How a Bitcoin Trail Led to a Massive Dark Web Child-Porn ...

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 1/2)

Source | Guestbook
Note: Some answers were repetitive, but were not edited out.
Questions Answers
Have you ever gotten into legal trouble by exploring the dark places of the internet? Like, "sorry, officer, I was only surfing drug markets and child molester forums for my next journalism piece..." Do you worry about that? Do you have to take extra steps to protect yourself? I'm very careful not to go anywhere that it is illegal to visit. You will hear loads of stories about how easy it is to "stumble upon" child porn, but the fact is that those sites usually have names like "Preteen cuties" so you know exactly what they are, and in order to access them you have to register. So you have to make a very deliberate choice to log into them. I have no interest whatsoever in viewing any child abuse material, so I don't go into those places. When I was researching The Darkest Web, I went to the discussion forums that didn't allow any images (though they did link to sites that did), and even there I turned off images.
As for the drugs, weapons etc, there is nothing illegal about surfing them and looking around.
I do get a bit nervous every time I visit the US, especially when I was invited to a "friendly" lunch with Homeland Security once (it was reasonably friendly as it turns out, it was also terrifying)
the below is a reply to the above
Why did homeland security want to talk to you? They said it was about the murder-for-hire stuff, but some of the questions leaned toward something else
Is there anything that really concerns you about the dark web? Some of the things already discussed are beyond barbaric and that is only the stuff that has been found out about and been picked up by the media and your fantastic work. Do you think the public should expect worse and more horrific revelations from the dark web or is it just "more of the same" for lack of a better term and do you think the authorities are getting better in shutting this inhumanity down and catching the people responsible? I am definitely not against people taking back their online privacy and I actually think that buying drugs from the darknet markets is a safer and more sensible option than buying them from the dodgy dealer down the road. However the one thing that is really disturbing is that the dark web has provided a place for child predators to find each other and form communities where they support and egg each other on. Imagine a few years ago, someone who was into hurtcore could never tell anyone else and would be unlikely to ever come across another person with the same perversions. Now it is as simple as finding the relevant site on the dark web. When there are suddenly hundreds of people who all think and act in the same way, it normlalizes what they are doing.
One of the guys who got caught, Matthew Falder, was a sadist who used to crowdsource "ideas" for torturing the children and teens he was blackmailing into doing heinous things for him online. But apparently he was a "normal" intelligent popular guy
the below is a reply to the above
But how does everyone participate in those illegal sites without getting caught? You said in other comments that you tried to stay away from underaged sites because they were illegal. Can't they be tracked down, even with tor and a vpn? The thing that I don't understand is that even on the dark web people say you should stay away from illegal sites, but how are pedos not getting caught? they are getting caught, but the way they are getting caught is through painstaking detective work, looking for clues in photos, befriending them online and getting them to reveal things about themselves (what is known as social engineering). It takes a long time and many resources.
I say don't go there because (a) it is illegal and (b) you really shouldn't want to go there
Iirc you attended the trial of the person behind the horrific hurt core website that was exposed a few years back. I was wondering if there was anything in particular that happened during the trial that particularly shocked or horrified you that isn't really public knowledge or talked about? Reactions from the judge or perpetrator during the trial etc. As I remember it the guy was a fairly young loner who lived with his parents but would probably never have been expected to be behind the horrific vile things which he was found to be. Also, how did you get into investigative journalism/writing? I wrote in one of the other replies above about the little mute girl that has stayed with me. Also, at the insistence of the prosecution, the judge had to watch "Daisy's Destruction" which was a video of torture of a toddler. He put it off for two days and when he came back he was white. He didn't have the sound on, which is considered the worst part, but he still looked shell-shocked. I don't envy him.
I'll cut'n'paste re your last question: I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
the below is a reply to the above
Thanks for the reply.. that really must've been horrific for all involved from investigation to trial and for all of the victims (apart from the scum responsible of course). I guess it would be naive to assume that the end of this site did anything other than drive this depraved community even further underground. That is the part which is really scary to me but I suppose all we can do is have faith that the authorities are always close on the tail. Thank you for your work on reporting on this and raising this stuff more into the public consciousness and making people more aware of what kind of evil still lurks. It was the most disturbing two days of my life, made all the worse because they read out hours of interactions from the site where the children still had not been identified or the predators caught.
Hurt2theCore was not the last site of its kind and there are still hurtcore sites to this day on the dark web. The one hopeful thing is that there are international task forces that seem to work together really well (unlike when it comes to drugs and every law enforcement agency wants to take the lead and they all withhold info from each other). There are a lot of resources allocated to identifying predators and their victims. Sometimes this has involved some very controversial tactics, such as taking over the sites and letting them run, so that they can use social engineering techniques to identify those who are using the sites and who are actually abusing children
the below is another reply to the original answer
So daisy's destruction is real? Was it referred to by that name court? I always thought it was a myth Yes, Daisy's Destruction is real, it was referred to by name in court and the judge had to watch the 12 minutes of it that were hosted on Hurt2theCore.
The "myth" part is that it shows a murder. The toddler, Daisy, lived, though she suffered such horrific injuries she will never be able to bear children. Hopefully she was young enough that she will grow up without the memory.
However, Scully did murder at least one child, whose body was found under the floorboards of his house. it is not known whether he filmed her murder as no video evidence of it has come to light.
the below is a reply to the above
Thanks for answering. I actually watched a really good video on Hurt2theCore on youtube once, I think it was by a guy called Nexpo. It was really detailed and informative about the whole case - I forgot those details. Thanks again for replying, this AMA is really informative! I think I recall that one, it was from a few years ago.
An excellent podcast that came out recently is "Hunting Warhead", highly recommend a listen. It is a tough listen, but exceptionally well-told and respectfully handled
How do you detach yourself from your work? I'm an investigator for a law firm and I've had a lot of difficult working on wrongful death cases recently. Also, how did you first end up getting published? Any tips for people interested in that field? Thanks! I don't detach. When I was researching hurtcore, it was harrowing and affected me deeply. Writing that part of the book was a very slow process because I just couldn't be in that headspace for very long at a time. Once the book was written I didn't go back there.
I already had a reputation as a blogger and a freelance journalist when i pitched my book on Silk Road. I got an agent and it was auctioned off, with Pan MacMillan getting the rights. At the time, Silk Road was still going strong, and the book I wrote was about this new frontier of drug dealing that was changing the world. I was writing it "from the inside" as I had been an active part of the community for two years. However, right as I submitted the final manuscript to my publisher, Silk Road was busted and Ross Ulbricht arrested, so i had to quickly change the narrative to a "Rise and Fall" thing!
How many times have you approached law enforcement with information and how many times has the approach resulted in action? and... are there times where you know something nefarious is happening but history and the evidence at hand tells you it's not worth the effort? There is no point in approaching law enforcement to say "I have come across this site". If I've found it, you can guarantee law enforcement has found it as well.
The only time I've approached law enforcement was when I had information that they did not, which was when a friendly hacker provided me with a back door into the Besa Mafia murder-for-hire site. I got to see all the messages and orders etc. Of course LE knew about the site, but they did not have the details of the people who had hits taken out on them. We tried desperately to tell police in several countries that real people had paid real money to have other real people killed, but they just weren't interested. We sounded like crazy people talking about dark web hitmen, who were scams anyway and nobody was dead, so why should they be interested? They became much more engaged when one of the people WE HAD PREVIOUSLY TOLD THEM ABOUT later turned up dead
the below is a reply to the above
By law enforcement, do you mean only local or else the big agencies? I feel like I wouldn't tell my local police department because they wouldn't really know what to do. It would have to the the bigger agencies. FBI in US. NCA in UK. AFP in Australia. Nobody was very interested, although the FBI did visit at least one of the targets to let her know she was a target. She still wound up dead
What are some of the most prevalent uses of the dark web that AREN'T all shady and nefarious? We might be getting into semantics here, but people use Tor, which is the most possible darknet that is used to access the dark web, just for private browsing and ensuring that commercial interests aren't following them everywhere to bombard them with ads for some thing they looked up.
Some of the news organizations have a dark web presence so that whistleblowers can upload information safely. Even the CIA has a site on the dark web so that people can anonymously tip off matters of national security.
Other than that, there are just forums, where you don't have to worry that every single stupid thing you post will be saved in posterity forever, to be trotted out years later when you run for congress or something
After everything you've seen, does anything surprise you anymore or are you just numb to it at this point? Do you think there should be more education/exposure about the dark web than there is now or would that just be counter-productive as people would just find another place to hide? I'm curious to hear any favourite stories about the Psychonauts. I am not numb and I hope I never become numb. I really don't visit the horrible dark places very often, unless I'm researching something specific, and even then I don't look at pictures or videos. Most of the crime is pretty benign - I'm not fazed by people wanting a safer way to buy drugs.
I think there needs to be ongoing discussions about online activity and its misuse in general, but most crime still happens on the clearnet. The dark web is not nearly as large or prevalent as people fear.
For a long time, a dealer provided free LSD to anyone who wanted it for personal use (ie not sale) and to any organizations who were doing psychedelic therapy.
One psychonaut got busted and spent time in prison... only he still had bitcoin in a wallet and by the time he was released he was a millionaire. He would have just spent it on drugs otherwise :)
I know law enforcement has to delve into the predator side of the dark web. With what you've seen do you think it should be mandatory or an industry standard that law enforcement officials seek professional help? I couldn't imagine investigating that daily and not thinking less of humanity at some point. I'm pretty sure they do. I worked for Legal Aid for a while, and i know there were pretty strict rules in place for the lawyers who had to defend child abusers.
When I was at the trial for Lux, owner of Hurt2theCore, I met a cop whose job it was to watch all the videos and befriend the predators in an attempt to get them to slip up and reveal something of themselves. She said she had a little filing cabinet in her brain where she put all that stuff, and that making an arrest made it all worthwhile. She had made several arrests personally. She was a sex offender's worst nightmare :)
What’s one of your personal favorite investigations and what made it unique for you? By far the Besa Mafia murder-for-hire case. What made it unique was that, first, I was provided a back door into the Besa Mafia site by a friendly hacker, so i had information that nobody else had. But then I became "friends" for want of a better word with the owner of the site, Yura. Besa Mafia, of course, was not killing anyone, but Yura made a LOT of money scamming would-be murderers out of their money. We entered into a weird relationship over the years where i would report on his activities and he would try every trick under the sun to stop me from doing so, so that he could keep scamming people. He even offered me a job, helping him, because he had become so busy. He also provided me with names and details of people who had hits taken out on them so I could pass them on to law enforcement.
It all became horribly real when one of the people who had a hit put out of them wound up dead. It wasn't Yura of course, but the guy had paid him $13K before giving up on the site and doing it himself. The thing was WE HAD TOLD THE FBI about the hit and the $13K and they visited the victim, but then put it into the too-hard basket when she couldn't think who might have paid that much to kill her.
the below is a reply to the above
Wow. That’s actually pretty cool. Reminds me of an old saying. “Keep your friends close, but your enemies closer.” It's a seriously bizarre relationship. When I was hired as a consultant by CBS for a 48 Hours expose on dark web hitmen, he actually agreed to meet me in London. But he thought that CBS was going to advertise his site as the real deal and he got excited and sent them details of two people who had hits put out on them. CBS sent them straight to the police and very shortly after two arrests were made and it was all over the news, where they called his site a scam. Yura got so pissed about it, he never turned up to our meeting. They had even hired an Academy Award-nominated master of disguise makeup artist to disguise him!
are "red rooms" actually a prevalent thing, or just a widespread misconception or rumor? I ask in part because it's very easy to see, for instance, Mexican cartels dismembering people alive, etc, just on the clearnet. Hell, a couple days ago I saw a video posted of a cartel member cutting out a dude's heart while the guy was alive, and he ATE it. He fucking ATE it. So it seems plausible... The most popular myth of all is Red Rooms, where people – usually women – are tortured to death live on camera while those who have paid to watch type in torture commands in a chat box. Think the movie Hostel, with webcams. In this sense these have never been proven to exist. I get where you are coming from with the cartels, and the recent news item where they found those shipping containers set up with torture rooms freaked me out and made me wonder!
There is some truth to this rumour, but the execution is not like you see in the movies. Most notably, because it involves children, not adults abused on demand for paying pedophiles, but not to the point of death
the below is a reply to the above
The news about those shipping containers really made me speculate, since for every one person who gets caught doing something evil, there must be at least several more people who are very honed in their 'profession' doing the same evil deeds and worse, yet who evade being captured for decades. Anyway, based on morbid things I've seen, karma comes around eventually... I know, right? It really freaked me out, and then when I read that they already had intended victims for them but the police got to them first and put them in protected custody.. IMAGINE SEEING THOSE PICTURES AND KNOWING YOU WERE SUPPOSED TO BE IN THEM!! I would retire to a deserted island somewhere
the below is a reply to the above
Your line of work could easily result in something like C-PTSD down the road a little ways. I have a morbid curiosity, and have seen worse than those shipping containers had to offer. I'm sure you have as well. So one more question from you, if you don't mind: what are some proactive approaches to mental health you take to safeguard your sanity? A lot of wine. Cuddle my dog
Hi, there! This has been fascinating to read; thank you so much for sharing! I'm curious: why do you think so many people who don't want to engage with disgusting and illegal content like hurtcore find it so interesting to read about? Do you have any insight into your readership and the ethics associated with reading about these kind of topics? I think morbid fascination with the dark is exceedingly common - just look at how many people can't get enough about serial killers! In some ways it is probably a self-defense mechanism - the vast majority of true-crime readers are women. People like to be armed with knowledge. We also like to be spooked and scared.
As for my books, I don't really go into much gory detail, but the horror still shines through
Out of all 9-5 jobs out there, why this? What’s your motive? I got disenchanted by being a lawyer and I had wanted to be an author since childhood. The lawyering put me in a strong enough financial position that I could quit to do a uni course for a couple of years. My plan was to become a best-selling novelist, but my first chick-lit novel was nothing special. However, during the course, I found I did really well at journalism and was soon making a living as a freelance journo before I finished the course. My first major feature was on the Silk Road drugs market, which I had discovered thanks to a friend who was using it. Once I got in there I became fascinated by everything about it and started contacting the owner, users, vendors etc asking for stories (I was upfront about who I was). I began the first serious dark web blog - allthingsvice.com - and also became the go-to freelancer for Australian dark web stories. Then I pitched my first book and got a healthy advance for it.
I like working for myself, working from home and delving into things. Right now I have my dream job (though it wouldn't hurt to pay a bit more. I'm certainly not making anywhere near what I used to make lawyering, but I make enough to get by and I live pretty simply)
Did you ever do any writing on Brian Farrell and his role in Silk Road 2.0? I was Brian's cellmate for all of 2017 at Sheridan Federal Prison and heard all of his crazy stories. Was just curious as to the validity of them all. DoctorClu! I did write briefly about him in Silk Road, but it wasn't all positive. I remember being frustrated by the shitshow that was Silk Road 2.0 in the beginning, right after SR1 shut and when DPR2 took off and Defcon got all dramatic. It settled down after a bit and lasted a year, when it was revealed THEY HAD A FUCKING UNDERCOVER HOMELAND SECURITY OFFICER ON STAFF THE WHOLE TIME. But yeah, anyhow, they are probably true. I'd love to hear them :)
Was there ever something on the dark web that made you surprised ( in a good way) and smile ? So many things. Back in the day of the original Silk Road, I became obsessed with the forums, the people behind it, the intelligent discourse about the War on Drugs and philosophy. I found it amusing that drug dealers ran sales and giveaways. There were book clubs and movie clubs.
One of the most important people from that era was Dr Fernando Cauevilla, who became a member of Silk Road as "DoctorX". He was a real doctor who provided genuine, free, non-judgmental advice about drug use to the members of the site. It was quite an amazing time.
the below is a reply to the above
Did Ulbricht get taken down the way we were told in the news? What happened to all the Bitcoins? His arrest went down the way we were told in the news. How they located the server has never been disclosed (other than a fanciful explanation that NOBODY could believe). This explanation may be tested if Variety Jones runs a Fourth Amendment argument at his trial
The bitcoin in the wallet on Ross' computer was auctioned off by the Feds. He may have other bitcoin wallets stashed somewhere but nobody knows
the below is another reply to the original answer
Book/movie clubs on the silk road? Yeah, they would set reading and then everyone would come back and discuss the book, or they would have a time when everyone watched the same movie at the same time and chatted about it in real time
the below is a reply to the above
Haha that's amazing! I don't suppose you remember any of the books in question? They used to be a lot of philosophy books, especially on agorism. A Lodging of Wayfaring Men was one of the books. I remember V for Vendetta on a movie night
You don't seem to be pushing your most recent project and you're actually answering all the questions people ask, so I've got ask...are you some sort of government plant meant to destabilize reddit? This isn't how AMAs are supposed to work. You come in, you half ass a few questions, hawk whatever you're here to hawk, and then leave after 20 minutes. That's how it's done. lol I'm a genuine redditor from way back, and I love talking about the stuff I do. I did find that after I answered a question in an AskReddit thread a while back that blew up, the sales followed. But that was organic and I don't think you can force it to happen - Reddit can spot that a mile awy
What are some of the best things about the dark web? And can anyone get on it? Things you can buy that you can’t buy normally online? I really enjoy some of the forums, especially the psychonaut forums where people who like to trip on psychedelics get together and talk drugs and philosophy. There's a real "be kind to one another" vibe.
Getting on the dark web is easy, but not getting scammed when buying things takes a lot of homework. Yes, you can buy most things, but the most popular things are drugs and digital goods, i.e. things that depend on repeat custom and are easily transferable from seller to buyer
the below is a reply to the question
[deleted] You're doing the Good Work my man. I'd give you one of those awards if i knew how
What would you define the word "Safe" when it come to the internet (both www and dark web) world and are there any tips that I should follow to keep myself safe? It really depends on what YOU mean by safe. Tor, which is the darknet that provides access to the dark web will keep you safe from prying eyes and surveillance.
If you mean keep your information safe, the old-fashioned advice is to never reuse your password and to enable 2-Factor authentication wherever you can. Your information is quite likely somewhere on the dark web thanks to high-profile hacks of major organizations, but provided you don't re-use usernames and passwords, you really don't have to worry too much about it.
If you mean keeping yourself and/or any kid safe from predators, the only thing is to ensure you are educated about the approaches and methods they use.
Has Covid affected the Dark Web in any real way? Also I just read through all of the post comments, what incredible story’s. I would totally buy a book about the Silk Road or Yaru! re covid on the dark web, here's some notes I made for an interview I did recently:
* when Trump first hyped hydroxychloroquine as a potential miracle cure for COVID-19, drug dealers on the dark web seized on the claim.
* Listings quickly popped up on the most popular darknet markets
* A vendor on Whitehouse Market sells 100 Pills for $90, calling it a “Miracle Drug For Coronavirus” and suggesting buyers purchase in bulk to sell at a mark-up locally.
* Another makes the dubious claim “This drug will help people to beat Corona Virus” There are 11 listings on Empire Market currently, although more than half are from the one seller, who is a well-known and trusted vendor on the site.
* There were also people claiming to be selling infected blood or plasma of recovered COVID victims
* The infected blood stuff is just bullshit IMO Just because something is listed doesn’t mean it is genuinely for sale
* There's been some claims to be selling vaccines
* At the beginning there were also loads of listings for PPE
* some just used it as a marketing tactic - “fight off the virus with edible cannabis” or “relax with Xanax” and others as an excuse to raise their prices
* However, sales are low compared to sales of other drugs on the site, so it is difficult to say whether it’s something that will really catch on
* It didn’t take long for complaints to come in and market owners to clamp down on anything claiming to be a miracle cure or vaccine
* users were discouraging other users from profiting off the pandemic and requested markets provide health and safety information
* All the major markets forbid anything being sold as a cure for COVID. They flagged keywords and vendors would be told to take any listings down. They also put out PSAs telling people not to buy
* Monopoly: threatened to ban and.. “You are about to ingest drugs from a stranger on the internet - under no circumstances should you trust any vendor that is using COVID-19 as a marketing tool to peddle already questionable goods”
* It was a business decision. They don’t want anything that will attract attention or that might cause desperate people who wouldn’t normally use the DNMs to find their way there
* The idea behind DNMs generally is educated and responsible drug use. They really don’t want people dying - bad publicity and no repeat custom
* However the dark web is rife with scammers and people willing to prey on the desperate so there are still scams out there
* The only way I could ever see it becoming a thing is if there is a well-known potential cure/vaccine that is not being made widely available and could plausibly find its way onto the black market
Hi Eileen :) My question is about how you construct your Casefile episodes - I assume there is an extensive amount of outlining but do you write the final draft like a script specifically thinking about his voice? And about how long are they as far as - for example - does one hour equal 50-60 pages? Thank you. I initially write them as if I'm writing an article or book, but then go back and edit them to be read out and yes, when I do that, I do have his voice in my head lol. One episode is usually around 12,000 words. It then goes to another editor who edits the episode to be even more "casefileaa' before it finally goes to Casey
Have you been exposed to things in your investigations that have made you second-guess what you do? If so, what has made you keep going back? i've definitely had days where I question everything, but to be honest, I don't really hang around the horrible really dark places much. I did delve into the child predator forums when I was writing The Darkest Web, but I don't make it a habit to go there. The psychonauts are much more friendly
the below is a reply to the above
To continue with that- have you clicked images, links that make you a suspect in certain scenarios? Oh absolutely. Sometimes I go to a "Fresh Onion" site, which is a site that crawls all the .onion addresses (dark web URLs end in .onion rather than .com, org etc) and alerts you to any new ones. Sometimes they don't have any description, so you take a big risk clicking on any of those. The most dangerous button on the dark web is the "Random Onion" button, so I avoid that.
I'm pretty careful about what I click, but the moment something looks questionable I nope the fuck right out of there
the below is a reply to the above
Have you ever felt that you may be a suspect whether it be ok a drug site, a pedo site, etc. Have you ever been contacted by someone regarding your surfing habits? Well my actual surfing habits are protected by Tor, which means they are hidden from prying eyes, so no I haven't been contacted about them. I am very open on the dark web about who I am and what I'm doing there - I use the name OzFreelancer on all of the markets and forums. I don't go to the sites that host child abuse images - you can't un-see that shit and I don't need it in my head.
As noted in another reply, I was contacted by Homeland Security on one of my visits to the US and taken for a "friendly" lunch.
the below is another reply to the original answer
Psychonauts are more friendly than most people. Something about regular mind altering experiences makes you want to be less of a cunt. Yeah, I call The Majestic Garden a little corner of sunshine and rainbows on the dark web :)
the below is a reply to the above
More about The Majestic Garden please? What is grown there? It's a place where people talk about and source psychedelics - most notably LSD, the 2C family, DMT and MDMA. Talk about and sourcing harder drugs is forbidden. In fact the admins snuck in an autocorrect so that any time someone wrote the word "cocaine" it would post as "a raging hardon" :D
Do you fear that seeing all this stuff might turn you emotionally blunt? I'm not watching any of this stuff on purpose (even the clearnet stuff), because I fear that the more you see of it, the more normal it gets, and ultimately, the more it will fuck you up. To quote the movie 8mm... "If you dance with the devil, the devil don't change. The devil changes you." No, I can't even watch "3 Guys 1 Hammer" in its entirety, let alone look at the really dark materials on the dark web. When I was researching The Darkest Web, going into the predator forums did the opposite of making me blunt. It was the shortest section of the book but took the longest to write because it was so emotionally draining
the below is a reply to the above
I have to ask, what is "3 Guys 1 Hammer"? It's a video of two teenagers murdering an innocent man with a hammer that went viral on the gore sites of the regular internet. It's truly horrible.
The teens killed over 20 people. I wrote about them in my book Psycho.com (excuse the plug)
I heard somewhere that you foster dogs. Is that something you do to counter all the terrible humans you encounter in your research - everyone knows how dogs are better than people. How many dogs have you fostered and which one was your favourite? After my dog died I knew I didn't want to have another dog as I wanted to travel more. So I thought fostering dogs would be the answer as you give them love for a few weeks and then they go to their forever home. My first foster, Roy, was a big fat failure and now he lives here and sleeps in our bed and is the most spoiled dog alive
the below is a reply to the above
Did you then just decide to quit travelling? I don't know anything about Roy, but I already think I love him. Nah, he has family he can stay with when I go away, but any major travelling has been thwarted by COVID for now anyway. I'm in a hard lockdown city.
And I'm sure Roy would love you too, u/suckmyhugedong
Given how much you know about the dark web, what kind of crazy awful nightmares have you had? This could be a really good one. Thank you Probably the worst thing was delving into the forums where child predators gathered. I never looked at any videos or photos, but just seeing their discussions sickened me. The one thing that keeps coming back to me came out of the sentencing hearing that I attended of Lux, owner of Hurt2theCore, considered the most heinous website in history. In court they read out a conversation between him and an abuser who made videos of torture of the mute disabled child in his care. They were joking "at least she won't be able to tell anyone" . the abuser wasn't caught, at least by that stage
As an indie author, how have you sourced freelancers? Did you seek out those that have specific expertise or did you work with editors from your time as a traditionally published author? I learned to do everything myself before I started outsourcing.
I work with a professional editor who happens to be a friend of mine from back when we did a writing course together. I've been doing my own covers, but now that I have some royalties coming in, I've engaged a professional cover artist from Reedsy to develop a brand and more professional-looking covers for me. It is the hardest thing to find people you really want to work with and who are in budget.
I still haven't got the hang of email lists, newsletters or a website - they are all in a total mess at the moment and I'd love to find someone who can do them, but again it is that problem of finding the right person who is within budget
is it true that most of the internet is in the "dark web"? if so about how much percent is it? By far the biggest myth is that it 10x larger than the Internet. I mean, this should be common sense anyway, but it gets propagated by tabloid media all the time. It stems a lot from people using the terms "deep web" and "dark web" interchangably when they are different things.
The statement that 90% (or thereabouts) of the internet is hidden is true, and it is called the deep web (not the dark web). The 90% that is hidden is all those pages you won’t get to using google or any other search engines. There’s nothing scary about that – in fact it works in your favour.
The easiest example is your bank. The bank’s major page is available to anyone who searches the web (part of the 10%, also known as the “clearweb”). But once you log in, all those pages you can access that contain your personal details? Not searchable on google. Each one of those pages is part of the 90% of the deep web. Business and government intranets also make up part of the deep web. Honestly, it’s nothing to worry about.
The dark web – the hidden services available through Tor and other anonymising programs – makes up a tiny fraction of the deep web. A really, really tiny fraction. It is infinitely smaller than the clearweb.
Do you think human trafficking happens on the dark web? Last year (I think) there was a really bizarre story here in the UK about a model who was supposedly kidnapped to order, drugged and transported overseas by a group called "Black Death". The official story is that BD doesn't exist, and the kidnapper was a fantasist. Is it likely that humans are bought and sold into slavery over the dark web? There are no slick websites with auctions for slaves on the dark web, but I have no doubt that human traffickers use dark web encryption to communicate.
(here comes the second plug for the thread) - I wrote about the kidnap of Chloe Ayling and the Black Death Group in Murder on the Dark Web
What ever happened to the plural of mongoose storyline? it seems like after he was arrested in the united states, his case just fizzled away. did you ever find out any more information about yuri after he cancelled the interview with a news program? what happened with peter scully's case? i read that there was a fire where a lot of evidence against him was held and it all went up in smoke. are there any character and/or personality storylines that you feel haven't been told or are still a complete mystery? eg. tony76 1. He is still in the MCC in NY and awaiting trial. It has taken a long time because he had terrabytes of information to go through and things would have slowed down due to covid. I understand he is running the Fouth Amendment argument that Ulbricht probably should have run in the first place
2. I last heard from Yura just a few weeks ago. He is still scamming. There are some more programs in the works about him
3. Yes there was a very convenient fire, but he still got sentenced to life and i hope he rots in hell
4. I am madly curious to know what is happening with the extradition of James Ellingson, aka “MarijuanaIsMyMuse”, aka "redandwhite", MAYBE aka Tony76. I would LOVE to know that full story!
the below is a reply to the above
Wow, this shit is a blast from the past. I used to love following the darknetmarket drama. Did you write about PoM and tony76 in one of your books? Ever since reddit shut down /darknetmarket I've been out of the loop. Yes, I wrote about them in The Darkest Web
I was in touch with PoM/Mongoose when he went on a posting rampage on MyPlanetGanja, then visited him in Bangkok prison several times. Wrote all about it :)
This may have been answered by a previous post pertaining to native language barriers to specific sites on the dark web, but in your investigations, did you come across content/pages/forums from warzones? Middle East, Burma, Afghanistan, etc? If yes, what was the most memorable bit? There are loads of sites in foreign languages, but it is too difficult for me (a one-language numpty) to attempt to translate through AI, and it is not worth hiring a translator when they could just turn out to be Cat Facts
submitted by 500scnds to tabled [link] [comments]

A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet

First, a bit of introduction before we get into the living drama that is Brian Krebs.
Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring.
In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him.
One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to.
And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.

Fly on the Wall

By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards.
However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places.
So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum.
While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site.
By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away.
Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things.
He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances.
More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses)
While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Fly ultimately was extradited. He plead guilty and was sentenced to 41 months in jail

vDOS and Mirai Break The Internet

Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers.
In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama.
The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect.
Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks.
This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years.
Now time for a couple quick side stories:
Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn
And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 1.3.3.7. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 1.3.3.7. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider.
Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site.
Back to the main tale!
So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai".
As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement.
By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf.
While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei.
Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
He did, however, correct Krebs on the name of B Gata H Kei.
Epilogue
Needless to say, the Mirai botnet crew was caught, but managed to avoid jailtime thanks to their cooperation with the government. That's not to say they went unpunished. Anna-senpai was sentenced to 6 months confinement, 2500 hours of community service, and they may have to pay up to $8.6 million in restitution for their attacks on Rutgers university.

Other Stories

I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
submitted by HereComesMyDingDong to internetdrama [link] [comments]

Log of AMA with Skycoin

boldninja Let's all give a warm welcome to @synth from SkyCoin.net and for taking the time to do this AMA
synth *hello
mike Hi Synth
jakethepanda Hey @synth
thrice.pi Hey synth
dr10 Hi
boldninja I think we can start - you guys know the drill. Give him some time to respond (no more than 2-3 questions on backlog so he can catch up)
dr10 How would you - shortly & in easy words - sum-up the advantages of SkyCoin to magazines and non-crypto people?
mgaruccio Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
michaelthecryptoguy Whassup @synth
tranzer hi synth. I have a question - are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC? What would you say is the 1 unique feature that Skycoin has?
synth It is very difficult, because Skycoin is a very large project and already has +6 years of development. Different parts of the project have different objectives.
The cryto, coin part is about solving the problems with the existing consensus algorithms. Being able to do +300 transactions a second, transactions in seconds instead of minutes (faster than credit cards), eliminating miners, eliminating block rewards (eliminating inflation) and eliminating 51% attack and the other problems with mining.
then there are other repos and experimental projects under github.com/skycoin such as a meshnet and distributed VPN prototype, where people will be paid coins for forwarding traffic. Also prototypes of distributed social media application, with peer to peer data replication and different experimental projects. Research into immutable data structures for next generation internet. Some of them are very radical.
dr10 How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
mgaruccio So how much exists today? Could I build an app on the platform if I wanted to?
mike In terms of the rate of progress, what is currently your greatest limiting factor - like funding, manpower, currently available technology?
synth
Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
It is not actually a meshnet. It is software defined networking, it is much more powerful than just meshnet. Its a new type of networking and new completely new protocol and networking namespace, independent of the existing internet.
It supports source routing, while the existing internet does hot potato routing, so never achieves optimal latencies.
It supports multi-homing, which IPv6 does not (Which is critical for when we have gigabit or terabit networking and multi-redundant bandwidth paths)
It has default oppurunistic crypto, both link layer and end to end; so everything is encrypted by default, unlike the current internet.
It has store and forward networking and will operate in Africa or even under conditions where latencies are in the minutes or hours and packet loss is excessive. Where existing protocols cannot operate reliability. It is much more robust than IPv4/IPv6 or TCP/ip
It has improved privacy. If a packet takes a route that is 10 hops, each hop only knows the previous node in the route and the next node in the route. It is not like IPv4 where each packet gives the source and destination. The privacy level is something that does not exist on the current internet.
IP addresses are replaced by public key and no one can read traffic to a destination, without knowing the private key of the public key that identifies the destination. The system does not need 3rd parties or certificate authorities. The design is a revolution.
are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC?
The coins are locked into 100 addresses, each with 1 million coins each. And they are released sequentially.
There is a complicated locking procedure and releasing new coins requires unamious consent and a shared secret among a group of developers. Anyone in the shared secret group can block distribution of more coins (to stop the problem that killed NXT). So by design the coins were supposed to be difficult to distribut, there had to be a good reason or justification before a distribution would be approved.
mike What are the hardware requirements to operate a wireless Skywire (the name for the protocol described above) Node?
arc-over-water nxt i think is doing ok..
synth
How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
PoS and PoW use miners. Miners receive new coins every block as a block reward. So miners are making money and will fight to control the network. An everyone will suffer because the newly created coins represent inflation.
Skycoin was designed to eliminate mining and eliminate the inflation. No block rewards, no new coins. And we needed to develop a new consensus algorithm to do that and there are only a few methods that work, for these constraints. The consensus algorithm is based upon Ben-Or's randomization procedure for achieving consensus in a distributed system, with some improvements for detecting adversarial or malicious nodes who are trying to prevent the consensus process.
There are white papers on skycoin.net about the specifics. I would call it "network consensus" and it uses a sort of Web of Trust (WoT), where if the people creating blocks are doing a bad job or attacking the network, then the community can get rid of them. At the same time, the people who control the network, do not have any real power to attack the network except by slowing down transactions and being annoying, so even if they become malicious the only issue is how to get rid of them and select new people.
mike Any idea when Skywire will be released and ready to test on hardware nodes (testnet or mainnet)?
mgaruccio So if there is no block reward what is the incentive to run a node?
vega What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
michaelthecryptoguy Do you have an idea on the specs of a node that would be required? In the beginning? What about with 10,000 users? (edited)
synth
nxt i think is doing ok..
There were three people that each owned 30% of the coin. One decided he wanted out and began dumping. NXT was over 150 million I think. When he started dumping, it basicly killed NXT.
Skycoin's distribution was designed to stop dumping by the founders and early people.
After Skycoin gets to 30% of the total coins distributed, there will probably a hard time lock on the remaining coins, so that a maximum of 5% of the remaining coins can be released per year. So the distribution for the other 70% of the coins will take a minimum of 14 years (and could be longer).
We cannot even sell the rest of the coins, because if we sold 10% of the total now at $5 per coin, it would be 50 million or something and we cannot spend or even use that amount of money. Not at this stage.
Ethereum spent 30 million or 70 million in their first year or two after the ICO and then nearly went bankrupt. Silicon Valley wages and offices etc. We have been very conservative and have kept costs down and kept them responsible. Now we have coins like EOS and they want to raise a billion dollars and have not produced anything yet, do not hav a blockchain and I have no idea what they would spend that money on, but they are throwing $350,000 parties in time square for marketing/PR etc...
arc-over-water what prevents you from selling? anybody can spend that amount of money?
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
synth
What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
Yes. Bitcoin has no purpose. An altcoin does two things - check your balance - send money to other people
Two features - check balance - send
For a coin to have value, people need to be forced to buy it to consume specific services. There has to be stuff for people to spend the coin on, that there is demand for.
So Bitcoin is really just a purely speculative asset. It generates no cashflow and its value is determined by perception or social convention.
Ideally, Skycoin would start off as a "better Bitcoin" (faster, more secure, new algorithm, simplier, etc), then over time we would build up an ecosystem and have some type of backing and tie the coin's value into the network and usebase.
The mesh netork (skywire) is good, because it gives something for people to do to get coins and it allows people to consume the coins. You can run your internet traffic through a VPN that tunnels over Skywire and maybe it will be a nominal amount (actually absurdly small amount of money), but there would be real economic activity and a real userbase and community using the coin. Not just speculation.
Later on the scope is much wider.
arc-over-water So the skycoin wallet will be a VPN for our internet usage?
synth
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
What I am saying, is that NXT would be a lot further along than it is now and probably around where Ethereum is, except for that mistake in the distribution and keeping it too concentrated. It set them back by years. They did not consider what the impact on the price would be, over the long term, when one of the early whales started selling off or decided he wanted out.
arc-over-water But they did the same again with IOTA, same lead dev.. Its over a $Billion
they released and let the market price distribute
synth
So the skycoin wallet will be a VPN for our internet usage?
The VPN is just one application, that uses bandwidth over Skywire. There are several things in development.
This is a BBS like 4chan, that is completely distributed, with CXO. https://github.com/skycoin/bbs
It will run over Skywire also, This is like building a whole new internet from scratch. The apps that run on it are going to specialized and privacy focused, etc GitHub skycoin/bbs Contribute to bbs development by creating an account on GitHub.
mike So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
arc-over-water so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
rockyj !calculate
slackbot Custom Response https://docs.google.com/spreadsheets/d/1FGo3FkC3uSWXGHatPQyny2brMWjAIJsHFCR-Lhkl_m0/edit#gid=0
synth
So if there is no block reward what is the incentive to run a node?
running a consensus node does not cost anything. You can run it on a raspberry pi.
The important thing is that if the people doing consensus are doing a bad job, that the community can get rid of them and replace them. The other important thing, is that they can be audited and determined automatically if they are obeying the protocol.
the miners in skycoin are not very powerful and cannot do anything except slow down transactions. They are unable to spend other people's money without their private keys, so the consensus/mining nodes are almost irrelevent. It is not like Bitcoin where the miners can hold the network hostage or act selfishly (driving up the transactions fees for their own personal benefit and delaying any innovations that would improve bitcoin for everyone, etc).
So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
We have decentralized storage, which is called CXO. But only the bandwidth is monetized by Skywire. We do not nickle and dime and try to attach a coin cost to every API call. Everything that should be free is free. So its a different philosphy.
On top of CXO we also have distributed social media applications (simmilar to Steemit)
CXO is very similar to IFPS, but simplier and designed for our internal infrastructure and with our crypto standards, instead of being a mismash.
mike Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network, in effect reducing their impact on consensus?
looks like you answered the question above while I was typing...
tranzer How many tx/s can skycoin handle? What are block times?
thrice.pi 300 right? ^
arc-over-water on your website it says you will have a NON- Turing complete lisp language?
synth
so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
We will have a distribution page, up on the website soon. Its complicated.
Skywire, is designed to pull coins out of circuation, through a sort of tithe on network activity and it does automatic buy backs effectively. So the distribution will actually peak and then decline. But one distribution is from the locked coins, and the locked coins are freed, then circulate, then end up at the foundation (from the skywire tithe are pulled out of circulation), but still count towards the free float.
The coin holders also receive a coinhour dividend and there will be a market rate conversion between coin hours and Skycoins and coinhours are the actual currency for the Skywire network. If you do not have enough coin hours, then you sell Skycoin for CoinHour at the market rate, to purchase bandwidth; but if you have a lot of coins then you have enough coin hours for downloading movies or VPN or whatever you are doing and it is essentially free.
So there is a dual level economic structure. Both with coin buybacks to pull coins out of circulation and with a dividend or incentive to encourage users to hold the coin if they are using the network.
arc-over-water so there will be two currencies, holding one reserves the other
synth
Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network
Yes. This is very important.
The person dialing a connection, chooses the path of the connection!
You can choose the lowest latency path for video games or Skype, and choose highest throughput paths for video downloads etc. Or can choose paths through specific nodes or facilities or countries, for security concerns and to minimize the number of points that the traffic could be intercepted at.
mike Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
dr10 When do you plan to be able to present your planned technology and services to the masses? When can they use what you try do accomplish?
synth
on your website it says you will have a NON- Turing complete lisp language?
That is probably an error. LOL. We will have a new website soon.
There is no scripting language on the skycoin blockchain. Each transaction is constant time (for efficiency and security and to achieve the highest transaction rate and to keep the coin simple).
However, we have a language called CX in development, which is a next generation language that is beyond "smart contracts" and the toy things on ethereum. It uses immutable datastructures and is something completely new. Most of the skycoin "smart contracts" will probably be off blockchain or in personal blockchains and we do not want to shove all the data onto the main chain, because forcing everyone to download everyone one elses contracts it the world is just spamming the blockchain to death. There are better ways to do it.
Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
Yes. We are going to get from 20% to 30% distributno of the coins, through network incentives for people running Skywire nodes, consensus nodes and services.
I think this is going to be massive for marketing. And it is the best way to get the coins out to the users, instead of all the coins being held by whales
samuelvihollandia I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
arc-over-water Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
synth
I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
No. This is just something easy, that we have working. Its not the largest applicatoin at all.
80% of internet traffic right now is bitorrent and the bitorrent sites are being systematically shutdown and driven off the internet. They wont go away, but will jut go underground. What.cd (largest music tracker, with 800k people) was just shut down, bakabt (largest anime tracker) has gone closed registration, Nyantorrent etc...
User communities of millions of people will be migrating from the clearnet (the existing corporate shit-net) to the "new internet". We are going to see people migrating by the millions, whole user communities of millions of people.
arc-over-water Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background? - Maidsafe is open and clear so is IOTA and Stellar etc. Can you let us know who you and your team are? Especially you are talking about 15 year and up obligations..
techbytes Do we need to hold skycoin to run Skywire nodes or consensus nodes like masternodes from other coins?
synth
Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
Maidsafe is in version 2 or 3. Maidsafe will not have a real coin until version 9. Each version takes them about two or three years. Maidsafe will not be "done" or ready for atleast 18 years at this rate.
Skycoin has been in development for ~6 years and the meshnet for 4 years and it will be finished in a few months. To the poin that people can start using it.
Skycoin is similar to maidsafe in the objective, but has a different approach and architecture and primitives. We did not try to do everything, but focused on a smaller, tractable core and got that done.
There will be multiple projects in this space, but few teams are able to plan on the time horizon necisary for building a new internet or able to design each of the components of a system this large, or figure out how to do it so that it is useful at each stage of construction of a project that may take a decade. (edited)
mike Can you see a way for Ark and Skycoin to build on each other in a synergistic manner? I'm all for not reinventing the wheel, especially when it looks like it will be replaced with antigravity like Skycoin.
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
arc-over-water are you up to date on Maidsafe, they are nearly out of Alpha and its more like release early next year? But that being said, Maidsafe says once it is released it is like a virus or AI type, so does Tau Chain, and also Autonomic by HunterMinerCrafter, are we heading towards AI with Maid, Sky Tau and Autonomic?
dr10 smartbridge now! :kappa:
mike So Skycoin would act as a sort of global decentralized cloud server to build on top of.
To communicate, it is more like sharing encrypted files to selected recipients than it is sending messages or hosting sites on a specific server.
synth
Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background?
I think there are over ~60 people who have worked on Skycoin or have made major contributions. Its really a project from the darknet.
Many of the contributors are anonymous. Some of them have security clearances and were in the military industrial complex and one of them worked at the San Diego Naval Defence Research Lab and a lot of the idea for the networking protocols came out of public sector academic researched, funded from there.
We also have a lot of very very early Bitcoin people, hardcore crypto people that predate Bitcoin and an Ethereum core developer, etc..
On the Chinese side we have an early investor in Alibaba and telecom investor. And are doing pilot with china aviation group (owns four publicly traded airline companies) and apparently now Sinopec (which is 2nd largest publicly traded corporation in world).
Then we have people who are part of israeli and US intelligence and are probably doing some sort of money laundering or phychological operations background, who just showed up for some reason. This group seems very interested in the "applications" of these coins and how to improve tranaction privacy and the specifics of the CoinJoin protocol implementation. We got a lot of advice from people experienced in forensic accounting and what they wanted to see and where they felt Bitcoin was deficient and where it leaked metadata.
Then a bunch of PHD level people doing research into distributed database consensus algorithms and another group doing programming language research.
Then a lot of people from the deep darknet, anon, frog twitter and cipher punks and bitorrent communities. (really should be listed as two seperate groups). And people from the Russian darknet community. We have like eight Ivans. (edited)
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
Yes. The key functionality is two things - connecting to people by public key (networking) - distributing self validating, immutble data peer to peer (transactions, blocks etc... content addressible storage)
And you can build almost anything on those two building blocks. The whole internet will eventually be rewritten on top of those primitives and it will replace many of the existing protocols.
arc-over-water Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
samuelvihollandia Are you planning to enter a different exchange market soon?
arc-over-water Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.. (edited)
thrice.pi with all these outside parties that helped to build skycoin and bring it where it is today who are the main core team who will help to keep all these cool features running. Will these outside parties be recruited for the long haul?
synth
Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
The people who funded the project for the first four years, were early bitcoin and deep crypto people; who were unhappy with the fact that Bitcoin and the other alts did not seem concerned about the core issues at all. They gave us over 1200 bitcoin I think, over several years and did not ask for anything in return.
The early Skycoin devs were doing academic research, architecture and new algorithms. Prototyping and simulation. The later stage people were more project managers and doing implementation.
We did four ICOs for small amounts, to fund development and to allow developers working on the project to buy in. The first ICO I remember was at $0.10 per coin and the price now is about $4.00 per coin, so its up ~35x or 40x, but when you consider the Bitcoin price going from $100 to $3000, the increase has not been so much. lol (edited)
arc-over-water With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
mike Would Intel Edison or Joule, or Samsung Artik 10 work well as a Skywire wireless node? They have 2 Gb-8 Gb RAM, 8-64 Gg eMMC storage, 802.11n wireless, bluetooth, and some with Zigbee?
synth
Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.
I think there wer three different groups that merged together in first three years, that had similar objectives. Because the code was in different language. There was python, C code and then eventually golang and the golang code became the basis for the current codebase.
The way the coin allocations work, is that it requires unamimious consent for releasing coins and it has to be for a specific, ear marked purpose and can be blocked by any of the devs.
Then there is a pool of coins in bitcoin for various project managers to allocate. And that is an operational fund for paying developers, contractors, marketing etc. Then different people have different responsibilities.
Then we also have corporate funding and sponsorship and some companies paying our full time devs etc, which helps a lot.
arc-over-water Silicon Valley (TV SHOW) recently had their decentralized web running on a network or refrigerators? So i would guess, smart phones, smart gadgets? Home gadgets etc could add services and receive rewards from Sky?
mike best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors. Even chip designers now don't really know what they're putting into the chips since they just drag and drop black boxes known as IP cores into the ASIC designs.
synth
With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
I think the Skycoin price has been doubling every 40 days, for as long as I can remember. However, it will still be years before it is in the top 20, its still a long way to climb. It took bitcoin years to go from 0 to $1, even though it was growing at 1% per day the whole time for six years.
best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors.
we are going to use arm
arc-over-water IOTA is also working on their own hardware for nodes etc, Trinary asset is JINN
synth all intel and AMD systems have remote management engine backdoors. So they are not safe for storing large amounts of coins.
We also have alpine linux and special version of linux, that is 6 MB and has everything that is needed for running our toolchain. It will not have any binary blobs in the kernel or anything that we cant compile from source. It does not have systemd and does not have gli, but uses musl. And does not have openssl.
mike so looks like the Samsung Artik 5 and 10 can run it no problem, they're ARM based. 25x35x4mm package for the Artik 10, Artik 5 is smaller, less powerful but has 2 separate antenna ports, nice for mesh networking with an omni and a directional antenna.
earlyarkinvestor how does Ark compare to Lisk?
synth uploaded this image: 1923810435.jpg Add Comment
earlyarkinvestor isn't Lisk trying to achieve interoperability between blockchains as well
synth uploaded this image: 1433594905.jpg Add Comment
synth uploaded this image: 1432540863.jpg Add Comment
synth uploaded this image: 2049465686.jpg Add Comment
mike nice! looks like an ARM based server rack
let me know if you need any help with it, see you're on solidworks, which I run as well.
synth this is the skycoin cluster; it has 8 CPU boards; 4 cores per CPU, 2 GB of ram per CPU and 64 bit ARM processor. Only one program will run on each individual board, so there is compartmentalization and a physical gap so that compromising one process on a system does no allow all other processes on the system to be compromised
mike looks like 2 ethernet ports per board.
synth and the hardware does not have the qualcom backdoors and is actually chinese equipment; and the backdoors are normally at the kernel level because they are not at hardware backdoors yet
lol
mike do they have SATA ports, maybe M.2 for storage?
synth and we will hav an ARM openwrt router eventually too
this model does not have SATA, but we have a model with SATA; you could hook up 16 2 TB drives, lol and download half the piratebay to your cluster (edited)
the skycoin infrastructure is cluster based and designed for running across +300 computers, with one "node" deployed per computer. Eithe a CXO storage node, or a skywire SDN/meshnet node, or a VPN end point node or a consensus network, or skycoin node, etc. We have multiple node/application types.
so this is a "personal cloud' by itself
its not like StoreJ where you have other people storing your stuff; you are going to have ~5 clusters and 300 computers and can store your own files, on your own internet, on your own hardware. You do not need to go outside of your own network.
mike Have thought it'd be nice to have a board with an array of M.2 sockets to run SSD arrays without all the cables, have the busses shielded in circuit board.
synth yes, i think there will be m.2 eventually
these actually use a microSSD for storage, and its 48MB/s
mike any idea on the pricing on your ARM boards in quantity? We are looking at Intel for Bitseed V3, but ARM would be good to stay with, especially using your boards if there is SATA.
arc-over-water Do you have a general idea of usable functions to be released next in what order? The first release was the Coin and wallet, then the ICOs and can you give a general future with dates if you can
synth the boards are $30 each and the memory for solid state, is actually more than the the cost of the CPU/RAM/board now. Which is sort of insane.
mike so you have microSSD, what's maximum size? we shipping 1with Tb hard drives right now
synth Bitseed mike is going to help with this; so we can pool the boards and do a custom PCB
mike yes, that's where we see the price jumps, is in RAM and eMMC costs.
and it's hard to find low cost boards with SATA
synth try the orange pi
the price goes up 30% for SATA
mike yes, very nice specs.
synth eventually, we will make one that has custom PCB and is a pluggable blade server, I think.
mike I like the Samsung Artiks for the tiny form factor for drone routers, cubesat/picosat possibilities.
but like the fact that you are controlling much deeper down the supply chain with your boards.
synth we only need ram, CPU, then microSD slot; and that is it. so the wifi and all this other stuff is just crap and its junk. We only have communication, storage and computation. So should be minimialist.
submitted by Jarunik to ArkEcosystem [link] [comments]

NB: Каталог onion сайтов

Русскоязычные ресурсы, или где есть ссылки на русскоязычные ресурсы в TOR.
Каталоги, wiki, поисковики:
http://hss3uro2hsxfogfq.onion/ Поисковик в сети TOR
http://zqktlwi4fecvo6ri.onion — HiddenWiki
http://dirnxxdraygbifgc.onion/ — Каталог онион сайтов
https://ahmia.fi/search/- домен в клирнете, но ищет в tor. По факту каталог с мордой поисковика
http://kpynyvym6xqi7wz2.onion/links.html— Сборник адресов сайтов, в том числе и онион. Много мертвого, но покопаться можно
Торговые площадки и сервисы:
https://blockchainbdgpzk.onion — Зеркало в онион известного онлайн биткоин-кошелька. Дает из под тора регистрировать кошелек и делать переводы. Есть миксер. Интерфейс русифицирован.
http://rusilkusru6f57uw.onion —Russian SilkRoad. Торговая площадка на базе форума.Работает без JavaScript. Для продавцов статус дилера бесплатный, ежемесячных платежей нет, комиссия по факту сделки(платит продавец или покупатель по договоренности). Есть автоматический прием платежей. Моментальные магазины есть.
http://r2d2akbw3jpt4zbf.onion —R2D2. Торговая площадка на базе форума. Раньше регистрация была по инвайтам. Для работы требует включенного в браузере JavaScript. Статус продавца платный + комиссия (платит продавец или покупатель по договоренности). Автоматического приема платежей нет. Моментальных магазинов нет.
http://amberoadychffmyw.onion —Amberoad. Торговая площадка на базе форума. Для работы частично требует включенного в браузере JavaScript. Для продавцов статус дилера платный + комиссия(платит продавец или покупатель по договоренности) + ежемесячные платежи. Автоматического приема платежей нет. Моментальных магазинов нет.
http://www.lwplxqzvmgu43uff.onion— Runion. До недавнего времени информационный ресурс по безопасности. Сейчас добавили платные услуги по торговле. Написано, что есть автоматическая торговля. Комиссию платит продавец или покупатель по договоренности.
http://malina2ihfyawiau.onion —Malina. Торговая площадка на базе форума. Для работы требует включенного в браузере JavaScript. Статус продавца платный + комиссия (платит продавец или покупатель по договоренности). Автоматического приема платежей нет. Моментальных магазинов нет.
Разное:
http://rospravovkdvaobr.onion —Росправосудие. Зеркало известного сайта в онионе.
http://ajyltarwd6xmvhlu.onion —Русский чат. Тематика не указана.
http://xz5sdhbwrm4vvkxh.onion —Киберберкут в онионе.
Englisn onion
Introduction points, forums, links, search engines, information, chat, personal blogs”normal sites”
The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
The Uncensored Hidden wiki http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page
Vault 43 (useful) http://vault43z5vxy3vn3.onion/
Imperial Library of TOR http://xfmro77i3lixucja.onion/
Yet another tor directory http://bdpuqvsqmphctrcs.onion/
Grams (search) http://grams7enufi7jmdl.onion/
The Hub (forum) http://thehub7dnl5nmcz5.onion/
Agora Forum http://lacbzxobeprssrfx.onion/
Onion soup (links n stuff) http://soupksx6vqh3ydda.onion/
TORUM (forum) http://torum4kqr55yqui6.onion/
Overchan (alittle of everything it seems) http://oniichanylo2tsi4.onion/
TORCH (search) http://xmh57jrzrnw6insl.onion/
French IRC Tor http://fitwebwmjekqsyrw.onion/
TORsearch http://kbhpodhnfxl3clb4.onion/
Yacy (search) http://yacy2tp5a2dhywmx.onion/
OnionDir (links) http://dirnxxdraygbifgc.onion/
Burnout (links) http://burnoutxf6o2yvsw.onion/
TOR Hidden Service (search) http://msydqstlz2kzerdg.onion/search/
Q&A(like yahoo answers) http://pequ3i77q5l4w4sw.onion/
Benji’s Blog http://sonntag6ej43fv2d.onion/en
Secret Stash (blog) http://dn4hcr3qhlpaiygr.onion/
Cruel Onion forum (forum for “bad* things) http://cruel2ijkqggizy5.onion/forum/
The Plague (links and things) http://zseijor556d5t4yf.onion/
Dark News (forum) http://xhb4vpn4a67sug7t.onion/
Spreadit (looks alittle like reddit) http://jdl3nf2hr3ehzyoc.onion/
Wizardry & Steamwork (search) http://kaarvixjxfdy2wv2.onion/
Myles Braithwaite http://gvvsa367g2zkzjj3.onion/
TOR links http://torlinkbgs6aabns.onion/
Nudist Paradise (site for nudists) http://qvchmzewlf4efhcw.onion/
DeepWeb Ministries (religios site) http://hxnibog5m2ocjeef.onion/
SIN Strategic INtelligence Network (be prepared for any situation) http://4iahqcjrtmxwofr6.onion/
Add any link (links) http://vizpz65utiopch7t.onion/
Shadow Life (news) http://shadow7jnzxjkvpz.onion/
Usenet file search http://wbyi72yt6gitdcqd.onion/
Liberty blog (free blogs) http://crylibertytwta4s.onion/
Intel Exchange (forum) http://rrcc5uuudhh4oz3c.onion/
GUROChan (message board) http://gurochanocizhuhg.onion/
Maxima Culpa (virtual confessions) http://nsmgu2mglfj7za6s.onion/
Onion DIR (links) http://chl7b5p6rr64po3s.onion/
Leonhard Weese (personal blog) http://liongrasr5uy5roo.onion/
YHIMA (links) http://ogbinmlotgjwgkeo.onion/
Sanctioned Suicide (forum) http://suicideocymrgxq7.onion/
anon confessions http://confessx3gx46lwg.onion/
OnionNet (links news etc) http://ubbchzof2pxs4swi.onion/
Surveilance Law http://7vrl523532rjjznj.onion/
BLue Onion (books) http://blue3237xytrz5rk.onion/blueonion/
The Hidden Forum http://ewd5a7hnvc4necnf.onion/index.php
SImple Store http://dharyyzdhok5eudi.onion/store/
Bad Ideas Forum http://7x5rg44gkhtovwjt.onion/forum/index.php
FUD (discussion board) http://bssjumzkbj3vlhiy.onion/
Hidden links http://hidhost5gk6w7ahf.onion/hidlinks/links.php
Facebook on tor? https://facebookcorewwwi.onion/
FBI Chan http://fbichanc6yfagl4l.onion/
Readers Club http://c3jemx2ube5v5zpg.onion/
Weblog http://6e3i6bqjgnmtn3fu.onion/
Marketplaces and stores
EasyCoin – Bitcoin Wallet with free Bitcoin Mixer. http://easycoinsayj7p5l.onion/
WeBuyBitcoins – Sell your Bitcoins for Cash, PP and more. http://jzn5w5pac26sqef4.onion/
OnionWallet – Anonymous Bitcoin Wallet and Bitcoin Laundry. http://ow24et3tetp6tvmk.onion/
EuCanna – ‘First Class Cannabis Healthcare’ http://rso4hutlefirefqp.onion/
Peoples Drug Store – The Darkweb’s Best Drug Supplier! http://newpdsuslmzqazvr.onion/
Smokeables – Finest Organic Cannabis shipped from the USA. http://smoker32pk4qt3mx.onion/
CannabisUK – UK Wholesale Cannabis Supplier. http://fzqnrlcvhkgbdwx5.onion/
DeDope – German Weed and Hash shop. (Bitcoin) http://kbvbh4kdddiha2ht.onion/
BitPharma – EU vendor for cocaine, speed, mdma, psychedelics. http://s5q54hfww56ov2xc.onion/
Brainmagic – Best psychedelics on the darknet. http://ll6lardicrvrljvq.onion/
NLGrowers – Coffee Shop grade Cannabis from the netherlands. http://25ffhnaechrbzwf3.onion/
Kamagra for Bitcoin – Same as Viagra but cheaper! http://k4btcoezc5tlxyaf.onion/
Mobile Store – unlocked iphones and other smartphones. http://mobil7rab6nuf7vx.onion/
UK Guns and Ammo – Selling Guns and Ammo from the UK. http://tuu66yxvrnn3of7l.onion/
Rent-A-Hacker – Hacking, DDOS, Social Engeneering etc. http://2ogmrlfzdthnwkez.onion/
Onion Identity Services – Selling Passports and ID-Cards. http://abbujjh5vqtq77wg.onion/
HQER – High quality euro bills replicas / counterfeits. http://y3fpieiezy2sin4a.onion/
USD Counterfeits – High quality USD counterfeits. http://qkj4drtgvpm7eecl.onion/
USA Citizenship – Get a real USA passport. http://xfnwyig7olypdq5r.onion/
Apples4Bitcoin – Cheap Apple products for Bitcoin. http://tfwdi3izigxllure.onion/
ccPal – CCs, CVV2s, Ebay, Paypals and more. http://3dbr5t4pygahedms.onion/
EuroGuns – Your #1 european arms dealer. http://2kka4f23pcxgqkpv.onion/
UK Passports – Original UK Passports. http://vfqnd6mieccqyiit.onion/
USfakeIDs – High quality USA Fake Drivers Licenses. http://en35tuzqmn4lofbk.onion/
Tech, technology, computers, hackers for hire, hacking/anarchy related materials
MacLemon (security, news, links) http://fzybdgczph7xfdnr.onion/
TOR Status – Tor network status http://jlve2y45zacpbz6s.onion/
TorPGP public key server http://torpgp3ujaysucll.onion/
Altera Praxis (not sure what this is tbh) http://ncivdawfxihoh7sj.onion/about.html
keybase (some sort of hackestalker tool idk) http://fncuwbiisyh6ak3i.onion/
Tor Web Devolper (for hire) http://qizriixqwmeq4p5b.onion/
Web Programmer (for hire) http://kobrabd77ppgjd2r.onion/
Ozy’s Hacking Service (hacker for hire) http://ozy7mnciacbc5idc.onion/
Pioopioo’s Services (hacker for hire) http://rowtogxp2akwem6n.onion/
Hacker place http://hackerw6dcplg3ej.onion/
Parazite (anarchy info mainly) http://kpynyvym6xqi7wz2.onion/
DNS support forum http://mj6vjwhtyahcj6fx.onion/
BitMessage mail gateway http://bitmailendavkbec.onion/
Keys Open Doors http://wdnqg3ehh3hvalpe.onion/
Hidden Service howto http://nfokjgfj3hxs4nwu.onion/
JRAT (java remote administration tool) http://jratoc334zo7zgis.onion/
FILTH (fuck i love to hack) http://om2ak3coziov3dbc.onion/forum/index.php
Onion Domains & MD5sums http://xlmvhk3rpdux26dz.onion/
Soylent News http://skgmctqnhyvfava3.onion/
Bluish Coder http://mh7mkfvezts5j6yu.onion/
Cable Viewer (idk what this is but its techy) http://leakager742hufco.onion/
Xerbot http://xfthw4bq7lx2y726.onion/
Hack Canada http://hackcanl2o4lvmnv.onion/
Imperial anarchist despotism http://rgeo5wj7gneidzh3.onion/
Directory Listing Denied (anon web ftp) http://wtutoxfznz45gf6c.onion/
Anarplex (some kind of computer anarchy) http://y5fmhyqdr6r7ddws.onion/
GhostDeveloper (freelance programmer) http://develggxuazrcokn.onion/
SKS Onion key server http://lbnugoq5na3mzkgv.onion/index.html
GNUPG http://ic6au7wa3f6naxjq.onion/
Cat facts http://2v7ibl5u4pbemwiz.onion/
Chess (game) http://theches3nacocgsc.onion/
Necro town (links n stuff) http://nekrooxwwskakacj.onion/
Encryption Password Generator http://pwgenmwi7eqsys76.onion/
rows.io jabber http://yz6yiv2hxyagvwy6.onion/
M5S leaks http://33pvcdba2nm3afnj.onion/
A cgi proxy http://x5yd2gfthlfgdqjg.onion/
FIT French IRC TOR http://fit2v7z4plpfyh2h.onion/
The Linux Documentation Project http://3c2rvufmbcggnqi6.onion/
Crypto Party http://cpartywvpihlabsy.onion/
Hive Archives http://thehivemwon6a5mp.onion/
txtorcon (python contril library for tor) http://timaq4ygg2iegci7.onion/
Rhodium (science stuff) http://rhodiumio4b7b4rm.onion/
Hackerspace Prague http://pmwdzvbyvnmwobk5.onion/
Political, activists, groups, journalism, whistle blowing etc
Youth Rage forum http://neyigf7eragkp5nq.onion/forum/
Associated Whistleblowers http://w6csjytbrl273che.onion/#/
Community X recruitment http://gp5tycij54ri7xcz.onion/
Code Green (ethical hacktivism) http://pyl7a4ccwgpxm6rd.onion/
Infodio Leaks http://ymi7h25hgp3bj63v.onion/#/
Wiki Leaks http://zbnnr7qzaxlk5tms.onion/
Zwitterion’s Domain http://3il6wiev2pnk7dat.onion/
Secure wildlife whistle blowing http://ppdz5djzpo3w5k2z.onion/#/
Freedom of the press foundation http://freepress3xxs3hk.onion/
the loli advocacy server http://lolikaastbgo5dtk.onion/
Global Leaks http://h73hx2munq7q465s.onion/#/
Tactical Technology http://hrkdpwrkh3lbow2l.onion/
Fund the islamic struggle http://teir4baj5mpvkg5n.onion/
Internet Governance Transparency http://k52lcjc5fws3jbqf.onion/
We fight censorship http://3kyl4i7bfdgwelmf.onion/
Anon Insiders http://imtrjn3qe2tzh5ae.onion/
Map Mos Maiorum (refugee help) http://iuektur6bicvfwcq.onion/ushahidi/
wiki leaks http://jwgkxry7xjeaeg5d.onion/
Anonymity, Security
includes secure email, chat, etc Anonet wiki http://xz2rtmpjjwvdw44p.onion/
Secure Messaging http://sms4tor3vcr2geip.onion/
MailTor http://mailtoralnhyol5v.onion/src/login.php
Lelantos email http://lelantoss7bcnwbv.onion/
Onion Mail http://p6x47b547s2fkmj3.onion/
JitJat (messaging) http://jitjatxmemcaaadp.onion/login.php
TOR PasteBin http://postits4tga4cqts.onion/
RetroShare chat server http://chat7zlxojqcf3nv.onion/
ProtectTOR55 http://protector55z5s7j.onion/
Zerobin http://zerobinqmdqd236y.onion/
TOR chat roulette http://tetatl6umgbmtv27.onion/
SIGAINT (email) http://sigaintevyh2rzvw.onion/
Offshore mail server http://inocncymyac2mufx.onion/
web/irc chat thing http://6ejbuiwnp77gu67h.onion/
FreeFor (chat) http://tns7i5gucaaussz4.onion/
Volatile (chat n stuff) http://vola7ileiax4ueow.onion/
Hosting, web, file, image
Onionweb File Hosting (100mb limit) http://3fnhfsfc2bpzdste.onion/
Hidden Hosting http://7zzohostingx4mes.onion/
Free Hosting links http://a5ok374pjcq7bsyp.onion/
Darknet services http://darknet4x3hcv5zp.onion/
Infernet Dark Hosting http://a5ok374pjcq7bsyp.onion/
IMG.BI (image hosting) http://imgbifwwqoixh7te.onion/
Secure Drop http://v6gdwmm7ed4oifvd.onion/
CYRUSERV http://cyruservvvklto2l.onion/
Free TOR Hosting http://zuxtem3jcv2fvmgk.onion/
Home Hosting (how to) http://dmru36nvfgtywx47.onion/
Real Hosting http://hosting6iar5zo7c.onion/
TorSafe (file hosting) http://torsafeiwttlkul6.onion/accounts/login/
Real Hosting http://ezuwnhj5j6mtk4xr.onion/
TOR VPS http://torvps7kzis5ujfz.onion/index.php/TorVPS
Kowloon (hosting) http://kowloon5aibdbege.onion/
Onion Pastebin http://pastetorziarobi7.onion/
Popfiles (file hosting) http://popfilesxuru7lsr.onion/
Hidden Hosting http://offshore6gq7ykr7.onion/
Darknet Solutions (hosting and design) http://darknet47je5xwm6.onion/
Onion uploader (file hosting up to 100mb) http://nk3k2rsitogzvk2a.onion/
Media, music, movies, art, cartoons, comics etc*
Skeletor.bit http://okzatvfk2jzgvmf4.onion/
Yay Ponies http://ponieslzi3ivbynd.onion/
HFS (music) http://wuvdsbmbwyjzsgei.onion/
Sea Kitten Palace (torrents) http://wtwfzc6ty2s6x4po.onion/
Manga http://negimarxzov6ca4c.onion/
Comics http://7etxnv26hro7mmuu.onion/
Deep Tune (music) http://tune4xs6mj2evcr6.onion/
TorFlix (movies) http://jl4m7ubpotnu2yos.onion/
No name, not sure if its music or speak but its mp3’s http://xf3fjq4b7j6pswuq.onion/
Gone Things (printable images) http://32ixi6myw3things.onion/
ORVoice (music) http://orvoicemur72h7rx.onion/TO
Index of (music) http://uuxrei5or65anucg.onion/
My little pony http://mlpfimf74svi6y4q.onion/s01/
The audiobook vault http://xmctuxj7dsymumwf.onion/
Разное:
DOXBIN http://doxbinbircrfbqvg.onion/ This is a big list of peoples personal information basicly, seems like a dump for info that hackers might want to retreive at a later date, but also seems like a show off site. Im not sure how to interpret all this
Riseup http://zsolxunfmbfuq7wf.onion/rc/
Thunder’s Place (penis enlargement) http://thundersplv36ecb.onion/
Smart5 (forum, for what idk though) http://smart5ywvuwbmzfd.onion/
German TOR Library (documents, files, on what subject idk) http://pqfja3rzroprkfq6.onion
Dying Breed (forum, idk what for) http://g6o7aurv4c3ixalq.onion/index.php
Hers some random cords. lat/long http://4k2oq3fswx35a72s.onion/
Zyprexa kills http://tdkhrvozivoez5ad.onion/
Cat out of the bag http://vkpriz2cjzymgpsp.onion/
XL33tVill3 (links and idk what) http://tt75atziadj4duff.onion/sindex.html
i really dont know what to say http://rjzdqt4z3z3xo73h.onion/
Solar display http://zgypn3izock2oqny.onion/
GIF files (global intelligence files) http://gkqmy7ioqptiru5o.onion/gifiles/
Hacked http://7o46qra2jkz3k3kx.onion/
GreatDumps http://www.greatobxvv7etokq.onion/?login.do/
International journal of proof of concept or GTFO http://pocgtfo7tu77thrp.onion/
Elize chatbot http://opnju4nyz7wbypme.onion/
Cryptome (im not sure where to put this so its here) http://y6q2mnorhmsfdm3r.onion/
Pastebin http://5aklnwbibkhrtbs6.onion/
submitted by Jayson_Roger to JRHarbor [link] [comments]

[Table] IAmA: I am Mikko Hypponen, a computer security expert. Ask me anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2014-12-02
Link to submission (Has self-text)
Questions Answers
Do you still do malware analysis as a part of your day job ? Do you have some advices for someone searching a job in the field ? You need to pick your focus area. What do you want to do? Penetration testing? Encryption? Malware analysis? Forensics? Underground intelligence? Counter-espionage? Then you need to find mentors and coaches. The easiest way to do this is via online forums dedicated to your focus area. For example, check forum.infosecmentors.com.
SANS has some great online resources for people starting up in this area: check them out.
Do you see malware analysis as a growth field for careers? Why? Good malware analysts will always get a job. And malware isn't going to go away any time soon.
It's not just security companies who are hiring people in this field. Many large companies and telcos have their own CERT teams which hire malware analysts.
Is it true that it isn't a huge challenge to modify malware in a way that it is not detected by any current anti virus program, so that people building bot nets or infiltrating computers with Trojans usually smuggle them past virus scanners? It's trivial to modify existing malware so that traditional antivirus programs won't detect it any more. It only takes couple of minutes.
That's why antivirus programs have been moving towards behaviour-based detection models as well as towards reputation-based detection models.
Do note that testing behaviour-based blocking is hard. That's why it's misleading when people post links to sites such as Virustotal as evidence that particular file is 'not detected by AVs'. There's no way to know if a particular antivirus would have blocked the file, unless you would try to run it.
"As far as we can see, this program has never been executed by anyone else anywhere. You are the first person on the planet to run this file. This is highly unusual. We will block this file, even though we can't find any known malware from the file"
The only problem with this scenario are software developers, who compile their own programs. They obviously are the first persons on the planet to run a particular program - as they made it themselves! They can easily whitelist their output folder to avoid this problem though.
Can you recommend any behaviour-based or reputation-based blocking software in particular (for Windows and/or OS X)? Well, our own antivirus has these built in.
Europol's cybercrime taskforce recently took down over a hundred darknet servers. Did the news shake your faith in TOR? People use Tor for surfing the normal web anonymized, and they use Tor Hidden Service for running websites that are only accessible for Tor users.
Both Tor use cases can be targeted by various kinds of attacks. Just like anywhere else, there is no absolute security in Tor either.
I guess the takedown showed more about capabilities of current law enforcement than anything else.
I use Tor regularily to gain access to sites in the Tor Hidden Service, but for proteting my own privacy, I don't rely on Tor. I use VPNs instead. In addition to providing you an exit node from another location, VPNs also encrypt your traffic. However, Tor is free and it's open source. Most VPNs are closed source, and you have to pay for them. And you have to rely on the VPN provider, so choose carefully. We have a VPN product of our own, which is what I use.
I use a VPN regularly from work to bypass filters, and at home to avoid those pesky cease-and-desists. Although I'm not a infosec professional I've always heard that how secure you are using a VPN is directly related to whether or not their logs of your traffic can be traced back to you. How secure in your opinion are VPN providers (such as PIA which I personally use)? And in wake of the prevalence of government surveillance now can VPN providers claims of 'not keeping logs' be trusted to protect privacy? Use a VPN provider you trust. Someone who's been in the security business for a long while. Also, aim for a vendor who doesn't store logs of user activity.
Do you keep logs on the VPN? Freedome stores no logs.
How safe are current smart phones and how secure are their connections? Are special phones used by politicians really safe, or do they get hacked as well? The operating systems on our current phones (and tablets) are clearly more secure than the operating systems on our computers. That's mostly because they are much more restricted.
Windows Phones and iOS devices don't have a real malware problem (they still have to worry about things like phishing though). Android is the only smartphone platform that has real-world malware for it (but most of that is found in China and is coming from 3rd party app stores).
It is interesting the Android is the first Linux distribution to have a real-world malware problem.
Lot's of people are afraid of the viruses and malware only simply because they are all over the news and realtively easy to explain to. I am personally more afraid of the silently allowed data mining (i.e. the amount of info Google can get their hands on) and social engineering style of "hacking". Companies like Google and Facebook make money by trying to gather as much information about you as they can. But Google and Facebook are not criminals and they are not breaking the law.
How would you compare these two different threats and their threat levels on Average Joes point of view - which of them is more likely to cause some harm. Or is there something else to be more afraid of even more (govermental level hacks/attacks)? There are different problems: problems with security and problems with privacy. Security problems come from criminals who do break the law and who directly try to steal from you with attacks like banking trojans or credit card keyloggers. Blanket surveillance of the internet also affects us all. But comparing these threats to each other is hard.
Thoughts on bitcoin from a security standpoint? Bitcoin is interesting, in many different ways.
I do believe in cryptocurrencies. It might not be Bitcoin that changes the world, but something built on that will.
We see Bitcoin in our line of work all the time. Wallet theft. Ransomware where Bitcoin are used to pay the ransoms. Mining trojans.
However, that's just like blaming cash for being too handy for drug dealers.
Bitcoin is just a tool. Can be used for good or bad.
Favorite debugging tool? I've always had a soft spot for the old DEBUG.EXE that shipped with MS-DOS...
N Yeah.com.
E0100 B0 13 CD 10 68 00 A0 07 31 FF B1 C8 E8 20 00 51.
E0110 B9 40 01 E8 19 00 D8 C3 DF 1C D8 E3 8A 04 DF 1C.
E0120 32 04 24 1F AA E2 EC 59 E2 E2 83 07 10 EB D9 89.
E0130 0C DF 04 D9 C0 DE 07 DE 74 04 D9 FE DE 4C 14 C3.
RCX.
40.
W.
Q
Is this real? Link to www.youtube.com. No, that's not how you break into a system in the real world.
Another timely rebuttal of movie hacking, speaking about the ads for the upcoming Black Hat movie: Link to carbon-dynamics.squarespace.com - this one is written by Dan Tentler.
With the rise of the Internet of Things, what measures can we take to better secure ourselves in regards to home devices (laptops, smart-tvs, etc)? Well, you won't be running an antivirus on your washing machine or toaster, that's for sure.
The real-world attacks against IoT devices are still limited - mostly because the ways of making money by hacking washing machines and so are limited.
As a result, the IoT security solutions aren't really widely available yet. They will be in the future though.
Is it unethical to release viruses that kill viruses? Or would it be hard to tell the good buys from the bad guys (eventually)? The idea of a 'good virus' has been discussed to death already years ago. The consensus is that anything good that could be done with self-replicating code could be done better without the replication.
See Dr. Vesselin Bontchev's seminal paper on this: Link to www.virusbtn.com
I have a dream. Link to i.imgur.com Nice pic...
Linux distributions generally don't need antivirus, but apart from the fact that most malware is written for Windows, why do you think this is? If linux became the popular choice on desktops, do you think it would be as prone to malware as Windows is? How about OS X? Most mobile malware IS written for Linux, since most smartphones run Linux.
So first and foremost, it's a question of market shares.
After that it's a question of attacker skillsets. If the attackers have been writing Windows malware since Windows XP, they aren't likely to stop and switch easily to OS X or Linux unless they have to. And they don't have to.
What's your take on security researchers withholding their findings regarding state sponsored malware for 'global security concerns'? Kaspersky and Symantec both withheld information about Reign malware. Is this common? Is it ethical? Why are security companies beholden to the intelligence community and not the people who pay them for their services and advice? How can this conflict of interest be resolved while retaining independence and integrity? Nobody was withholding detection. Everybody detected all Regin-related files they had, and protected the end users. Which one would you rather have us to do? Sign an NDA, get the samples and protect our users? Or not sign the NDA and not protect our users.
Many people I talk to about this privacy thingy say "I have nothing to hide, so why bother". Do you think this will ever change, that people would start caring about this? Have you already seen the general opinion sifting...? Some people will always say this. But they are always the people who haven't really thought it through.
If you have nothing to hide, you can't keep a secret. If you have nothing to hide, show me your search history. If you have nothing to hide, give me your password. If you have nothing to hide, I can't trust you.
At this point, what do you personally feel about security and mass surveillance in a post-Snowden world where still not much has changed? I've learned that many, many people just don't care. Which is depressing.
If you don't care about mass surveillance for your own case, how about caring on behalf of the future generations?
Last updated: 2014-12-06 14:37 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

Bitcoin Wallet erstellen (Electrum) 24 Choosing A Bitcoin Wallet (Deep Web) - YouTube 10M Bitcoin.com Wallets created, Updates on local.bitcoin.com, Opinion on SilkRoad and DNM's support Einleitung Ins Darknet Tutorial So erstellt ihr eine Bitcoin Wallet (Bitcoin Geldbörse)! [Deutsch]

Am heutigen Dienstag hätten die Wallets allerdings einen Wert von fast 210 Millionen Euro. movie2k.to: Betreiber kauften Kryptowährungen im Wert von 25 Millionen Euro! Die Ermittler konnten 22.000 Bitcoin sicherstellen, die die Betreiber des Streaming Portals movie2k.to erwirtschaftet haben. Laut der Generalstaatsanwaltschaft Dresden haben ... Bitcoin's darknet ambitions have changed since Silk Road During its early days, before Bitcoin became "fool's gold" for get-rich-quick investors, it was used as the main currency on the darknet. ThThe post Bitcoin in the darknet: Darker than you think appeared first on AMBCrypto. Deep web links covers – Tor websites, Deep web site, Darknet websites, dark web sites list, dark web websites, onion websites, hidden websites, tor websites list, etc., We have given a bunch of deep web links below, but before accessing those links know what is deep web and safety tips to access the deep web. Wissenswertes über Bitcoins Unser Bitcoin Chart zeigt Ihnen den aktuellen Bitcoin Kurs in Euro (Kürzel: BTC und XBT) sowie die Bitcoin Kursentwicklung (Bitcoincharts).Wenn Sie Bitcoins kaufen möchten, können Sie sich hier anmelden.In unseren Bitcoin.de FAQs und in unserem Tutorial "Mein erster Bitcoin" erfahren Sie, wie Sie Bitcoins verkaufen oder kaufen können. Hacker from the 2016 Bitfinex Breach Transfers $21M Worth of Bitcoin to Unknown Wallets On Wednesday morning (ET), around 2,034 BTC ($21.6 million) from the 2016 Bitfinex hack moved into a few ...

[index] [22013] [24157] [41817] [38540] [33520] [13659] [23189] [37620] [14417] [1428]

Bitcoin Wallet erstellen (Electrum)

Sicheres Bitcoin Wallet erstellen - Schritt-für-Schritt Anleitung - Electrum Deutsch Geldbeutel 🔒 - Duration: 9:07. Talerbox Invest Smart 141,709 views 9:07 Bitcoin Cash accepted by over 10% of darknet vendors last month According to a report by 1000x group, which monitors crypto adoption to look for potential “black swan” investments, Bitcoin ... Sicheres Bitcoin Wallet erstellen - Schritt-für-Schritt Anleitung - Electrum Deutsch Geldbeutel 🔒 - Duration: 9:07. Talerbox Invest Smart 143,315 views 9:07 how to install electrum bitcoin wallet - Duration: 9:55. Akshay Daga 1,995 views. 9:55. How to configure a Shared Network Printer in Windows 7, 8, or 10 - Duration: 45:12. ... How To: in 10 Minuten Bitcoin kaufen & Wallet einrichten - Duration: 16:56. TheKai1211 20,507 views. 16:56. COMPLETE Shopify Tutorial For Beginners 2020 - How To Create A Profitable Shopify Store ...

#