/web/freenode/ip.172.58.37.35] has joined #ravencoin-dev
[14:15] sup russki
[14:15] what's the status here?
[14:15] I don’t think that was at all clear from the last dev meeting
[14:15] I can’t be the only person who didn’t understand it
[14:15] <@wolfsokta> Are there any suggestions on how to communicate the need to upgrade even further? I am concerned that others might also not understand.
[14:17] I’m not sold on the benefit and don’t understand the need for a hard fork — I think it’s a bad precedent to simply go rally exchanges to support a hard fork with little to no discussion
[14:17] so just to note, the exchanges not listed as being upgraded or have announced their intention to upgrade include: qbtc, upbit, and cryptobridge (all with over $40k usd volume past 24 hours according to coinmarketcap)
[14:18] <@wolfsokta> I don't agree that there was little or no discussion at all.
[14:19] <@wolfsokta> Looking back at our meeting notes from two weeks ago "fork" was specifically asked about by BrianMCT.
[14:19] If individual devs have the power to simple decide to do something as drastic as a hard fork and can get exchanges and miners to do it that’s got a lot of issues with centralization
[14:19] <@wolfsokta> It had been implemented on testnet by then and discussed in the community for several weeks before that.
[14:19] == under [[email protected]/web/freenode/ip.72.200.168.56] has joined #ravencoin-dev
[14:19] howdy
[14:19] Everything I’ve seen has been related to the asset layer
[14:19] I have to agree with Bruce_, though I wasn't able to join the last meeting here. That said I support the fork
[14:20] Which devs made this decision to do a fork and how was it communicated?
[14:20] well mostly the community made the decision
[14:20] Consensus on a change is the heart of bitcoin development and I believe the devs have done a great job building that consensus
[14:20] a lot of miners were in uproar about the situation
[14:20] <@wolfsokta> All of the devs were supporting the changes. It wasn't done in isolation at all.
[14:21] This topic has been a huge discussion point within the RVN mining community for quite some time
[14:21] the community and miners have been having issues with the way diff is adjusted for quite some time now
[14:21] Sure I’m well aware of that -
[14:21] Not sold on the benefits of having difficulty crippled by rented hashpower?
[14:21] The community saw a problem. The devs got together and talked about a solution and implemented a solution
[14:21] I’m active in the community
[14:22] So well aware of the discussions on DGW etc
[14:22] Hard fork as a solution to a problem community had with rented hashpower (nicehash!!) sounds like the perfect decentralized scenario!
[14:23] hard forks are very dangerous
[14:23] mining parties in difficulty drops are too
[14:23] <@wolfsokta> Agreed, we want to keep them to an absolute minimum.
[14:23] But miners motivation it’s the main vote
[14:24] What would it take to convince you that constantly going from 4 Th/s to 500 Gh/s every week is worse for the long term health of the coin than the risk of a hard fork to fix it?
[14:24] == Tron [[email protected]/web/freenode/ip.173.241.144.77] has quit [Ping timeout: 252 seconds]
[14:24] This hardfork does include the asset layer right? if so why is it being delayed in implementation?
[14:24] <@wolfsokta> Come back Tron!
[14:24] coudl it have been implement through bip9 voting?
[14:24] also hard fork is activated by the community! that's a vote thing!
[14:24] @mrsushi to give people time to upgrade their wallet
[14:25] @under, it would be much hard to keep consensus with a bip9 change
[14:25] <@wolfsokta> We investigated that closely Under.
[14:25] == Tron [[email protected]/web/freenode/ip.173.241.144.77] has joined #ravencoin-dev
[14:25] <@wolfsokta> See Tron's post for more details about that.
[14:25] <@spyder_> Hi Tron
[14:25] <@wolfsokta> https://medium.com/@tronblack/ravencoin-dark-gravity-wave-1da0a71657f7
[14:25] Sorry about that. Computer went to sleep.
[14:26] I'm wrong
[14:26] 2 cents. the release deadline of october 31st puts a bit of strain on getting code shipped. (duh). but fixing daa was important to the current health of the coin, and was widely suppported by current mining majority commuity. could it have been implemented in a different manner? yes . if we didnt have deadlines
[14:27] == wjcgiwgu283ik3cj [[email protected]/web/freenode/ip.172.58.37.35] has quit [Quit: Page closed]
[14:27] sushi this fork does not include assets. it's not being delayed though, we're making great progress for an Oct 31 target
[14:28] I don’t see the urgency but my vote doesn’t matter since my hash power is still CPUs
[14:28] <@wolfsokta> We're seeing the community get behind the change as well based on the amount of people jumping back in to mine through this last high difficulty phase.
[14:28] So that will be another hardfork?
[14:28] the fork does include the asset code though set to activate on oct 30th
[14:28] yes
[14:29] <@wolfsokta> Yes, it will based on the upgrade voting through the BIP9 process.
[14:29] I wanted to ask about burn rates from this group: and make a proposal.
[14:29] we're also trying hard to make it the last for awhile
[14:29] Can you clear up the above — there will be this one and another hard fork?
[14:29] <@wolfsokta> Okay, we could discuss that under towards the end of the meeting.
[14:30] If this one has the asset layer is there something different set for October
[14:30] <@wolfsokta> Yes, there will be another hard fork on October 31st once the voting process is successful.
[14:31] <@wolfsokta> The code is in 2.0.4 now and assets are active on testnet
[14:31] Bruce, the assets layer is still being worked on. Assets is active on mainnet. So in Oct 31 voting will start. and if it passes, the chain will fork.
[14:31] this one does NOT include assets for mainnet Bruce -- assets are targeted for Oct 31
[14:31] not***
[14:31] not active****
[14:31] correct me if I'm wrong here, but if everyone upgrades to 2.0.4 for this fork this week, the vote will automatically pass on oct 31st correct? nothing else needs to be done
[14:31] Will if need another download or does this software download cover both forks?
[14:31] <@wolfsokta> Correct Urgo
[14:32] thats how the testnet got activated and this one shows "asset activation status: waiting until 10/30/2018 20:00 (ET)"
[14:32] Will require another upgrade before Oct 31
[14:32] thank you for the clarification wolfsokta
[14:32] <@wolfsokta> It covers both forks, but we might have additional bug fixes in later releases.
[14:32] So users DL one version now and another one around October 30 which activates after that basically?
[14:33] I understand that, but I just wanted to make it clear that if people upgrade to this version for this fork and then don't do anything, they are also voting for the fork on oct 31st
[14:33] Oh okay — one DL?
[14:33] Bruce, Yes.
[14:33] Ty
[14:33] well there is the issue that there maybe some further consensus bugs dealing with the pruneability of asset transactions that needs to be corrected between 2.0.4 and mainnet. so i would imagine that there will be further revisions required to upgrade before now and october 31
[14:33] @under that is correct.
[14:34] I would highly recommend bumping the semver up to 3.0.0 for the final pre 31st release so that the public know to definitely upgrade
[14:34] @under +1
[14:35] out of curiosity, have there been many bugs found with the assets from the version released in july for testnet (2.0.3) until this version? or is it solely a change to DGW?
[14:35] <@wolfsokta> That's not a bad idea under.
[14:35] <@spyder_> @under good idea
[14:35] @urgo. Bugs are being found and fixed daily.
[14:35] Any time the protocol needs to change, there would need to be a hard fork (aka upgrade). It is our hope that we can activate feature forks through the BIP process (as we are doing for assets). Mining pools and exchanges will need to be on the newest software at the point of asset activation - should the mining hash power vote for assets.
[14:35] blondfrogs: gotcha
[14:35] There have been bugs found (and fixed). Testing continues. We appreciate all the bug reports you can give us.
[14:36] <@wolfsokta> Yes! Thank you all for your help in the community.
[14:37] (pull requests with fixes and test coverage would be even better!)
[14:37] asset creation collision is another major issue. current unfair advantage or nodes that fore connect to mining pools will have network topologies that guarantee acceptance. I had discussed the possibility of fee based asset creation selection and i feel that would be a more equal playing ground for all users
[14:38] *of nodes that force
[14:38] <@wolfsokta> What cfox said, we will always welcome development help.
[14:38] So just to make sure everyone know. When assets is ready to go live on oct 31st. Everyone that wants to be on the assets chain without any problems will have to download the new binary.
[14:39] <@wolfsokta> The latest binary.
[14:39] under: already in the works
[14:39] excellent to hear
[14:39] == UserJonPizza [[email protected]/web/freenode/ip.24.218.60.237] has joined #ravencoin-dev
[14:39] <@wolfsokta> Okay, we've spent a bunch of time on that topic and I think it was needed. Does anybody have any other suggestions on how to get the word out even more?
[14:40] maybe preface all 2.0.X releases as pre-releases... minimize the number of releases between now and 3.0 etc
[14:41] <@wolfsokta> Bruce_ let's discuss further offline.
[14:41] wolfsokta: which are the remaining two pools that need to be upgraded? I've identified qbtc, upbit, and cryptobridge as high volume exchanges that haven't said they were going to do it yet
[14:41] so people can help reach out to them
[14:41] f2pool is notoriously hard to contact
[14:41] are they on board?
[14:42] <@wolfsokta> We could use help reaching out to QBTC and Graviex
[14:42] I can try to contact CB if you want?
[14:42] <@Chatturga> The remaining pools are Ravenminer and PickAxePro.
[14:42] <@Chatturga> I have spoken with their operators, the update just hasnt been applied yet.
[14:42] ravenminer is one of the largest ones too. If they don't upgrade that will be a problem
[14:42] okay good news
[14:42] (PickAxePro sounds like a Ruby book)
[14:43] I strongly feel like getting the word out on ravencoin.org would be beneficial
[14:44] that site is sorely in need of active contribution
[14:44] Anyone can volunteer to contribute
[14:44] <@wolfsokta> Okay, cfox can you talk about the status of unique assets?
[14:44] sure
[14:45] <@wolfsokta> I'll add website to the end of our topics.
[14:45] code is in review and will be on the development branch shortly
[14:45] would it make sense to have a page on the wiki (or somewhere else) that lists the wallet versions run by pools & exchanges?
[14:45] will be in next release
[14:45] furthermore, many sites have friendly link to the standard installers for each platform, if the site linked to the primary installers for each platform to reduce github newb confusion that would be good as well
[14:46] likely to a testnetv5 although that isn't settled
[14:46] <@wolfsokta> Thanks cfox.
[14:46] <@wolfsokta> Are there any questions about unique assets, and how they work?
[14:47] after the # are there any charachters you cant use?
[14:47] will unique assets be constrained by the asset alphanumeric set?
[14:47] ^
[14:47] <@Chatturga> @Urgo there is a page that tracks and shows if they have updated, but it currently doesnt show the actual version that they are on.
[14:47] a-z A-Z 0-9
[14:47] <@Chatturga> https://raven.wiki/wiki/Exchange_notifications#Pools
[14:47] There are a few. Mostly ones that mess with command-line
[14:47] you'll be able to use rpc to do "issueunique MATRIX ['Neo','Tank','Tank Brother']" and it will create three assets for you (MATRIX#Neo, etc.)
[14:47] @cfox - No space
[14:48] @under the unique tags have an expanded set of characters allowed
[14:48] Chatturga: thank you
[14:48] @UJP yes there are some you can't use -- I'll try to post gimmie a sec..
[14:49] Ok. Thank you much!
[14:49] 36^36 assets possible and 62^62 uniques available per asset?
[14:49] <@spyder_> std::regex UNIQUE_TAG_CHARACTERS("^[[email protected]$%&*()[\\]{}<>_.;?\\\\:]+$");
[14:50] regex UNIQUE_TAG_CHARACTERS("^[[email protected]$%&*()[\\]{}<>_.;?\\\\:]+$")
[14:50] oh thanks Mark
[14:51] <@wolfsokta> Okay, next up. I want to thank everybody for helping test the iOS wallet release.
[14:51] <@wolfsokta> We are working with Apple to get the final approval to post it to the App Store
[14:51] @under max asset length is 30, including unique tag
[14:51] Does the RVN wallet have any other cryptos or just RVN?
[14:52] == BruceFenton [[email protected]/web/freenode/ip.67.189.233.170] has joined #ravencoin-dev
[14:52] will the android and ios source be migrated to the ravenproject github?
[14:52] I've been adding beta test users. I've added about 80 new users in the last few days.
[14:52] <@wolfsokta> Just RVN, and we want to focus on adding the asset support to the wallet.
[14:53] == Bruce_ [[email protected]/web/freenode/ip.67.189.233.170] has quit [Ping timeout: 252 seconds]
[14:53] <@wolfsokta> Yes, the code will also be freely available on GitHub for both iOS and Android. Thank you Roshii!
[14:53] Would you consider the iOS wallet to be a more secure place for one's holdings than say, a Mac connected to the internet?
[14:53] will there be a chance of a more user freindly wallet with better graphics like the iOS on PC?
[14:53] the android wallet is getting updated for DGW, correct?
[14:53] <@wolfsokta> That has come up in our discussion Pizza.
[14:54] QT framework is pretty well baked in and is cross platform. if we get some qt gurus possibly
[14:54] Phones are pretty good because the wallet we forked uses the TPM from modern phones.
[14:54] Most important is to write down and safely store your 12 word seed.
[14:54] TPM?
[14:54] <@wolfsokta> A user friendly wallet is one of our main goals.
[14:55] TPM == Trusted Platform Module
[14:55] Ahhh thanks
[14:55] just please no electron apps. they are full of security holes
[14:55] <@spyder_> It is whats makes your stuffs secure
[14:55] not fit for crypto
[14:55] under: depends on who makes it
[14:55] The interface screenshots I've seen look like Bread/Loaf wallet ... I assume that's what was forked from
[14:55] ;)
[14:56] <@wolfsokta> @roshii did you see the question about the Android wallet and DGW?
[14:56] Yes, it was a fork of breadwallet. We like their security.
[14:56] chromium 58 is the last bundled electron engine and has every vuln documented online by google. so unless you patch every vuln.... methinks not
[14:56] Agreed, great choice
[14:57] <@wolfsokta> @Under, what was your proposal?
[14:58] All asset creation Transactions have a mandatory OP_CHECKLOCKTIMEVERIFY of 1 year(or some agreed upon time interval), and the 500 RVN goes to a multisig devfund, run by a custodial group. We get: 1) an artificial temporary burn, 2) sustainable community and core development funding for the long term, after OSTK/Medici 3) and the reintroduction of RVN supply at a fixed schedule, enabling the removal of the 42k max cap of total As
[14:58] *im wrong on the 42k figure
[14:58] <@wolfsokta> Interesting...
[14:59] <@wolfsokta> Love to hear others thoughts.
[14:59] Update: I posted a message on the CryptoBridge discord and one of their support members @stepollo#6276 said he believes the coin team is already aware of the fork but he would forward the message about the fork over to them right now anyway
[14:59] Ifs 42 million assets
[14:59] yep.
[15:00] I have a different Idea. If the 500 RVN goes to a dev fund its more centralized. The 500 RVN should go back into the unmined coins so miners can stay for longer.
[15:01] *without a hardfork
[15:01] <@wolfsokta> lol
[15:01] that breaks halving schedule, since utxos cant return to an unmined state.
[15:01] @UJP back into coinbase is interesting. would have to think about how that effects distribution schedule, etc.
[15:01] only way to do that would be to dynamicaly grow max supply
[15:02] and i am concerned already about the max safe integer on various platforms at 21 billion
[15:02] js chokes on ravencoin already
[15:02] <@wolfsokta> Other thoughts on Under's proposal? JS isn't a real language. ;)
[15:02] Well Bitcoin has more than 21 bn Sats
[15:02] Is there somebody who wants to volunteer to fix js.
[15:02] hahaha
[15:03] I honestly would hate for the coins to go to a dev fund. It doesn't seem like Ravencoin to me.
[15:03] Yep, but we're 21 billion x 100,000,000 -- Fits fine in a 64-bit integer, but problematic for some languages.
[15:03] <@wolfsokta> Thanks UJP
[15:04] <@wolfsokta> We're past time but I would like to continue if you folks are up for it.
[15:04] Yeah no coins can go anywhere centrality contorted like a dev fund cause that would mean someone has to run it and the code can’t decide that so it’s destined to break
[15:05] currently and long term with out the financial backing of development then improvements and features will be difficult. we are certainly thankful for our current development model. but if a skunkworks project hits a particular baseline of profitability any reasonable company would terminate it
[15:05] Yes let’s contibue for sure
[15:05] the alternative to a dev fund in my mind would be timelocking those funds back to the issuers change address
[15:06] But we can’t have dev built in to the code — it has to be open source like Bitcoin and monero and Litecoin - it’s got drawbacks but way more advantages- it’s the best model
[15:06] Dev funding
[15:06] i highly reccommend not reducing the utility of raven by removing permanently the supply
[15:07] == BW_ [[email protected]/web/freenode/ip.138.68.243.202] has joined #ravencoin-dev
[15:07] timelocking those funds accompllishes the same sacrifice
[15:07] @under timelocking is interesting too
[15:07] How exactly does timelocking work?
[15:07] <@wolfsokta> ^
[15:07] I mean you could change the price of assets with the Block reward halfing.
[15:07] == Roshiix [[email protected]/web/freenode/ip.105.67.2.212] has joined #ravencoin-dev
[15:08] funds cant be spent from an address until a certain time passes
[15:08] but in a what magical fairy land do people continue to work for free forever. funding development is a real issue... as much as some might philosphically disagree. its a reality
[15:08] You’d still need a centralized party to decide how to distribute the funds
[15:08] even unofficially blockstream supports bitcoin devs
[15:08] on chain is more transparent imho
[15:09] == Tron_ [[email protected]/web/freenode/ip.173.241.144.77] has joined #ravencoin-dev
[15:09] @UJP yes there are unlimited strategies. one factor that I think is v important is giving application developers a way to easily budget for projects which leads to flat fees
[15:09] If the project is a success like many of believe it will be, I believe plenty of people will gladly done to a dev fund. I don't think the 500 should be burned.
[15:09] *donate
[15:09] centralized conservatorship, directed by community voting process
[15:10] == Tron [[email protected]/web/freenode/ip.173.241.144.77] has quit [Ping timeout: 252 seconds]
[15:10] <@wolfsokta> Thanks Under, that's an interesting idea that we should continue to discuss in the community. You also mentioned the existing website.
[15:10] It would need to be something where everyone with a QT has a vote
[15:10] think his computer went to sleep again :-/
[15:10] I agree UJP
[15:10] with the website
[15:10] No that’s ico jargon — any development fund tied to code would have to be centralized and would therefor fail
[15:11] ^
[15:11] ^
[15:11] ^
[15:11] dashes model for funding seems to be pretty decentralized
[15:11] community voting etc
[15:11] Once you have a dev fund tied to code then who gets to run it? Who mediates disputes?
[15:11] oh well another discussion
[15:11] Dash has a CEO
[15:12] <@wolfsokta> Yeah, let's keep discussing in the community spaces.
[15:12] Dash does have a good model. It's in my top ten.
[15:12] having the burn go to a dev fund is absolute garbage
[15:12] These dev chats should be more target than broad general discussions — changing the entire nature of the coin and it’s economics is best discussed in the RIPs or other means
[15:13] <@wolfsokta> Yup, let's move on.
[15:13] just becuase existing implementation are garbage doesnt mean that all possible future governance options are garbage
[15:13] <@wolfsokta> To discussing the website scenario mentioned by under.
[15:13] the website needs work. would be best if it could be migrated to github as well.
[15:13] What about this: Anyone can issue a vote once the voting feature has been added, for a cost. The vote would be what the coins could be used for.
[15:14] features for the site that need work are more user friendly links to binaries
[15:14] <@wolfsokta> We investigated how bitcoin has their website in Github to make it easy for contributors to jump in.
[15:14] that means active maintenance of the site instead of its current static nature
[15:15] <@wolfsokta> I really like how it's static html, which makes it super simple to host/make changes.
[15:15] the static nature isn’t due to interface it’s due to no contributors
[15:15] no contribution mechanism has been offered
[15:15] github hosted would allow that
[15:16] We used to run the Bitcoin website from the foundation & the GitHub integration seemed to cause some issues
[15:16] its doesnt necessarily have to be hosted by github but the page source should be on github and contributions could easily be managed and tracked
[15:17] for example when a new release is dropped, the ability for the downlaods section to have platform specific easy links to the general installers is far better for general adoption than pointing users to github releases
[15:18] <@wolfsokta> How do people currently contribute to the existing website?
[15:18] they dont?
[15:18] We did that and it was a complete pain to host and keep working — if someone wants to volunteer to do that work hey can surely make the website better and continually updated — but they could do that in Wordpress also
[15:19] I’d say keep an eye out for volunteers and maybe we can get a group together who can improve the site
[15:19] == digitalvap0r-xmr [[email protected]/web/cgi-irc/kiwiirc.com/ip.67.255.25.134] has joined #ravencoin-dev
[15:19] And they can decide best method
[15:20] I host the source for the explorer on github and anyone can spin it up instantly on a basic aws node. changes can be made to interface etc, and allow for multilingual translations which have been offered by some community members
[15:20] there are models that work. just saying it should be looked at
[15:20] i gotta run thank you all for your contributions
[15:20] <@wolfsokta> I feel we should explore the source for the website being hosted in GitHub and discuss in our next dev meeting.
[15:21] <@Chatturga> Thanks Under!
[15:21] == under [[email protected]/web/freenode/ip.72.200.168.56] has quit [Quit: Page closed]
[15:21] <@wolfsokta> Thanks, we also need to drop soon.
[15:21] There is no official site so why care. Someone will do better than the next if RVN is worth it anyway. That's already the case.
[15:21] <@wolfsokta> Let's do 10 mins of open Q&A
[15:22] <@wolfsokta> Go...
[15:23] <@Chatturga> Beuller?
[15:24] No questions ... just a comment that the devs and community are great and I'm happy to be a part of it
[15:24] I think everyone moved to discord. I'll throw this out there. How confident is the dev team that things will be ready for oct 31st?
[15:24] <@wolfsokta> Alright! Thanks everybody for joining us today. Let's plan to get back together as a dev group in a couple of weeks.
[15:25] thanks block!
[15:25] <@wolfsokta> Urgo, very confident
[15:25] Please exclude trolls from discord who havent read the whitepaper
[15:25] great :)
[15:25] "things" will be ready..
[15:25] Next time on discord right?
[15:25] woah why discord?
[15:25] some of the suggestions here are horrid
[15:25] this is better less point
[15:25] == blondfrogs [[email protected]/web/freenode/ip.185.245.87.219] has quit [Quit: Page closed]
[15:25] Assets are working well on testnet. Plan is to get as much as we can safely test by Sept 30 -- this includes dev contributions. Oct will be heavy testing and making sure it is safe.
[15:26] people
[15:26] <@wolfsokta> Planning on same time, same IRC channel.
[15:26] == BW_ [[email protected]/web/freenode/ip.138.68.243.202] has quit [Quit: Page closed]
[15:26] @xmr any in particular?
[15:27] (or is "here" discord?)
[15:27] Cheers - Tron
[15:27] "Cheers - Tron" - Tron
submitted by Chatturga to Ravencoin [link] [comments]

How to start Bitcoin mining for beginners (SUPER EASY ... How to get a Bitcoin Wallet Address - FREE & in under a ... How To Download and Use Exodus Bitcoin Wallet - YouTube How to create a Bitcoin Wallet-(CryptoCurrency-Bitcoin ... How to mine $1,000,000 of Bitcoin using just a laptop ...

Bitcoin Wallet: In einem Bitcoin Wallet wie Electrum speichern Sie Bitcoins sicher offline. Screenshot Das wichtigste Tool für Bitcoin ist der Wallet, den man sich als eine Art Geldbörse für ... Download the Bitcoin Wallet by Bitcoin.com. A simple, secure way to send and receive Bitcoin. Available for iOS, Android, Mac, Windows, and Linux. Supports Bitcoin Cash (BCH) and Bitcoin (BTC). Bei bitcoin.de handelt es sich um einen Online-Marktplatz, über den Sie sowohl Bitcoins kaufen als auch verkaufen können.; Angebote sowie den aktuellen Bitcoin-Kurs sehen Sie direkt auf der Startseite ein. Ein Chart informiert Sie außerdem über die Entwicklung des Kurses. Its HD bitcoin wallet app was originally only available for iOS but an Android version was released in 2016. It’s easy to use and ideal for beginners. This wallet includes the option to buy bitcoin, so it can double as an exchange. Bitcoin is the only cryptocurrency available. Copay . iOS, Android, Windows, MacOS, Linux, Chrome. Copay is a product of BitPay, makers of a popular bitcoin ... Update Syscoin to new wallet format. Contribution from donredhorse. Update MonetaryUnit to new wallet format. Contribution from BBoBBG. Improved Chaincoin graphics. Contribution from suprnurd. 09.2017 -- New translation in Ukrainian ! Contribution from Dmytro. Add support for Bitcoin Cash. Add support for C2Coin. Contribution from Chris.

[index] [36965] [17579] [29479] [46431] [12845] [37745] [23949] [20046] [37008] [4778]

How to start Bitcoin mining for beginners (SUPER EASY ...

Hi friends, This video about the e-money crypto-currency wallet. Do you have any crypto-currency wallet.?,, But This cryptocurrency wallet has many security ... If you want to find out more about the tools we have for cryptocurrency investors in our Masters area, see video here: https://moocharoo.ninja/bmm Also try: ... This is the shorter version lol!!!!! This video shows how to setup your first bitcoin wallet, and how to buy your first bitcoin! Hope it helps!! Link to Coi... Here you can watch how to easily and secure create your own Bitcoin wallet for Windows PC. Bitcoin will be tradable against OctaCoin. Stay tuned, as updates will follow soon about the next step in ... Top Best CryptoCurrency Wallet Best Bitcoin Wallet 2019 Crypto Wallets 2019 in Hindi . Лучший Биткоин кошелек. Где хранить криптовалюту [Надежн�

#