How to Buy Bitcoin Anonymously (And Why You Should ...

Best Ways to Passively Earn Free Bitcoin & Crypto in 2020

Here are my best ways to earn free crypto passively in 2020 with the least amount of effort. Hopefully these 5 methods are helpful to you.

Earning Crypto for Things You Do Already
1) Brave Browser (BAT)
For me, one of the biggest no brainers out there for earning free cryptocurrency is the Brave Browser and their BAT token. This new browser looks and feels like the Chrome browser, but is better in so many ways…
AD BLOCKERS: Most websites and ads include software that track your every move as you browse the web. Brave Shields block these incoming ads and trackers to allow a more private, uninterrupted browsing experience.
SPEED: One perk of blocking those ads and trackers is that they can no longer slow down your page uploads. Brave Browser can load sites up to six times faster than Chrome, Safari and Firefox.
PRIVACY: Most browsers have a “private mode,” but this only hides your history from others using your browser. Brave’s Tor feature not only hides history, but it also masks your location from the sites you visit by routing your browsing through several servers before it reaches your destination. These connections are encrypted to increase anonymity.
REWARDS: So now on to the part that earns you free cryptocurrency. While the Brave browser blocks unwanted ads, it gives you the option to earn rewards (BAT Tokens) by opting into their privacy-respecting ads. Get paid to view small, non-intrusive ads as you browse the internet. This feature is completely optional as the browser gives you the option to allow anywhere from 5 ads per hour (max) down to no ads at all if you would prefer to forgo earning BAT tokens and want to just enjoy an ad free browsing experience.
If you are worried to move away from the Chrome browser because you rely on some of the Chrome extensions, not to worry. Brave browser should maintain support for all of your Chrome extensions.
Brave browser is a great way to passively earn cryptocurrency for doing something you already do. In addition, if you are willing to put in just a little more work, you can earn more BAT by signing up for their Brave Creators program. This will give you a referral link that you can pass along to friends and family to earn additional BAT tokens for each person that downloads the browser. Referral bonuses differ depending on what country the new user is from, for example new users from the United States are currently worth $7.50 of BAT each. If you would like to get started with the Brave Browser and earning BAT tokens, you can use the link below to download.
Brave Download Page

2) Presearch (PRE)
A natural addition to the Brave browser is Presearch. While you are getting paid to browse the internet with Brave, you might as well get paid for your internet searches as well. Presearch is a new internet search engine that pays you for each search in the form of their PRE token. And just like the Brave browser, one of the best perks, besides getting paid to do what you already do, is that you are not sacrificing quality to get it. In their own words, “WE ARE BUILDING A NEXT-GENERATION SEARCH ENGINE, POWERED BY THE COMMUNITY.”
Worried you won’t get as good of search results as Google? Nothing to worry about there as you can simply choose Google as your default provider within Presearch and you will be directed to Google’s results when you enter your search. In fact, you can direct your search to any number of sites (96 as of this writing) for any given search. They make this easy to switch back and forth as there is a list of your favorite sites directly under the search bar. Some examples of the more popular sites include Amazon, Youtube, Facebook, Reddit, ESPN and Netflix.
If you are so inclined, in addition to getting paid for your internet searches, Presearch also allows you to use your purchased or earned PRE tokens to buy keyword ads. In their words, “Keyword Staking enables token holders to commit or ‘stake’ their PRE tokens against specific words and multi-word terms. With Presearch Keyword Staking you choose a keyword (ex. ‘Bitcoin’) and then stake PRE tokens that you’ve purchased or earned against that term. You can then create an ad that you link to the website of your choice.”
To begin earning PRE for all your internet searches, use the link below.
Presearch Sign Up

3) Crypto.com (CRO & MCO)
Crypto.com is on a mission to be the leader in cryptocurrency adoption to the masses so they are being aggressive with their customer incentives. Another great way to earn crypto for doing what you already do is via their Debit Card cash-back. Crypto.com has great eye-catching, metal crypto reward credit cards that pay you cash back for all of your day to day purchases anywhere VISA is accepted. Depending on which level of card you get, these credit cards reward 1% to 5% cashback (paid in their MCO token) on all spending along with other great benefits like free ATM & international withdrawals, 100% cashback on Spotify & Netflix subscriptions and airport lounge access. You can find the full details for each card on their website, but below is a breakdown of the benefits on their three lowest entry level cards. Note that some of these benefits are reduced if you are not staking their MCO token.
MIDNIGHT BLUE (Plastic Card)
Cash Back Reward: 1%
Monthly Free ATM Withdrawal Limit: $200
Required MCO Stake: None (Free)

RUBY STEEL (Metal)
Cash Back Reward: 2%
100% cashback on a standard Spotify subscription (up to $12.99)
Monthly Free ATM Withdrawal Limit: $400
Required MCO Stake: 50

JADE GREEN & ROYAL INDIGO (Metal)
Cash Back Reward: 3%
100% cashback on a standard Spotify subscription (up to $12.99)
100% cashback on a standard Netflix subscription (up to $12.99)
Monthly Free ATM Withdrawal Limit: $800
Airport Lounge Access
Required MCO Stake: 500

PLEASE NOTE: Cards are currently available in the US, Singapore and Europe. And hopefully very soon will be available in Asia Pacific and Canada as well.
In order to get your hands on one of these cards you will need to open a Crypto.com account if you don’t already have one. There is good news if you don’t already have one, as new sign ups can get $50 worth of MCO tokens free by using the link and promo code I have posted below. Please note that the $50 of MCO tokens will remain locked until you deposit & stake at least 50 MCO tokens toward the sign up of the particular card you are interested in.
In case you are unfamiliar with the term “staked”, this simply means that those coins will be locked up for whatever length of time that card requires. It is important to note that you are not paying or losing those coins as you will be free to sell the staked MCO at the end of holding period and continue to earn crypto cash-back from your card. Or you can leave your MCO coins staked and continue to earn interest on them. For example, if you hold a Jade Green card which requires a 500 MCO stake, they are currently offering 6% interest on those coins which is paid out in more MCO.
In summary, Crypto.com cards are a great way to earn free crypto on your everyday purchases along with other great perks like free (100% cashback) Netflix and Spotify subscriptions. In addition, a small layer of comfort in signing up for one of these cards, is that Crypto.com is one of the largest, most trusted crypto exchanges out there right now. In fact, if you are also looking for an exchange to get started with purchasing crypto assets, your Crypto.com account would be great for that as well. To claim your Crypto.com debit rewards card you can use the link below. If you do not currently have a Crypto.com account and would like to get the $50 Sign Up Bonus use the link along with the promo code.
Crypto.com Sign Up (Get $50 Bonus)
PROMO CODE: gapena3dq4
Earn Free Crypto Instantly for a Little Bit of Your Time

4) Coinbase Earn
In an effort to educate its users and to try and simplify the sometimes complex world of cryptocurrency, Coinbase has put together the Coinbase Earn program. They have partnered with some of the biggest blockchain projects out there to offer you free crypto for watching short educational videos about the coin you are getting rewarded in. These videos are normally about 2-3 minutes long and pay you $2 to $4 per video, with each project having about 4 or 5 total videos.
In order to collect your reward, you normally need to successfully answer a multiple choice question at the end of the video which is usually fairly simple. If you get the question wrong don’t worry, they will allow you to watch the video over again until you get the question correct. Once you have answered the question correctly you will immediately receive your tokens that you are free to sell or exchange for another token of your choice if you would like.
Coinbase is changing their active offerings for these videos all the time and usually have about 4 or 5 projects available at any given time. In addition, some of the projects will not be immediately available and will require you to join a waitlist. Then, once the offering is available to you, they will email you with a link to the videos. Below is the current list of available offerings as of this writing and I will do my best to keep these updated. However, once you have a Coinbase account you can log in and check for new projects on your own. Speaking of which, a Coinbase account is required before you can watch the videos so if you do not already have one you can use the link below to sign up. Using this link will also get you $10 of free Bitcoin as a sign up bonus (Note that to get the free $10 you must buy or sell $100 worth of crypto within 180 days of signing up).
Coinbase Sign Up ($10 Bonus)

Current Coinbase Earn Offerings:
1. EOS – 5 Videos / $2 each / $10 Total
Watch EOS Videos
2. Orchid (OXT)- 3 Videos / $4 each / $12 Total
Watch OXT Videos
3. Stellar Lumens (XLM) - 5 Videos / $2 each / $10
Watch XLM Videos
*** Each of these offerings also provides the opportunity to earn an additional $40 each for referring them to friends and family. ($10 per referral / Max of 4 each)

5) EarnCrypto.com
If you have some free time on your hands and are willing to put in a little effort, EarnCrypto.com is another good option for earning free Bitcoin or other cryptocurrencies. On this site you will get paid free crypto for completing tasks like watching videos, playing games and taking surveys.
One nice thing about this site is that once you have completed your task you will be given your free crypto instantly and they offer a very wide selection of coins to pick from. I think right now they offer over 80 different cryptocurrencies for rewards and you get to choose which coin you want to get paid in. This makes for a great way to gain some exposure to lower market cap coins that are often not listed on the major exchanges. In addition, they are adding new coins all the time, so you can send them a request to add your favorite crypto if they don’t already offer it. Use the link below to open an account and start earning the cryptocurrency of your choice now.
EarnCrypto.com Sign Up
submitted by CaliBum16 to passiveincome [link] [comments]

Best Ways to Passively Earn Free Bitcoin & Crypto in 2020

Here are my best ways to earn free crypto passively in 2020 with the least amount of effort. Hopefully these 5 methods are helpful to you.
Earning Crypto for Things You Do Already
1) Brave Browser (BAT)
For me, one of the biggest no brainers out there for earning free cryptocurrency is the Brave Browser and their BAT token. This new browser looks and feels like the Chrome browser, but is better in so many ways…
AD BLOCKERS: Most websites and ads include software that track your every move as you browse the web. Brave Shields block these incoming ads and trackers to allow a more private, uninterrupted browsing experience.
SPEED: One perk of blocking those ads and trackers is that they can no longer slow down your page uploads. Brave Browser can load sites up to six times faster than Chrome, Safari and Firefox.
PRIVACY: Most browsers have a “private mode,” but this only hides your history from others using your browser. Brave’s Tor feature not only hides history, but it also masks your location from the sites you visit by routing your browsing through several servers before it reaches your destination. These connections are encrypted to increase anonymity.
REWARDS: So now on to the part that earns you free cryptocurrency. While the Brave browser blocks unwanted ads, it gives you the option to earn rewards (BAT Tokens) by opting into their privacy-respecting ads. Get paid to view small, non-intrusive ads as you browse the internet. This feature is completely optional as the browser gives you the option to allow anywhere from 5 ads per hour (max) down to no ads at all if you would prefer to forgo earning BAT tokens and want to just enjoy an ad free browsing experience.
If you are worried to move away from the Chrome browser because you rely on some of the Chrome extensions, not to worry. Brave browser should maintain support for all of your Chrome extensions.
Brave browser is a great way to passively earn cryptocurrency for doing something you already do. In addition, if you are willing to put in just a little more work, you can earn more BAT by signing up for their Brave Creators program. This will give you a referral link that you can pass along to friends and family to earn additional BAT tokens for each person that downloads the browser. Referral bonuses differ depending on what country the new user is from, for example new users from the United States are currently worth $7.50 of BAT each. If you would like to get started with the Brave Browser and earning BAT tokens, you can use the link below to download.
Brave Download Page

2) Presearch (PRE)
A natural addition to the Brave browser is Presearch. While you are getting paid to browse the internet with Brave, you might as well get paid for your internet searches as well. Presearch is a new internet search engine that pays you for each search in the form of their PRE token. And just like the Brave browser, one of the best perks, besides getting paid to do what you already do, is that you are not sacrificing quality to get it. In their own words, “WE ARE BUILDING A NEXT-GENERATION SEARCH ENGINE, POWERED BY THE COMMUNITY.”
Worried you won’t get as good of search results as Google? Nothing to worry about there as you can simply choose Google as your default provider within Presearch and you will be directed to Google’s results when you enter your search. In fact, you can direct your search to any number of sites (96 as of this writing) for any given search. They make this easy to switch back and forth as there is a list of your favorite sites directly under the search bar. Some examples of the more popular sites include Amazon, Youtube, Facebook, Reddit, ESPN and Netflix.
If you are so inclined, in addition to getting paid for your internet searches, Presearch also allows you to use your purchased or earned PRE tokens to buy keyword ads. In their words, “Keyword Staking enables token holders to commit or ‘stake’ their PRE tokens against specific words and multi-word terms. With Presearch Keyword Staking you choose a keyword (ex. ‘Bitcoin’) and then stake PRE tokens that you’ve purchased or earned against that term. You can then create an ad that you link to the website of your choice.”
To begin earning PRE for all your internet searches, use the link below.
Presearch Sign Up

3) Crypto.com (CRO & MCO)
Crypto.com is on a mission to be the leader in cryptocurrency adoption to the masses so they are being aggressive with their customer incentives. Another great way to earn crypto for doing what you already do is via their Debit Card cash-back. Crypto.com has great eye-catching, metal crypto reward credit cards that pay you cash back for all of your day to day purchases anywhere VISA is accepted. Depending on which level of card you get, these credit cards reward 1% to 5% cashback (paid in their MCO token) on all spending along with other great benefits like free ATM & international withdrawals, 100% cashback on Spotify & Netflix subscriptions and airport lounge access. You can find the full details for each card on their website, but below is a breakdown of the benefits on their three lowest entry level cards. Note that some of these benefits are reduced if you are not staking their MCO token.

MIDNIGHT BLUE (Plastic Card)
Cash Back Reward: 1%
Monthly Free ATM Withdrawal Limit: $200
Required MCO Stake: None (Free)

RUBY STEEL (Metal)
Cash Back Reward: 2%
100% cashback on a standard Spotify subscription (up to $12.99)
Monthly Free ATM Withdrawal Limit: $400
Required MCO Stake: 50

JADE GREEN & ROYAL INDIGO (Metal)
Cash Back Reward: 3%
100% cashback on a standard Spotify subscription (up to $12.99)
100% cashback on a standard Netflix subscription (up to $12.99)
Monthly Free ATM Withdrawal Limit: $800
Airport Lounge Access
Required MCO Stake: 500

PLEASE NOTE: Cards are currently available in the US, Singapore and Europe. And hopefully very soon will be available in Asia Pacific and Canada as well.
In order to get your hands on one of these cards you will need to open a Crypto.com account if you don’t already have one. There is good news if you don’t already have one, as new sign ups can get $50 worth of MCO tokens free by using the link and promo code I have posted below. Please note that the $50 of MCO tokens will remain locked until you deposit & stake at least 50 MCO tokens toward the sign up of the particular card you are interested in.
In case you are unfamiliar with the term “staked”, this simply means that those coins will be locked up for whatever length of time that card requires. It is important to note that you are not paying or losing those coins as you will be free to sell the staked MCO at the end of holding period and continue to earn crypto cash-back from your card. Or you can leave your MCO coins staked and continue to earn interest on them. For example, if you hold a Jade Green card which requires a 500 MCO stake, they are currently offering 6% interest on those coins which is paid out in more MCO.
In summary, Crypto.com cards are a great way to earn free crypto on your everyday purchases along with other great perks like free (100% cashback) Netflix and Spotify subscriptions. In addition, a small layer of comfort in signing up for one of these cards, is that Crypto.com is one of the largest, most trusted crypto exchanges out there right now. In fact, if you are also looking for an exchange to get started with purchasing crypto assets, your Crypto.com account would be great for that as well. To claim your Crypto.com debit rewards card you can use the link below. If you do not currently have a Crypto.com account and would like to get the $50 Sign Up Bonus use the link along with the promo code.
Crypto.com Sign Up (Get $50 Bonus)
PROMO CODE: gapena3dq4

Earn Free Crypto Instantly for a Little Bit of Your Time
4) Coinbase Earn
In an effort to educate its users and to try and simplify the sometimes complex world of cryptocurrency, Coinbase has put together the Coinbase Earn program. They have partnered with some of the biggest blockchain projects out there to offer you free crypto for watching short educational videos about the coin you are getting rewarded in. These videos are normally about 2-3 minutes long and pay you $2 to $4 per video, with each project having about 4 or 5 total videos.
In order to collect your reward, you normally need to successfully answer a multiple choice question at the end of the video which is usually fairly simple. If you get the question wrong don’t worry, they will allow you to watch the video over again until you get the question correct. Once you have answered the question correctly you will immediately receive your tokens that you are free to sell or exchange for another token of your choice if you would like.
Coinbase is changing their active offerings for these videos all the time and usually have about 4 or 5 projects available at any given time. In addition, some of the projects will not be immediately available and will require you to join a waitlist. Then, once the offering is available to you, they will email you with a link to the videos. Below is the current list of available offerings as of this writing and I will do my best to keep these updated. However, once you have a Coinbase account you can log in and check for new projects on your own. Speaking of which, a Coinbase account is required before you can watch the videos so if you do not already have one you can use the link below to sign up. Using this link will also get you $10 of free Bitcoin as a sign up bonus (Note that to get the free $10 you must buy or sell $100 worth of crypto within 180 days of signing up).
Coinbase Sign Up ($10 Bonus)

Current Coinbase Earn Offerings:
1. EOS – 5 Videos / $2 each / $10 Total
Watch EOS Videos
2. Orchid (OXT)- 3 Videos / $4 each / $12 Total
Watch OXT Videos
3. Stellar Lumens (XLM) - 5 Videos / $2 each / $10
Watch XLM Videos
*** Each of these offerings also provides the opportunity to earn an additional $40 each for referring them to friends and family. ($10 per referral / Max of 4 each)

5) EarnCrypto.com
If you have some free time on your hands and are willing to put in a little effort, EarnCrypto.com is another good option for earning free Bitcoin or other cryptocurrencies. On this site you will get paid free crypto for completing tasks like watching videos, playing games and taking surveys.
One nice thing about this site is that once you have completed your task you will be given your free crypto instantly and they offer a very wide selection of coins to pick from. I think right now they offer over 80 different cryptocurrencies for rewards and you get to choose which coin you want to get paid in. This makes for a great way to gain some exposure to lower market cap coins that are often not listed on the major exchanges. In addition, they are adding new coins all the time, so you can send them a request to add your favorite crypto if they don’t already offer it. Use the link below to open an account and start earning the cryptocurrency of your choice now.
EarnCrypto.com Sign Up

What are the best exchanges to buy crypto in the US?

Are you looking to start investing in cryptocurrency and wondering where the best place to buy it is? Or if you are in the US, are you wondering which crypto exchanges are legal for you to use? Check out my post 5 Best Exchanges to Buy Crypto in the US linked below to get some answers to these.
https://cryptoassets101.blogspot.com/
submitted by CaliBum16 to u/CaliBum16 [link] [comments]

Searching for the Unicorn Cryptocurrency

Searching for the Unicorn Cryptocurrency
For someone first starting out as a cryptocurrency investor, finding a trustworthy manual for screening a cryptocurrency’s merits is nonexistent as we are still in the early, Wild West days of the cryptocurrency market. One would need to become deeply familiar with the inner workings of blockchain to be able to perform the bare minimum due diligence.
One might believe, over time, that finding the perfect cryptocurrency may be nothing short of futile. If a cryptocurrency purports infinite scalability, then it is probably either lightweight with limited features or it is highly centralized among a limited number of nodes that perform consensus services especially Proof of Stake or Delegated Proof of Stake. Similarly, a cryptocurrency that purports comprehensive privacy may have technical obstacles to overcome if it aims to expand its applications such as in smart contracts. The bottom line is that it is extremely difficult for a cryptocurrency to have all important features jam-packed into itself.
The cryptocurrency space is stuck in the era of the “dial-up internet” in a manner of speaking. Currently blockchain can’t scale – not without certain tradeoffs – and it hasn’t fully resolved certain intractable issues such as user-unfriendly long addresses and how the blockchain size is forever increasing to name two.
In other words, we haven’t found the ultimate cryptocurrency. That is, we haven’t found the mystical unicorn cryptocurrency that ushers the era of decentralization while eschewing all the limitations of traditional blockchain systems.
“But wait – what about Ethereum once it implements sharding?”
“Wouldn’t IOTA be able to scale infinitely with smart contracts through its Qubic offering?”
“Isn’t Dash capable of having privacy, smart contracts, and instantaneous transactions?”
Those thoughts and comments may come from cryptocurrency investors who have done their research. It is natural for the informed investors to invest in projects that are believed to bring cutting edge technological transformation to blockchain. Sooner or later, the sinking realization will hit that any variation of the current blockchain technology will always likely have certain limitations.
Let us pretend that there indeed exists a unicorn cryptocurrency somewhere that may or may not be here yet. What would it look like, exactly? Let us set the 5 criteria of the unicorn cryptocurrency:
Unicorn Criteria
(1) Perfectly solves the blockchain trilemma:
o Infinite scalability
o Full security
o Full decentralization
(2) Zero or minimal transaction fee
(3) Full privacy
(4) Full smart contract capabilities
(5) Fair distribution and fair governance
For each of the above 5 criteria, there would not be any middle ground. For example, a cryptocurrency with just an in-protocol mixer would not be considered as having full privacy. As another example, an Initial Coin Offering (ICO) may possibly violate criterion (5) since with an ICO the distribution and governance are often heavily favored towards an oligarchy – this in turn would defy the spirit of decentralization that Bitcoin was found on.
There is no cryptocurrency currently that fits the above profile of the unicorn cryptocurrency. Let us examine an arbitrary list of highly hyped cryptocurrencies that meet the above list at least partially. The following list is by no means comprehensive but may be a sufficient sampling of various blockchain implementations:
Bitcoin (BTC)
Bitcoin is the very first and the best known cryptocurrency that started it all. While Bitcoin is generally considered extremely secure, it suffers from mining centralization to a degree. Bitcoin is not anonymous, lacks smart contracts, and most worrisomely, can only do about 7 transactions per seconds (TPS). Bitcoin is not the unicorn notwithstanding all the Bitcoin maximalists.
Ethereum (ETH)
Ethereum is widely considered the gold standard of smart contracts aside from its scalability problem. Sharding as part of Casper’s release is generally considered to be the solution to Ethereum’s scalability problem.
The goal of sharding is to split up validating responsibilities among various groups or shards. Ethereum’s sharding comes down to duplicating the existing blockchain architecture and sharing a token. This does not solve the core issue and simply kicks the can further down the road. After all, full nodes still need to exist one way or another.
Ethereum’s blockchain size problem is also an issue as will be explained more later in this article.
As a result, Ethereum is not the unicorn due to its incomplete approach to scalability and, to a degree, security.
Dash
Dash’s masternodes are widely considered to be centralized due to their high funding requirements, and there are accounts of a pre-mine in the beginning. Dash is not the unicorn due to its questionable decentralization.
Nano
Nano boasts rightfully for its instant, free transactions. But it lacks smart contracts and privacy, and it may be exposed to well orchestrated DDOS attacks. Therefore, it goes without saying that Nano is not the unicorn.
EOS
While EOS claims to execute millions of transactions per seconds, a quick glance reveals centralized parameters with 21 nodes and a questionable governance system. Therefore, EOS fails to achieve the unicorn status.
Monero (XMR)
One of the best known and respected privacy coins, Monero lacks smart contracts and may fall short of infinite scalability due to CryptoNote’s design. The unicorn rank is out of Monero’s reach.
IOTA
IOTA’s scalability is based on the number of transactions the network processes, and so its supposedly infinite scalability would fluctuate and is subject to the whims of the underlying transactions. While IOTA’s scalability approach is innovative and may work in the long term, it should be reminded that the unicorn cryptocurrency has no middle ground. The unicorn cryptocurrency would be expected to scale infinitely on a consistent basis from the beginning.
In addition, IOTA’s Masked Authenticated Messaging (MAM) feature does not bring privacy to the masses in a highly convenient manner. Consequently, the unicorn is not found with IOTA.

PascalCoin as a Candidate for the Unicorn Cryptocurrency
Please allow me to present a candidate for the cryptocurrency unicorn: PascalCoin.
According to the website, PascalCoin claims the following:
“PascalCoin is an instant, zero-fee, infinitely scalable, and decentralized cryptocurrency with advanced privacy and smart contract capabilities. Enabled by the SafeBox technology to become the world’s first blockchain independent of historical operations, PascalCoin possesses unlimited potential.”
The above summary is a mouthful to be sure, but let’s take a deep dive on how PascalCoin innovates with the SafeBox and more. Before we do this, I encourage you to first become acquainted with PascalCoin by watching the following video introduction:
https://www.youtube.com/watch?time_continue=4&v=F25UU-0W9Dk
The rest of this section will be split into 10 parts in order to illustrate most of the notable features of PascalCoin. Naturally, let’s start off with the SafeBox.
Part #1: The SafeBox
Unlike traditional UTXO-based cryptocurrencies in which the blockchain records the specifics of each transaction (address, sender address, amount of funds transferred, etc.), the blockchain in PascalCoin is only used to mutate the SafeBox. The SafeBox is a separate but equivalent cryptographic data structure that snapshots account balances. PascalCoin’s blockchain is comparable to a machine that feeds the most important data – namely, the state of an account – into the SafeBox. Any node can still independently compute and verify the cumulative Proof-of-Work required to construct the SafeBox.
The PascalCoin whitepaper elegantly highlights the unique historical independence that the SafeBox possesses:
“While there are approaches that cryptocurrencies could use such as pruning, warp-sync, "finality checkpoints", UTXO-snapshotting, etc, there is a fundamental difference with PascalCoin. Their new nodes can only prove they are on most-work-chain using the infinite history whereas in PascalCoin, new nodes can prove they are on the most-work chain without the infinite history.”
Some cryptocurrency old-timers might instinctively balk at the idea of full nodes eschewing the entire history for security, but such a reaction would showcase a lack of understanding on what the SafeBox really does.
A concrete example would go a long way to best illustrate what the SafeBox does. Let’s say I input the following operations in my calculator:
5 * 5 – 10 / 2 + 5
It does not take a genius to calculate the answer, 25. Now, the expression “5 \ 5 – 10 / 2 + 5”* would be forever imbued on a traditional blockchain’s history. But the SafeBox begs to differ. It says that the expression “5 \ 5 – 10 / 2 + 5”* should instead be simply “25” so as preserve simplicity, time, and space. In other words, the SafeBox simply preserves the account balance.
But some might still be unsatisfied and claim that if one cannot trace the series of operations (transactions) that lead to the final number (balance) of 25, the blockchain is inherently insecure.
Here are four important security aspects of the SafeBox that some people fail to realize:
(1) SafeBox Follows the Longest Chain of Proof-of-Work
The SafeBox mutates itself per 100 blocks. Each new SafeBox mutation must reference both to the previous SafeBox mutation and the preceding 100 blocks in order to be valid, and the resultant hash of the new mutated SafeBox must then be referenced by each of the new subsequent blocks, and the process repeats itself forever.
The fact that each new SafeBox mutation must reference to the previous SafeBox mutation is comparable to relying on the entire history. This is because the previous SafeBox mutation encapsulates the result of cumulative entire history except for the 100 blocks which is why each new SafeBox mutation requires both the previous SafeBox mutation and the preceding 100 blocks.
So in a sense, there is a single interconnected chain of inflows and outflows, supported by Byzantine Proof-of-Work consensus, instead of the entire history of transactions.
More concretely, the SafeBox follows the path of the longest chain of Proof-of-Work simply by design, and is thus cryptographically equivalent to the entire history even without tracing specific operations in the past. If the chain is rolled back with a 51% attack, only the attacker’s own account(s) in the SafeBox can be manipulated as is explained in the next part.
(2) A 51% Attack on PascalCoin Functions the Same as Others
A 51% attack on PascalCoin would work in a similar way as with other Proof-of-Work cryptocurrencies. An attacker cannot modify a transaction in the past without affecting the current SafeBox hash which is accepted by all honest nodes.
Someone might claim that if you roll back all the current blocks plus the 100 blocks prior to the SafeBox’s mutation, one could create a forged SafeBox with different balances for all accounts. This would be incorrect as one would be able to manipulate only his or her own account(s) in the SafeBox with a 51% attack – just as is the case with other UTXO cryptocurrencies. The SafeBox stores the balances of all accounts which are in turn irreversibly linked only to their respective owners’ private keys.
(3) One Could Preserve the Entire History of the PascalCoin Blockchain
No blockchain data in PascalCoin is ever deleted even in the presence of the SafeBox. Since the SafeBox is cryptographically equivalent to a full node with the entire history as explained above, PascalCoin full nodes are not expected to contain infinite history. But for whatever reason(s) one may have, one could still keep all the PascalCoin blockchain history as well along with the SafeBox as an option even though it would be redundant.
Without storing the entire history of the PascalCoin blockchain, you can still trace the specific operations of the 100 blocks prior to when the SafeBox absorbs and reflects the net result (a single balance for each account) from those 100 blocks. But if you’re interested in tracing operations over a longer period in the past – as redundant as that may be – you’d have the option to do so by storing the entire history of the PascalCoin blockchain.
(4) The SafeBox is Equivalent to the Entire Blockchain History
Some skeptics may ask this question: “What if the SafeBox is forever lost? How would you be able to verify your accounts?” Asking this question is tantamount to asking to what would happen to Bitcoin if all of its entire history was erased. The result would be chaos, of course, but the SafeBox is still in line with the general security model of a traditional blockchain with respect to black swans.
Now that we know the security of the SafeBox is not compromised, what are the implications of this new blockchain paradigm? A colorful illustration as follows still wouldn’t do justice to the subtle revolution that the SafeBox ushers. The automobiles we see on the street are the cookie-and-butter representation of traditional blockchain systems. The SafeBox, on the other hand, supercharges those traditional cars to become the Transformers from Michael Bay’s films.
The SafeBox is an entirely different blockchain architecture that is impressive in its simplicity and ingenuity. The SafeBox’s design is only the opening act for PascalCoin’s vast nuclear arsenal. If the above was all that PascalCoin offers, it still wouldn’t come close to achieving the unicorn status but luckily, we have just scratched the surface. Please keep on reading on if you want to learn how PascalCoin is going to shatter the cryptocurrency industry into pieces. Buckle down as this is going to be a long read as we explore further about the SafeBox’s implications.
Part #2: 0-Confirmation Transactions
To begin, 0-confirmation transactions are secure in PascalCoin thanks to the SafeBox.
The following paraphrases an explanation of PascalCoin’s 0-confirmations from the whitepaper:
“Since PascalCoin is not a UTXO-based currency but rather a State-based currency thanks to the SafeBox, the security guarantee of 0-confirmation transactions are much stronger than in UTXO-based currencies. For example, in Bitcoin if a merchant accepts a 0-confirmation transaction for a coffee, the buyer can simply roll that transaction back after receiving the coffee but before the transaction is confirmed in a block. The way the buyer does this is by re-spending those UTXOs to himself in a new transaction (with a higher fee) thus invalidating them for the merchant. In PascalCoin, this is virtually impossible since the buyer's transaction to the merchant is simply a delta-operation to debit/credit a quantity from/to accounts respectively. The buyer is unable to erase or pre-empt this two-sided, debit/credit-based transaction from the network’s pending pool until it either enters a block for confirmation or is discarded with respect to both sender and receiver ends. If the buyer tries to double-spend the coffee funds after receiving the coffee but before they clear, the double-spend transaction will not propagate the network since nodes cannot propagate a double-spending transaction thanks to the debit/credit nature of the transaction. A UTXO-based transaction is initially one-sided before confirmation and therefore is more exposed to one-sided malicious schemes of double spending.”
Phew, that explanation was technical but it had to be done. In summary, PascalCoin possesses the only secure 0-confirmation transactions in the cryptocurrency industry, and it goes without saying that this means PascalCoin is extremely fast. In fact, PascalCoin is capable of 72,000 TPS even prior to any additional extensive optimizations down the road. In other words, PascalCoin is as instant as it gets and gives Nano a run for its money.
Part #3: Zero Fee
Let’s circle back to our discussion of PascalCoin’s 0-confirmation capability. Here’s a little fun magical twist to PascalCoin’s 0-confirmation magic: 0-confirmation transactions are zero-fee. As in you don’t pay a single cent in fee for each 0-confirmation! There is just a tiny downside: if you create a second transaction in a 5-minute block window then you’d need to pay a minimal fee. Imagine using Nano but with a significantly stronger anti-DDOS protection for spam! But there shouldn’t be any complaint as this fee would amount to 0.0001 Pascal or $0.00002 based on the current price of a Pascal at the time of this writing.
So, how come the fee for blazingly fast transactions is nonexistent? This is where the magic of the SafeBox arises in three ways:
(1) PascalCoin possesses the secure 0-confirmation feature as discussed above that enables this speed.
(2) There is no fee bidding competition of transaction priority typical in UTXO cryptocurrencies since, once again, PascalCoin operates on secure 0-confirmations.
(3) There is no fee incentive needed to run full nodes on behalf of the network’s security beyond the consensus rewards.
Part #4: Blockchain Size
Let’s expand more on the third point above, using Ethereum as an example. Since Ethereum’s launch in 2015, its full blockchain size is currently around 2 TB, give or take, but let’s just say its blockchain size is 100 GB for now to avoid offending the Ethereum elitists who insist there are different types of full nodes that are lighter. Whoever runs Ethereum’s full nodes would expect storage fees on top of the typical consensus fees as it takes significant resources to shoulder Ethereum’s full blockchain size and in turn secure the network. What if I told you that PascalCoin’s full blockchain size will never exceed few GBs after thousands of years? That is just what the SafeBox enables PascalCoin to do so. It is estimated that by 2072, PascalCoin’s full nodes will only be 6 GB which is low enough not to warrant any fee incentives for hosting full nodes. Remember, the SafeBox is an ultra-light cryptographic data structure that is cryptographically equivalent to a blockchain with the entire transaction history. In other words, the SafeBox is a compact spreadsheet of all account balances that functions as PascalCoin’s full node!
Not only does the SafeBox’s infinitesimal memory size helps to reduce transaction fees by phasing out any storage fees, but it also paves the way for true decentralization. It would be trivial for every PascalCoin user to opt a full node in the form of a wallet. This is extreme decentralization at its finest since the majority of users of other cryptocurrencies ditch full nodes due to their burdensome sizes. It is naïve to believe that storage costs would reduce enough to the point where hosting full nodes are trivial. Take a look at the following chart outlining the trend of storage cost.

* https://www.backblaze.com/blog/hard-drive-cost-per-gigabyte/
As we can see, storage costs continue to decrease but the descent is slowing down as is the norm with technological improvements. In the meantime, blockchain sizes of other cryptocurrencies are increasing linearly or, in the case of smart contract engines like Ethereum, parabolically. Imagine a cryptocurrency smart contract engine like Ethereum garnering worldwide adoption; how do you think Ethereum’s size would look like in the far future based on the following chart?


https://i.redd.it/k57nimdjmo621.png

Ethereum’s future blockchain size is not looking pretty in terms of sustainable security. Sharding is not a fix for this issue since there still needs to be full nodes but that is a different topic for another time.
It is astonishing that the cryptocurrency community as a whole has passively accepted this forever-expanding-blockchain-size problem as an inescapable fate.
PascalCoin is the only cryptocurrency that has fully escaped the death vortex of forever expanding blockchain size. Its blockchain size wouldn’t exceed 10 GB even after many hundreds of years of worldwide adoption. Ethereum’s blockchain size after hundreds of years of worldwide adoption would make fine comedy.
Part #5: Simple, Short, and Ordinal Addresses
Remember how the SafeBox works by snapshotting all account balances? As it turns out, the account address system is almost as cool as the SafeBox itself.
Imagine yourself in this situation: on a very hot and sunny day, you’re wandering down the street across from your house and ran into a lemonade stand – the old-fashioned kind without any QR code or credit card terminal. The kid across you is selling a lemonade cup for 1 Pascal with a poster outlining the payment address as 5471-55. You flip out your phone and click “Send” with 1 Pascal to the address 5471-55; viola, exactly one second later you’re drinking your lemonade without paying a cent for the transaction fee!
The last thing one wants to do is to figure out how to copy/paste to, say, the following address 1BoatSLRHtKNngkdXEeobR76b53LETtpyT on the spot wouldn’t it? Gone are the obnoxiously long addresses that plague all cryptocurrencies. The days of those unreadable addresses will be long gone – it has to be if blockchain is to innovate itself for the general public. EOS has a similar feature for readable addresses but in a very limited manner in comparison, and nicknames attached to addresses in GUIs don’t count since blockchain-wide compatibility wouldn’t hold.
Not only does PascalCoin has the neat feature of having addresses (called PASAs) that amount to up to 6 or 7 digits, but PascalCoin can also incorporate in-protocol address naming as opposed to GUI address nicknames. Suppose I want to order something from Amazon using Pascal; I simply search the word “Amazon” then the corresponding account number shows up. Pretty neat, right?
The astute reader may gather that PascalCoin’s address system makes it necessary to commoditize addresses, and he/she would be correct. Some view this as a weakness; part #10 later in this segment addresses this incorrect perception.
Part #6: Privacy
As if the above wasn’t enough, here’s another secret that PascalCoin has: it is a full-blown privacy coin. It uses two separate foundations to achieve comprehensive anonymity: in-protocol mixer for transfer amounts and zn-SNARKs for private balances. The former has been implemented and the latter is on the roadmap. Both the 0-confirmation transaction and the negligible transaction fee would make PascalCoin the most scalable privacy coin of any other cryptocurrencies pending the zk-SNARKs implementation.
Part #7: Smart Contracts
Next, PascalCoin will take smart contracts to the next level with a layer-2 overlay consensus system that pioneers sidechains and other smart contract implementations.
In formal terms, this layer-2 architecture will facilitate the transfer of data between PASAs which in turn allows clean enveloping of layer-2 protocols inside layer-1 much in the same way that HTTP lives inside TCP.
To summarize:
· The layer-2 consensus method is separate from the layer-1 Proof-of-Work. This layer-2 consensus method is independent and flexible. A sidechain – based on a single encompassing PASA – could apply Proof-of-Stake (POS), Delegated Proof-of-Stake (DPOS), or Directed Acyclic Graph (DAG) as the consensus system of its choice.
· Such a layer-2 smart contract platform can be written in any languages.
· Layer-2 sidechains will also provide very strong anonymity since funds are all pooled and keys are not used to unlock them.
· This layer-2 architecture is ingenious in which the computation is separate from layer-2 consensus, in effect removing any bottleneck.
· Horizontal scaling exists in this paradigm as there is no interdependence between smart contracts and states are not managed by slow sidechains.
· Speed and scalability are fully independent of PascalCoin.
One would be able to run the entire global financial system on PascalCoin’s infinitely scalable smart contract platform and it would still scale infinitely. In fact, this layer-2 architecture would be exponentially faster than Ethereum even after its sharding is implemented.
All this is the main focus of PascalCoin’s upcoming version 5 in 2019. A whitepaper add-on for this major upgrade will be released in early 2019.
Part #8: RandomHash Algorithm
Surely there must be some tradeoffs to PascalCoin’s impressive capabilities, you might be asking yourself. One might bring up the fact that PascalCoin’s layer-1 is based on Proof-of-Work and is thus susceptible to mining centralization. This would be a fallacy as PascalCoin has pioneered the very first true ASIC, GPU, and dual-mining resistant algorithm known as RandomHash that obliterates anything that is not CPU based and gives all the power back to solo miners.
Here is the official description of RandomHash:
“RandomHash is a high-level cryptographic hash algorithm that combines other well-known hash primitives in a highly serial manner. The distinguishing feature is that calculations for a nonce are dependent on partial calculations of other nonces, selected at random. This allows a serial hasher (CPU) to re-use these partial calculations in subsequent mining saving 50% or more of the work-load. Parallel hashers (GPU) cannot benefit from this optimization since the optimal nonce-set cannot be pre-calculated as it is determined on-the-fly. As a result, parallel hashers (GPU) are required to perform the full workload for every nonce. Also, the algorithm results in 10x memory bloat for a parallel implementation. In addition to its serial nature, it is branch-heavy and recursive making in optimal for CPU-only mining.”
One might be understandably skeptical of any Proof-of-Work algorithm that solves ASIC and GPU centralization once for all because there have been countless proposals being thrown around for various algorithms since the dawn of Bitcoin. Is RandomHash truly the ASIC & GPU killer that it claims to be?
Herman Schoenfeld, the inventor behind RandomHash, described his algorithm in the following:
“RandomHash offers endless ASIC-design breaking surface due to its use of recursion, hash algo selection, memory hardness and random number generation.
For example, changing how round hash selection is made and/or random number generator algo and/or checksum algo and/or their sequencing will totally break an ASIC design. Conceptually if you can significantly change the structure of the output assembly whilst keeping the high-level algorithm as invariant as possible, the ASIC design will necessarily require proportional restructuring. This results from the fact that ASIC designs mirror the ASM of the algorithm rather than the algorithm itself.”
Polyminer1 (pseudonym), one of the members of the PascalCoin core team who developed RHMiner (official software for mining RandomHash), claimed as follows:
“The design of RandomHash is, to my experience, a genuine innovation. I’ve been 30 years in the field. I’ve rarely been surprised by anything. RandomHash was one of my rare surprises. It’s elegant, simple, and achieves resistance in all fronts.”
PascalCoin may have been the first party to achieve the race of what could possibly be described as the “God algorithm” for Proof-of-Work cryptocurrencies. Look no further than one of Monero’s core developers since 2015, Howard Chu. In September 2018, Howard declared that he has found a solution, called RandomJS, to permanently keep ASICs off the network without repetitive algorithm changes. This solution actually closely mirrors RandomHash’s algorithm. Discussing about his algorithm, Howard asserted that “RandomJS is coming at the problem from a direction that nobody else is.”
Link to Howard Chu’s article on RandomJS:
https://www.coindesk.com/one-musicians-creative-solution-to-drive-asics-off-monero
Yet when Herman was asked about Howard’s approach, he responded:
“Yes, looks like it may work although using Javascript was a bit much. They should’ve just used an assembly subset and generated random ASM programs. In a way, RandomHash does this with its repeated use of random mem-transforms during expansion phase.”
In the end, PascalCoin may have successfully implemented the most revolutionary Proof-of-Work algorithm, one that eclipses Howard’s burgeoning vision, to date that almost nobody knows about. To learn more about RandomHash, refer to the following resources:
RandomHash whitepaper:
https://www.pascalcoin.org/storage/whitepapers/RandomHash_Whitepaper.pdf
Technical proposal for RandomHash:
https://github.com/PascalCoin/PascalCoin/blob/mastePIP/PIP-0009.md
Someone might claim that PascalCoin still suffers from mining centralization after RandomHash, and this is somewhat misleading as will be explained in part #10.
Part #9: Fair Distribution and Governance
Not only does PascalCoin rest on superior technology, but it also has its roots in the correct philosophy of decentralized distribution and governance. There was no ICO or pre-mine, and the developer fund exists as a percentage of mining rewards as voted by the community. This developer fund is 100% governed by a decentralized autonomous organization – currently facilitated by the PascalCoin Foundation – that will eventually be transformed into an autonomous smart contract platform. Not only is the developer fund voted upon by the community, but PascalCoin’s development roadmap is also voted upon the community via the Protocol Improvement Proposals (PIPs).
This decentralized governance also serves an important benefit as a powerful deterrent to unseemly fork wars that befall many cryptocurrencies.
Part #10: Common Misconceptions of PascalCoin
“The branding is terrible”
PascalCoin is currently working very hard on its image and is preparing for several branding and marketing initiatives in the short term. For example, two of the core developers of the PascalCoin recently interviewed with the Fox Business Network. A YouTube replay of this interview will be heavily promoted.
Some people object to the name PascalCoin. First, it’s worth noting that PascalCoin is the name of the project while Pascal is the name of the underlying currency. Secondly, Google and YouTube received excessive criticisms back then in the beginning with their name choices. Look at where those companies are nowadays – surely a somewhat similar situation faces PascalCoin until the name’s familiarity percolates into the public.
“The wallet GUI is terrible”
As the team is run by a small yet extremely dedicated developers, multiple priorities can be challenging to juggle. The lack of funding through an ICO or a pre-mine also makes it challenging to accelerate development. The top priority of the core developers is to continue developing full-time on the groundbreaking technology that PascalCoin offers. In the meantime, an updated and user-friendly wallet GUI has been worked upon for some time and will be released in due time. Rome wasn’t built in one day.
“One would need to purchase a PASA in the first place”
This is a complicated topic since PASAs need to be commoditized by the SafeBox’s design, meaning that PASAs cannot be obtained at no charge to prevent systematic abuse. This raises two seemingly valid concerns:
· As a chicken and egg problem, how would one purchase a PASA using Pascal in the first place if one cannot obtain Pascal without a PASA?
· How would the price of PASAs stay low and affordable in the face of significant demand?
With regards to the chicken and egg problem, there are many ways – some finished and some unfinished – to obtain your first PASA as explained on the “Get Started” page on the PascalCoin website:
https://www.pascalcoin.org/get_started
More importantly, however, is the fact that there are few methods that can get your first PASA for free. The team will also release another method soon in which you could obtain your first PASA for free via a single SMS message. This would probably become by far the simplest and the easiest way to obtain your first PASA for free. There will be more new ways to easily obtain your first PASA for free down the road.
What about ensuring the PASA market at large remains inexpensive and affordable following your first (and probably free) PASA acquisition? This would be achieved in two ways:
· Decentralized governance of the PASA economics per the explanation in the FAQ section on the bottom of the PascalCoin website (https://www.pascalcoin.org/)
· Unlimited and free pseudo-PASAs based on layer-2 in the next version release.
“PascalCoin is still centralized after the release of RandomHash”
Did the implementation of RandomHash from version 4 live up to its promise?
The official goals of RandomHash were as follow:
(1) Implement a GPU & ASIC resistant hash algorithm
(2) Eliminate dual mining
The two goals above were achieved by every possible measure.
Yet a mining pool, Nanopool, was able to regain its hash majority after a significant but a temporary dip.
The official conclusion is that, from a probabilistic viewpoint, solo miners are more profitable than pool miners. However, pool mining is enticing for solo miners who 1) have limited hardware as it ensures a steady income instead of highly profitable but probabilistic income via solo mining, and 2) who prefer convenient software and/or GUI.
What is the next step, then? While the barrier of entry for solo miners has successfully been put down, additional work needs to be done. The PascalCoin team and the community are earnestly investigating additional steps to improve mining decentralization with respect to pool mining specifically to add on top of RandomHash’s successful elimination of GPU, ASIC, and dual-mining dominance.
It is likely that the PascalCoin community will promote the following two initiatives in the near future:
(1) Establish a community-driven, nonprofit mining pool with attractive incentives.
(2) Optimize RHMiner, PascalCoin’s official solo mining software, for performance upgrades.
A single pool dominance is likely short lived once more options emerge for individual CPU miners who want to avoid solo mining for whatever reason(s).
Let us use Bitcoin as an example. Bitcoin mining is dominated by ASICs and mining pools but no single pool is – at the time of this writing – even close on obtaining the hash majority. With CPU solo mining being a feasible option in conjunction with ASIC and GPU mining eradication with RandomHash, the future hash rate distribution of PascalCoin would be far more promising than Bitcoin’s hash rate distribution.
PascalCoin is the Unicorn Cryptocurrency
If you’ve read this far, let’s cut straight to the point: PascalCoin IS the unicorn cryptocurrency.
It is worth noting that PascalCoin is still a young cryptocurrency as it was launched at the end of 2016. This means that many features are still work in progress such as zn-SNARKs, smart contracts, and pool decentralization to name few. However, it appears that all of the unicorn criteria are within PascalCoin’s reach once PascalCoin’s technical roadmap is mostly completed.
Based on this expository on PascalCoin’s technology, there is every reason to believe that PascalCoin is the unicorn cryptocurrency. PascalCoin also solves two fundamental blockchain problems beyond the unicorn criteria that were previously considered unsolvable: blockchain size and simple address system. The SafeBox pushes PascalCoin to the forefront of cryptocurrency zeitgeist since it is a superior solution compared to UTXO, Directed Acyclic Graph (DAG), Block Lattice, Tangle, and any other blockchain innovations.


THE UNICORN

Author: Tyler Swob
submitted by Kosass to CryptoCurrency [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to C_S_T [link] [comments]

Anonymous payments

Hello, I am having trouble paying for a certain service anonymously. Not just from my significant others, but from my bank and the retailer, especially the retailer. So, the retailer: Does not accept bitcoin, prepaid cards, or gift cards, only credit or debit cards. B. Does accept paypal, but only cards from paypal, not paypal cash or prepaid cards linked to paypal. I do have a credit card, but want to remain as anonymous as possible. Is it possible? And if it is, can anyone help me? I don't mind paying extra for anonymous services like mask card services.
submitted by AntiqueBiscotti8 to personalfinance [link] [comments]

Basics for how to do carding

Basics for how to do carding
Points we will go through:
- What is carding? - What are the factors relates to carding? - How it’s done - the process itself. - Precautionary measures Carder should take.
Overview:
Nowadays, if we see the credit card fraud trend, it is being increased day by day and new techniques being discovered to hack the credit card info and use it for malicious purpose so it's a good growing business.
As everything goes cashless, the use of a credit card will be necessary for everyone.
There are so many ways to get the credit card details available on the internet through Darknet sites as well as on TOR sites (Data Leak .etc.).
As we can see on social media sites and groups, most of the carders provide the offers which are collected from Online Sites, offline stores etc. and groups for your reference:
Be aware that you should never contact a ripper. A Ripper is a fraud who takes the money and never deliver the product.
Bad ways are: Facebook and WhatsApp groups
Let’s start with the basics.

Introduction to Carding and Key Points:

There are multiple definitions available per different views.
Carding itself is defined as the illegal use of the card (Credit/Debit) by unauthorized people (carder) to buy a product.
1.1 Key points in carding method.
2. Let start to understand each point one by one.
2.1 Computer (PC):
For doing carding always use a computer. I know some methods using a mobile device, but it is less secure and involves more risk.
2.2 SOCKS:
SOCKS stands for SOCKet Secure. It is internet protocol which allows client and server traffic pass through a proxy server, so real IP is getting hidden and proxy IP get reflected.
This is useful while carding because carder wants to use the credit card holder’s location while doing it.
Users can buy SOCKS.
2.3 Mac Address Changer and crypting:
MAC stands for Media Access Control. It is the unique address of every Network Interface Card (NIC).
A MAC address changer allows you to change the MAC address of NIC instantly. It is required to be anonymous and safe.
Sure the best way is to have your computer encrypted - find some software to encrypt the PC. E.x. Best Crypt. Do not forget to fully turn off the PC while moving somewhere.
2.4 CCleaner:
It is very useful tool help in cleaning your browsing history, cookies, temp files, etc.
Many people ignore this part and get caught, so be careful and don’t forget to use it.
2.5 RDP (Remote Desktop Protocol):
RDP allows one computer to connect to another computer within the network. It is protocol developed by Microsoft.
Basically, carders use it to connect to computers of the geolocation of the person whose credit card carder want to use. It is used for safety and stay anon. Here carders using others’ PC for doing carding instead of their own.
2.6 DROP:
DROP is an address which the carder uses for the shipping address in the carding process.
Let me explain in details with an example:
If I am carding with US credit card, then I use USA address as shipping address then my order will be shipped successfully, and I will be safe. If you have relatives/friends, then no problem, otherwise use sites who provide drop services only we have to pay extra for shipping it.
2.7 credit card (Credit Card):
This part is very much important so read it carefully. Any credit card it is in the following format:
| credit card Number | Exp Date | CVV2 code | Name on the Card | Address | City | State | Country | Zip code | Phone number (sometimes not included depending on where you get your credit card from)|
e.g.: (randomly taken numbedetails)
| 4305873969346315 | 05 | 2018 | 591 | UNITED STATES | John Mechanic | 201
Stone Wayne Lane | Easternton | MA | 01949 |

Types of Credit Card:

Every Credit card company starts their credit card number with a unique number to identify individually like shown below
American Express (AMEX Card) – 3
Visa Card – 4
Master Card – 5
Discover (Disco) – 6
Company wise credit card details:

Visa

Classic: The Card is used worldwide in any locations designated by Visa, including ATMs, real and virtual Stores, and shops offering goods and services by mail and telephone.
Gold – This card has a higher limit capacity. Most used card and adopted worldwide.
Platinum – Card is having limits over $10,000.
Signature – No preset spending limit – great bin to get
Infinite – Most prestigious card with having virtually no limit. There is less in circulation so be alert when buying these. Use only with reputable sellers!
Business – it can be used for small to medium sized businesses, usually has a limit.
Corporate – it can be used with medium to large size businesses, having more limit than a Business card.
Black – It has limited membership. It has no limit only having $500 annual fee, high-end card.

MasterCard

Standard – it is same as classic visa card.
Gold – it is same as visa gold card.
Platinum – it is same as visa platinum card
World – it has a very high limit.
World Elite – it is virtually no limit, high-end card.

Amex Card

Gold – it usually has around a 10k limit.
Platinum- is usually has a higher limit (around 35k).
Centurion – it has a High limit (75k+). It is also known as the black card, note: do not confuse with visa black card.
Now we can start with some of the questionnaire and Basic concepts before start practical process of Carding.
Q1. What is BIN?
It is known as Bank Identification Number (BIN). It is a 6-digit number e.g.: 431408.
Some of the reference sites which give BIN info which I also refer:
www.bins.pro
www.binlists.com
www.exactbins.com
Simply go to the site (www.bins.pro) enter BIN number and click on find to get the details. I have added first 4 digits only.
You can filter out the option as per requirement shown below
We got most of the information from the site. Now the question is how to know the balance of CC. is it possible? and answer is Yes, I will let you know step by step using normal as well as Skype method J
Q2. What is the meaning of VBV, NON VBV and MSC?
VBV (Verified by Visa) – Extra level protection is added by Visa to protect the Card from fraud.
Like DOB, password, Social Security Number and Mother’s name, etc. also sending OTP (one-time password) as extra security level to card owner mobile number to validate the transaction.
NON VBV (Verified by Visa) –Handy to use. No need extra information as specified in VBV card while doing the transaction.
Note it down (IMP)- Carders mainly buy and use NON VBV cards for carding.
MSC (MasterCard Secure Code) – security level same as VBV card.
Q3. What is AVS?
It stands for Address Verification System
It is the system which is used to identify the credit card holder original address with billing address provided by the user while shopping or online transaction.
The system is used to identify the online fraud over the internet.
Q4. How to check credit card is live or dead?
There are many sites available on the internet to verify credit card is live or dead, but they charge for it approx. $0.001 (price may vary). Also, 80% websites kill the credit card so never use it.
There are tools also available on the internet to check the credit card status, but most of them are a backdoor or Trojan so prefer not to use it.
As such there is no easy method to check it. Carder uses own ways to find it out. One of the ways is…
Most carder go to Porn sites, buy a membership and confirm the credit card is live and proceed with carding.
Q5. How to check the credit card is live or dead? (Skype Method)
(Note: method is posted on March 16)
Login into Skype account and call on Magic number +18005xx5633 (masked). You will connect to voice mail (lady’s voice). Start by entering the credit card number, and voice mail lady will stop automatically.
After that enter Expiry date of a card like 01 16 (mm: yy format).
If your credit card is live then voice mail lady will speak like “Thank you for calling, we really appreciate your business, since u are a 1st-time caller we would like to connect you .. blah blah” then just hang the call.
But if the credit card is used and voice mail lady speak like “Ohh I’m sorry please re-enter your credit card number now” then the card is dead. You can repeat the same process as many time you want.
Note: You need a good internet connection for Skype calls.
Q6. What is Bill=ship/Bill=CC/Ship=your Address?
Kindly pay attention here as it is also the main portion in carding process. Any mistake will cancel the order and id get blocked.
BILL=SHIP (Billing address: Shipping address)
Take a scenario of normal online shopping scenario, when you are doing carding you will use billing address and shipping address are same. Means in both u will use your address. No need to use credit card address.
Bill=Shipping address, Ship=your address
When you are doing carding, you will use credit card holder address as your billing address, and shipping address will be your address. Most sites use this method. Now we cleared basic concepts and start with the actual process of carding. Setup SOCKS proxy in Firefox:
Follow the steps: open Firefox, go to options, advanced options, network
A pop-up will come. It will show options
No proxy 2. Auto Detect 3. Use system proxy 4. Manual proxy configuration
Select manual proxy configuration. Enter socks host: <> and port: <> e.g.: 141.141.141.141: 8080. Press ok and restart Firefox. Now you are connected to secure Socks5 J
Ethical Hacking Training – Resources (InfoSec)
Note: when you buy a socks always match with credit card holder address. If credit card holder is from California, USA then try to get SOCKS5 at least matching state, country J
Guys now time to start the Carding process. Kindly follow the steps:
Create the email id matching with credit card holder name. If his name is John Cena ( the random name was taken), then email id should be [email protected] or near about.
Now Run RDP and connect to the credit card holder location system to proceed. If you didn’t have RDP, then follow following steps.
Open MAC changer and change the address randomly.
Run CCleaner and clean all the unwanted data (cookies/history/temp data etc.).
Setup SOCKS5 proxy in Firefox. <>.
Be sure to use SOCK5 is matching to the location of credit card holder and be aware not to use blacklisted IP. Check with www.check2ip.com
Open the site for shopping. I want to recommend a website shop from your country because you don`t need to wait a lot for your package.
Register with credit card holder information (John Cena), name, country, city, address, and email.
Shop and choose your item and add to cart. Precaution: Select item not more than $500 at first step.
In shipping address add your address or drop address where the product is going to deliver.
Then go to the payment page and choose payment method like a credit card.
Enter all details of credit card manually because most of site having copy paste detector script.
Finally, in billing address add credit card owner address info and then proceed with the payment process.
If everything all right then the order will get successfully placed.
Once the order arrives at the shipping address, receive it from delivery boy. (Few carder arrange fake id if delivery boy ask for proof).
Carding method using mobile:
Extra pro carder uses mobile for doing carding. If you followed steps carefully, you would also do that.
Basic requirement:
Require rooted Android mobile.
Install few application require for carding (proxy apps, CCleaner, IMEI changer, Photo and Android ID changer).
You can use any VPN for carding I recommend HMA or Zen mate.
You can use SOCKS5 proxy with proxy droid apps.
Also, proceed with IMEI and Android ID changer and do it.
Now connect with proxy droid with SOCKS5 proxy and connect it.
Now follow all the steps explained above.
Reference:
CC and dumps shop to buy www.antigreedy.com
Buy SOCKS
Download CCleaner
Download MAC address
Download SOCKS
Acronyms: BIN: Bank Identification Number CC: Credit Card CCN: Credit Card Number CVV/CVV2: Credit Verification Value (Card Security Code) SSN: Social Security Number MMN: Mother Maiden Name DOB: Date Of Birth COB: Change of Billing VBV: Verified by Visa MCSC: MasterCard Secure Code POS: Point of Sale VPN: Virtual Private Network BTC: Bitcoin
Personal Advice:
Be safe and have fun, get money.

*Telegram @AntiGreedy
*ICQ 743526859
*Jabber [antigreedy_[email protected]](mailto:[email protected])
* www.antigreedy.com
* antigreedy.bazar
*TOR - antig4vt6kvg7am6.onion
submitted by antigreedy to u/antigreedy [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracy [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracyundone [link] [comments]

Proposal for a new method of anonymous/untraceable communications using a global network of asterisk boxes

Hey guys, I figured this would be an excellent place to post some questions and hopefully be spared the snark that some of the other subreddits love to throw around. 
I've written up a proposal that essentially creates a Tor-like network using Asterisk boxes located around the world as nodes for routing communications anonymously. I'm sure many of you have used Tor or are at least familiar with how it works.
Do you think something like this could be accomplished? I've only played with Asterisk when I was learning VXML 7-8 years ago and haven't really touched it since then. 
Would any of you be interested in reading my proposal and giving me your advice/laughing at me and telling me I'm a stupid noob/or even telling me if what I'm talking about is even possible using Asterisk. I would really appreciate any input from professionals who use Asterisk in their daily lives. I want to use asterisk specifically because it's free, runs on linux, and requires little to no extra hardware. It would be much easier to set up a global network of asterisk routing nodes than it would be to physically rent space somewhere and fly to that country and set up a legitimate pbx.
I'll give a very rough outline of what I'm talking about below and if it piques your interest, feel free to ask questions or ask me to elaborate on certain points. Thanks in advance for any and all responses, even the ones that tell me I'm a crazy wing nut. :) The basic set up would involve a global network of Asterisk boxes hosted all over the world in several different countries, that would route phone calls to other Asterisk boxes in other locations before eventually completing the call. This is similar to the way Tor routes traffic through several intermediary nodes before reaching an exit node and delivering the requested content. Alice calls up the first Asterisk box and she is prompted for a number she wishes to call. That box automatically transfers that call, forwarding it around the world from asterisk node, to asterisk node, until finally passing the call on to the intended recipient. In this setup only the first node will know both the number of the person placing the call and the number of the person being called. From there, the call would be transferred around the network of nodes, until finally the last node connects the caller with the callee without revealing the number of the person placing the call. All this will happen seamlessly and without any user interaction beyond telling the system the number to call. On the other end, the callee would receive a call from an unfamiliar number or even just 000-000-0000, the number of the asterisk node. At no time will the callers number be forwarded between nodes to the person being called. No box would log any information about the call that wasn’t absolutely necessary and all logs would be destroyed once the call was connected at the other end so that even if an individual box was compromised, or confiscated by a government agency, there would be no call or text records stored on the machine. Machines would be transient and redundant so the network could not easily be taken down without taking down the entire network at the same time. 
The local phone service, and by extension, the 3 letter federal agencies would only have a record of the initial call placed to the Asterisk box, but would be unable to tell who ultimately you were actually calling. On the other end, the only record the phone company would have is that the callee received a call from an asterisk PBX. No identifying information about who placed the call would exist.
Perhaps the VoIP provider could see the full information regarding who called who and when. This problem could be solved by using multiple different VoIP providers in several different countries and making sure that during the mixing process the call was passed between at least two different VoIP providers. I've done some research and found some rather shady VoIP providers out there already. The idea isn’t to make it 100% IMPOSSIBLE to obtain these phone records, as much as it’s to make it excessively difficult to obtain as to make it simply not worth it. The US Government has the ability to unmask TOR users but in most cases it is so prohibitively expensive as to make it not worth their time/effort/money. We will aim for the exact same goal. This system has the benefit over using voice chat over TOR in that you do not rely on evil exit nodes run by random strangers with unknown motives. This system would also have much lower latency issues than you have making voice or video calls over the TOR network. The goal of this system is not to provide an encrypted communications channel, the main goal here is to anonymize and mask telephone traffic as best as is possible with current technology. 
I've got other ideas in mind for how to encrypt said calls but that is beyond the scope of this post.
My goal is to create a communications channel that journalists, activists, leakers, people coordinating uprisings (the middle east, Ukraine, etc.), and other people living under oppressive regimes who cannot communicate freely without the threat of being executed or jailed for their beliefs. This would even take care of the issue of "metadata" collection by governments as all the metadata would show is that Alice called a PBX and that Bob got a call from a PBX. I also do not want to use Tor or any other supposedly "encrypted calling/video chat" application for a few reasons. The first reason being that any software you install on your device is a new attack vector should a shady government office or hacker want to see what you're up to. They could simply find an 0-day vulnerability in the software you're using to make the call and you're done. Also, in a system where you have to install a specific program to use the service, you have to be on a smart phone or a computer. In the system outlined above you could make calls from a landline, a pay phone, a computer, or a cell phone. All of the anonymization is handled on our end. Before you ask- yes I realize this service wouldn't be free and my vision, eventually would be to charge users like journalists, hackers, and people who just worry about their privacy, to use the service and pay in untraceable/hard to trace currency like bitcoin, prepaid debit cards, etc. As well as grants from various privacy aligned/oriented groups. The idea being that once the service is paid fois paying for itself, I could offer the service to oppressed peoples, rebel groups, etc free of charge. 
Perhaps someone here could tell me what sort of up-front costs I'm looking at just to get the network up and running. I've got SysAdmin experience but I've never tried to do anything of this scale or importance.
The absolute last thing I want to create is a network for drug dealers to conduct business freely but that is just a fact of doing business when your business is protecting people from oppressive/tyrannical governments. Criminals will find it just as useful as dissidents, there's no way around that. So come on guys, tear it apart, tell me why this is a ridiculous idea and why I should give up now and go get a job at McDonalds. Anyone who would rather chat over email can feel free to email [email protected] if you prefer to communicate using PGP I can handle that as well. 
Thanks in advance guys, I look forward to your opinions/suggestions/insults.
I've tried to think of "everything" but I wrote this in about 15 minutes when my eyes had been open for about 2 minutes, as if this idea came to me in a dream 0.o
submitted by scottscurvy to Asterisk [link] [comments]

A New Method For Anonymous/Untraceable Telephone Communication/Text Messaging Using A Global Network Of Asterisk Boxes. Avoid Metadata Collection And Prevent The Government From Graphing Your Social Network Based On Who You Call

I know that there is a large cross over between Anarchist culture and Hacker culture so I figured I would post this here and get some opinions on a project I'm currently trying to get off the ground. My basic questions are- Would you use it? What would it take for you to trust that it's not just some government plot to spy on you? Would you pay for such a service? If so, what is the service worth to you? Do you already use anonymizing/identity protecting services? If so, which ones? Tor? PGP? What would you look fowhat would you see as the ultimate anonymizing service to protect your identity from the government?
If you can, please take a minute to read my proposal and let me know what you think. If you're a hackedevelopephreak/etc I'm especially interested in hearing from you. Thanks.
My proposal is this:
The basic set up would involve a global network of Asterisk boxes hosted all over the world in several different countries, that would route phone calls to other Asterisk boxes in other locations before eventually completing the call. This is similar to the way Tor routes traffic through several intermediary nodes before reaching an exit node and delivering the requested content. Alice calls up the first Asterisk box and she is prompted for a number she wishes to call. That box automatically transfers that call, forwarding it around the world from asterisk node, to asterisk node, until finally passing the call on to the intended recipient. In this setup only the first node will know both the number of the person placing the call and the number of the person being called. From there, the call would be transferred around the network of nodes, until finally the last node connects the caller with the callee without revealing the number of the person placing the call. All this will happen seamlessly and without any user interaction beyond telling the system the number to call. On the other end, the callee would receive a call from an unfamiliar number or even just 000-000-0000, the number of the asterisk node. At no time will the callers number be forwarded between nodes to the person being called. No box would log any information about the call that wasn’t absolutely necessary and all logs would be destroyed once the call was connected at the other end so that even if an individual box was compromised, or confiscated by a government agency, there would be no call or text records stored on the machine. Machines would be transient and redundant so the network could not easily be taken down without taking down the entire network at the same time. The local phone service, and by extension, the 3 letter federal agencies would only have a record of the initial call placed to the Asterisk box, but would be unable to tell who ultimately you were actually calling. On the other end, the only record the phone company would have is that the callee received a call from an asterisk PBX. No identifying information about who placed the call would exist. 
Perhaps the VoIP provider could see the full information regarding who called who and when. This problem could be solved by using multiple different VoIP providers in several different countries and making sure that during the mixing process the call was passed between at least two different VoIP providers. I've done some research and found some rather shady VoIP providers out there already. The idea isn’t to make it 100% IMPOSSIBLE to obtain these phone records, as much as it’s to make it excessively difficult to obtain as to make it simply not worth it. The US Government has the ability to unmask TOR users but in most cases it is so prohibitively expensive as to make it not worth their time/effort/money. We will aim for the exact same goal. This system has the benefit over using voice chat over TOR in that you do not rely on evil exit nodes run by random strangers with unknown motives. This system would also have much lower latency issues than you have making voice or video calls over the TOR network.
The goal of this system is not to provide an encrypted communications channel, the main goal here is to anonymize and mask telephone traffic as best as is possible with current technology. 
I've got other ideas in mind for how to encrypt said calls involving hardware that would allow you to do real time voice encryption using any device, including a land line, and wouldn't require you to install any extra software on your computephone that could act ask vectors for attacking your device or your privacy.
My goal is to create a communications channel that journalists, activists, leakers, people coordinating uprisings (the middle east, Ukraine, etc.), and other people living under oppressive regimes who cannot communicate freely without the threat of being executed or jailed for their beliefs. This would even take care of the issue of "metadata" collection by governments as all the metadata would show is that Alice called a PBX and that Bob got a call from a PBX. I also do not want to use Tor or any other supposedly "encrypted calling/video chat" application for a few reasons. The first reason being that any software you install on your device is a new attack vector should a shady government office or hacker want to see what you're up to. They could simply find an 0-day vulnerability in the software you're using to make the call and you're done. Also, in a system where you have to install a specific program to use the service, you have to be on a smart phone or a computer. In the system outlined above you could make calls from a landline, a pay phone, a computer, or a cell phone. All of the anonymization is handled on our end. Other than those two reasons- TOR IS BROKEN. We all know Tor is monitored heavily by the feds and it's not even that hard for them to do. Tor by its very design is flawed in that it allows anyone to run an exit node and anyone running an exit node can view all traffic, unencrypted, going through the Tor network. This to me is a glaring security weakness. Plus using Tor for voice or video chat is just so fucking slow. The latency involved would make it practically impossible to carry on a conversation. 
Before you ask- yes I realize this service wouldn't be free and my vision, eventually would be to charge users like journalists, hackers, and people who just worry about their privacy, to use the service and pay in untraceable/hard to trace currency like bitcoin, prepaid debit cards, etc. As well as grants from various privacy aligned/oriented groups. The idea being that once the service is paid fois paying for itself, I could offer the service to activists, oppressed peoples, rebel groups, etc free of charge. People whose lives and freedom depend on being able to communicate away from prying eyes. With my system you would be able to communicate with anyone in the world, and know 100% that no record of that call exists, including "metadata."
So come on guys, tear it apart, tell me why this is a ridiculous idea and why I should give up now and go get a job at McDonalds. Anyone who would rather chat over email can feel free to email [email protected] if you prefer to communicate using PGP I can handle that as well. Thanks in advance guys, I look forward to your opinions/suggestions/insults. I've tried to think of "everything" but I wrote this in about 15 minutes when my eyes had been open for about 2 minutes, as if this idea came to me in a dream 0.o
submitted by scottscurvy to Anarchism [link] [comments]

buy bitcoin with credit card anonymously 10 Bitcoin Debit Cards 2018 Buy Bitcoin Anonymously Easy & Fast With Your Debit Card ... Bitcoin Debit Cards (new) 2018 How to Open a Bitcoin Wallet & Use Bitcoin Debit Cards  Mike Dennis

The purpose is to mask your credit card details in the event there’s a data breach. Your real credit card details aren’t revealed during these transactions, which provides an extra barrier of protection. This is similar to the virtual debit card services we talked about previously. The temporary number is linked to your credit card and pulls money from your account when you use it. Then ... Use a Prepaid Debit Card. If cash or other alternative payment methods don’t work for you, then why not use a prepaid debit card? These rarely need your personal details to buy, and you can use them to buy Bitcoin, safe in the knowledge that it cannot get tied to you. You still need to be careful around exchange KYC verification, but this should give you another option in your anonymous ... Best Bitcoin Card – a Crypto Currency Debit Card Comparison. Bitcoin is the internet of money – and with a Bitcoin Debit Card, you can pay anywhere on this planet where Credit- or Debit Cards are accepted with the Crypto best anonymous bitcoin wallet review Currency of your choice. size of neverfull pm Prepaid cards are an amazing way to mask your digital transactions. Simply go to your local financial service provider or mart and buy a prepaid debit card with some cash. Its now ready to be used ... Bitcoin transactions are recorded on a public ledger. Anyone who traces a public address can know the origin and/or destination. There is no protocol-level procedure to anonymize these bitcoins, which is why a Bitcoin mixer is required to hide identity.. Bitcoin mixing is a process that tries to break the linkability or traceability.

[index] [45560] [17120] [13284] [5421] [40031] [28321] [13367] [16155] [30720] [16661]

buy bitcoin with credit card anonymously

4 (secret) ways to buy BTC Bitcoin with debit / credit card your bank won't notice - Duration: 18:32. Osu Limitless 88,949 views #Bitcoin #PrepaidCard #VirtualCard httsp://www.equicex.io. 1918 influenza pandemic survivor interview: Mrs. Edna Register Boone - Duration: 11:01. Alabama Department of Archives & History ... If you are looking to Buy Bitcoin Anonymously With Your Debit Card, Credit Card and even gift cards such as Amazon gift cards on paxful, itunes gift cards on... Withdraw your funds anonymously and securely at any ATM worldwide. Learn about anonymous cash. SHOP ANONYMOUSLY You can use your bitcoin debit card to buy goods and services online anonymously ... In this video I show you how to open a bitcoin wallet and explain how you can utilise bitcoin by using a growing number of bitcoin debit cards . This is one of a string of videos that I am making ...

#