Big Bitcoin Holder Transfers 15,987 BTC Worth $166 Million ...

Why UMI is a Step toward a Free Financial World

Why UMI is a Step toward a Free Financial World

https://preview.redd.it/sk4qzvg2o5p51.jpg?width=1024&format=pjpg&auto=webp&s=42c422967888ffb44288e1cf7b8e9b4ffd6e20a1
Quite recently, the world has seen a remarkable event — an anonymous bitcoin whale sent a total of $2.24 billion in a series of transactions. Large transactions are certainly not uncommon for the bitcoin network. Whale Alert — blockchain tracker and analytics system — regularly reports large and interesting transactions. Although $2.24 billion is the largest ever cryptocurrency transfer, the most remarkable thing about this event is not the transfer amount but the incredibly little fee the sender paid for the transaction — less than $1. With no checkups and intermediaries.
If such a transfer had happened a few years ago, it would have considered abnormal and unreal. Today it is a matter of fact. With each passing day, using cryptocurrency for making transfers is getting more attractive than bank transfers. The UMI network, which enables instant payments with no fees, fits in best with new realities. Let's explore this issue.
Freedom from Bank Charges
The BTC whale sent the above-mentioned amount in seven successive transactions within one hour. The total amount was 241,500 BTC, which was equivalent to $2.24 bln. Each transfer cost around 0.0001 BTC or just $0.93, giving a total of about $6.51 for the seven transfers.
Let's compare now how much you would be charged for an identical transfer in a bank.
In big banks, the international transfer fee is at least 1% of the amount, but it is often higher than that depending on the conditions. For instance, the VISA system charges 1 to 10% of the transaction amount for an international transfer (minimum of $10). Therefore, the more you transfer, the more you pay for it. To transfer the above-mentioned amount via a bank, a customer would have to part with as much as $22.4 mln (!!!), in the best-case scenario — that is if the fee is the minimum 1%. In other words, a bank would make a fortune — virtually at the drop of a hat, making no effort whatsoever — by simply taking someone's money. What makes it more absurd is that banks intend to further raise their fees amid coronavirus pandemic.
Cryptocurrencies are a completely different story. In most cryptocurrency networks, fees do not depend on the transaction amount — the same fee could be charged for transferring $1 or $1 bln. In the cryptocurrency world, it doesn't matter how much money you transfer. If you make a big transfer, no one makes you pay the “tithe”. With UMI, you don't have to pay anything to anyone — not a dime. But we'll get back to this a little later.
Freedom from Excessive Limits and Unneeded Checkups
First, let's consider another important factor — the very possibility to make unhindered transfers of large amounts via bank especially foreign transfers. The irony is that even if someone chooses to pay this multi-million dollar fee, the transfer would far from being 100% successful.
In most countries, including the Russian Federation, a $22 bln transaction would be virtually impossible to run in a state-owned bank, let alone private banks. Even going through a bunch of mandatory procedures as well as wasting lots of nerves and time wouldn't save the day. This is why a payment of this size is virtually impossible:
  1. The overwhelming majority of the world's banks just don't happen to have such large amounts on their correspondent accounts. Even if we assume they do have sufficient funds on the books, this money doesn't just sit idle — bankers use it in their own favor, for instance, to grant loans, make deposit payments, etc. No bank would agree to send all its reserve funds to another bank on your orders. Moreover, banks have no right to violate the law in terms of reserve requirements, including currency norms. And processing such a large amount contradicts the established rules and regulations. So, even if money is technically recorded on the customer's account, transferring it to another bank, especially in a foreign country, is still a virtually impossible task.
  2. In almost all states transactions of this scale are only allowed on the level of governments, the International Monetary Fund, the World Bank, or mega-tycoons with a declared multi-billion dollar income, such as Bill Gates, Warren Buffett, and the like. In other words, only customers with a special status can make especially large transfers without restrictions. Any “abnormal” transactions fall under suspicion and automatically frozen. If you have always run $500 transactions on a monthly basis, any incoming or outgoing $10,000 transfer would most probably be frozen. Let alone billions of dollars. An average owner of a large business will only be allowed to transfer billions of dollars after they get approval from FATF on an individual basis. Obviously, they must also be verified using KYC (Know Your Customer) and AML (Anti-money laundering) procedures and must establish the provenance of each dime they transfer. They have to do all this to transfer THEIR money, with a huge fee of billions of dollars.
  3. The situation is even worse because it is equally true for receiving monetary transfers. In other words, if you have a large amount successfully transferred to you, there is no guarantee that you can use this money. Sadly, even if the money leaves the sender's bank, the recipient's bank can instantly freeze it. On the very same day, you could get a visit from bank or government officials along with the state security service and a special interrogation. If you cannot provide provenance data for the funds, the transfer could easily remain frozen for good. Naturally, this system opens the doors for various types of abuse of power and manipulation by bankers, governments, and state services.
For the existing banking system, any big transaction makes you a suspect of some manipulations resulting in a frozen transfer. More importantly, it isn't only true for multi-billion or multi-million transfers. Any transaction involving hundreds of thousands, dozens of thousands, or simply thousands of dollars may be deemed suspicious and sanctioned. It means that anyone who runs relatively big transactions runs the risk of encountering certain problems at any time.
Cryptocurrencies are a step toward free transfers
The above-described situation proves that digital money helps people get rid of many problems related to bank transfers: high fees, payment amount limits, specification of personal data, verification procedures. With digital money, you don't have to prove or explain anything. This is a real revolution that makes people free from fees and manipulation. Cryptocurrencies allow people to be a master of their funds and no one has the power to change this. No one charges you crazy fees and no one can steal your coins.
With each passing minute, cryptocurrencies are becoming part of our life, and rather than profit from trading, investment, mining, or staking, they are regarded as a convenient way of sending funds. Only cryptocurrencies make people feel completely safe and allow them to transfer whatever amount wherever they want. This is a huge step towards changing the existing financial system, and it has already been made.
But UMI Goes Even Further
It may appear that problem with bank fees concerns only large businessmen. In real fact, regular people living live paycheck to paycheck are more sensitive to this issue. Being on a tight budget, most people have to pay for any bank transaction.
You always pay fees charged by banks — when you pay utility bills, buy online, deposit money to your bank card, receive money, transfer money between your accounts or withdraw cash from an ATM. Overall, bank fees cost people a lot of money. It's curious to know how much your pay banks every year for mediation.
Now let's see how you can make transactions using UMI.
In terms of fees, UMI is more profitable than banks and even more profitable than most of the other cryptocurrencies, including bitcoin. There are no fees in the UMI network at all, even hidden ones. All transactions are instant. That is, if you sent $2.24 billion through the UMI network, it would be instant and completely free. There are no limits, verifications, and other nervous procedures. Instant, free, and secure — here and now.
This is the key advantage of UMI as a payment instrument. Our cryptocurrency empowers all people — from large businessmen to factory workers — with profitable and absolutely safe funds transfers. UMI gives all people around the globe equal opportunities. This is the next step toward a free financial world. We are the first to make it.
Sincerely yours, UMI team
submitted by UMITop to u/UMITop [link] [comments]

How do I store Bitcoin without YOU knowing how many Bitcoin do I have?

I am sure that many rich guys here are align with me when I raise this problem, although I'm not rich. Consider 2 cases:
- We the community know the wallet address of a big sharks storing many BTC. We follow every move the sharks makes from the wallet. When the shark moves fund to an exchange, we call it a FUD and there will be some guys selling. The entire market now is a SHORT. It has happened a lot, just check the BTC tracker bot, or check some articles featuring about anonymous sharks only by tracking the BTC addresses. - I am holding Bitcoin in my wallet. Also, I have been transacting Bitcoin with many of my friends in this wallet and all of them know clearly about my Bitcoin balance. They can open it everyday to check if I get out of the market or not (just an example)
So, the 2 bring to light a problem, how do I store Bitcoin without the public knowing my balance account? Yes, if they don't know my address they can't access to my wallet page. However, if I'm rich, that could be a problem, right? Is there anyway that helps to store Bitcoin just like store privacy altcoin?
submitted by baoendj263 to Buttcoin [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

Your Guide to Monero, and Why It Has Great Potential

/////Your Guide to Monero, and Why It Has Great Potential/////

Marketing.
It's a dirty word for most members of the Monero community.
It is also one of the most divisive words in the Monero community. Yet, the lack of marketing is one of the most frustrating things for many newcomers.
This is what makes this an unusual post from a member of the Monero community.
This post is an unabashed and unsolicited analyzation of why I believe Monero to have great potential.
Below I have attempted to outline different reasons why Monero has great potential, beginning with upcoming developments and use cases, to broader economic motives, speculation, and key issues for it to overcome.
I encourage you to discuss and criticise my musings, commenting below if you feel necessary to do so.

///Upcoming Developments///

Bulletproofs - A Reduction in Transaction Sizes and Fees
Since the introduction of Ring Confidential Transactions (Ring CT), transaction amounts have been hidden in Monero, albeit at the cost of increased transaction fees and sizes. In order to mitigate this issue, Bulletproofs will soon be added to reduce both fees and transaction size by 80% to 90%. This is great news for those transacting smaller USD amounts as people commonly complained Monero's fees were too high! Not any longer though! More information can be found here. Bulletproofs are already working on the Monero testnet, and developers were aiming to introduce them in March 2018, however it could be delayed in order to ensure everything is tried and tested.
Multisig
Multisig has recently been merged! Mulitsig, also called multisignature, is the requirement for a transaction to have two or more signatures before it can be executed. Multisig transactions and addresses are indistinguishable from normal transactions and addresses in Monero, and provide more security than single-signature transactions. It is believed this will lead to additional marketplaces and exchanges to supporting Monero.
Kovri
Kovri is an implementation of the Invisible Internet Project (I2P) network. Kovri uses both garlic encryption and garlic routing to create a private, protected overlay-network across the internet. This overlay-network provides users with the ability to effectively hide their geographical location and internet IP address. The good news is Kovri is under heavy development and will be available soon. Unlike other coins' false privacy claims, Kovri is a game changer as it will further elevate Monero as the king of privacy.
Mobile Wallets
There is already a working Android Wallet called Monerujo available in the Google Play Store. X Wallet is an IOS mobile wallet. One of the X Wallet developers recently announced they are very, very close to being listed in the Apple App Store, however are having some issues with getting it approved. The official Monero IOS and Android wallets, along with the MyMonero IOS and Android wallets, are also almost ready to be released, and can be expected very soon.
Hardware Wallets
Hardware wallets are currently being developed and nearing completion. Because Monero is based on the CryptoNote protocol, it means it requires unique development in order to allow hardware wallet integration. The Ledger Nano S will be adding Monero support by the end of Q1 2018. There is a recent update here too. Even better, for the first time ever in cryptocurrency history, the Monero community banded together to fund the development of an exclusive Monero Hardware Wallet, and will be available in Q2 2018, costing only about $20! In addition, the CEO of Trezor has offered a 10BTC bounty to whoever can provide the software to allow Monero integration. Someone can be seen to already be working on that here.
TAILS Operating System Integration
Monero is in the progress of being packaged in order for it to be integrated into TAILS and ready to use upon install. TAILS is the operating system popularised by Edward Snowden and is commonly used by those requiring privacy such as journalists wanting to protect themselves and sources, human-right defenders organizing in repressive contexts, citizens facing national emergencies, domestic violence survivors escaping from their abusers, and consequently, darknet market users.
In the meantime, for those users who wish to use TAILS with Monero, u/Electric_sheep01 has provided Sheep's Noob guide to Monero GUI in Tails 3.2, which is a step-by-step guide with screenshots explaining how to setup Monero in TAILS, and is very easy to follow.
Mandatory Hardforks
Unlike other coins, Monero receives a protocol upgrade every 6 months in March and September. Think of it as a Consensus Protocol Update. Monero's hard forks ensure quality development takes place, while preventing political or ideological issues from hindering progress. When a hardfork occurs, you simply download and use the new daemon version, and your existing wallet files and copy of the blockchain remain compatible. This reddit post provides more information.
Dynamic fees
Many cryptocurrencies have an arbitrary block size limit. Although Monero has a limit, it is adaptive based on the past 100 blocks. Similarly, fees change based on transaction volume. As more transactions are processed on the Monero network, the block size limit slowly increases and the fees slowly decrease. The opposite effect also holds true. This means that the more transactions that take place, the cheaper the fees!
Tail Emission and Inflation
There will be around 18.4 million Monero mined at the end of May 2022. However, tail emission will kick in after that which is 0.6 XMR, so it has no fixed limit. Gundamlancer explains that Monero's "main emission curve will issue about 18.4 million coins to be mined in approximately 8 years. (more precisely 18.132 Million coins by ca. end of May 2022) After that, a constant "tail emission" of 0.6 XMR per 2-minutes block (modified from initially equivalent 0.3 XMR per 1-minute block) will create a sub-1% perpetual inflatio starting with 0.87% yearly inflation around May 2022) to prevent the lack of incentives for miners once a currency is not mineable anymore.
Monero Research Lab
Monero has a group of anonymous/pseudo-anonymous university academics actively researching, developing, and publishing academic papers in order to improve Monero. See here and here. The Monero Research Lab are acquainted with other members of cryptocurrency academic community to ensure when new research or technology is uncovered, it can be reviewed and decided upon whether it would be beneficial to Monero. This ensures Monero will always remain a leading cryptocurrency. A recent end of 2017 update from a MRL researcher can be found here.

///Monero's Technology - Rising Above The Rest///

Monero Has Already Proven Itself To Be Private, Secure, Untraceable, and Trustless
Monero is the only private, untraceable, trustless, secure and fungible cryptocurrency. Bitcoin and other cryptocurrencies are TRACEABLE through the use of blockchain analytics, and has lead to the prosecution of numerous individuals, such as the alleged Alphabay administrator Alexandre Cazes. In the Forfeiture Complaint which detailed the asset seizure of Alexandre Cazes, the anonymity capabilities of Monero were self-demonstrated by the following statement of the officials after the AlphaBay shutdown: "In total, from CAZES' wallets and computer agents took control of approximately $8,800,000 in Bitcoin, Ethereum, Monero and Zcash, broken down as follows: 1,605.0503851 Bitcoin, 8,309.271639 Ethereum, 3,691.98 Zcash, and an unknown amount of Monero".
Privacy CANNOT BE OPTIONAL and must be at a PROTOCOL LEVEL. With Monero, privacy is mandatory, so that everyone gets the benefits of privacy without any transactions standing out as suspicious. This is the reason Darknet Market places are moving to Monero, and will never use Verge, Zcash, Dash, Pivx, Sumo, Spectre, Hush or any other coins that lack good privacy. Peter Todd (who was involved in the Zcash trusted setup ceremony) recently reiterated his concerns of optional privacy after Jeffrey Quesnelle published his recent paper stating 31.5% of Zcash transactions may be traceable, and that only ~1% of the transactions are pure privacy transactions (i.e., z -> z transactions). When the attempted private transactions stand out like a sore thumb there is no privacy, hence why privacy cannot be optional. In addition, in order for a cryptocurrency to truly be private, it must not be controlled by a centralised body, such as a company or organisation, because it opens it up to government control and restrictions. This is no joke, but Zcash is supported by DARPA and the Israeli government!.
Monero provides a stark contrast compared to other supposed privacy coins, in that Monero does not have a rich list! With all other coins, you can view wallet balances on the blockexplorers. You can view Monero's non-existent rich list here to see for yourself.
I will reiterate here that Monero is TRUSTLESS. You don't need to rely on anyone else to protect your privacy, or worry about others colluding to learn more about you. No one can censor your transaction or decide to intervene. Monero is immutable, unlike Zcash, in which the lead developer Zooko publicly tweeted the possibility of providing a backdoor for authorities to trace transactions. To Zcash's demise, Zooko famously tweeted:
" And by the way, I think we can successfully make Zcash too traceable for criminals like WannaCry, but still completely private & fungible. …"
Ethereum's track record of immutability is also poor. Ethereum was supposed to be an immutable blockchain ledger, however after the DAO hack this proved to not be the case. A 2016 article on Saintly Law summarised the problematic nature of Ethereum's leadership and blockchain intervention:
" Many ethereum and blockchain advocates believe that the intervention was the wrong move to make in this situation. Smart contracts are meant to be self-executing, immutable and free from disturbance by organisations and intermediaries. Yet the building block of all smart contracts, the code, is inherently imperfect. This means that the technology is vulnerable to the same malicious hackers that are targeting businesses and governments. It is also clear that the large scale intervention after the DAO hack could not and would not likely be taken in smaller transactions, as they greatly undermine the viability of the cryptocurrency and the technology."
Monero provides Fungibility and Privacy in a Cashless World
As outlined on GetMonero.org, fungibility is the property of a currency whereby two units can be substituted in place of one another. Fungibility means that two units of a currency can be mutually substituted and the substituted currency is equal to another unit of the same size. For example, two $10 bills can be exchanged and they are functionally identical to any other $10 bill in circulation (although $10 bills have unique ID numbers and are therefore not completely fungible). Gold is probably a closer example of true fungibility, where any 1 oz. of gold of the same grade is worth the same as another 1 oz. of gold. Monero is fungible due to the nature of the currency which provides no way to link transactions together nor trace the history of any particular XMR. 1 XMR is functionally identical to any other 1 XMR. Fungibility is an advantage Monero has over Bitcoin and almost every other cryptocurrency, due to the privacy inherent in the Monero blockchain and the permanently traceable nature of the Bitcoin blockchain. With Bitcoin, any BTC can be tracked by anyone back to its creation coinbase transaction. Therefore, if a coin has been used for an illegal purpose in the past, this history will be contained in the blockchain in perpetuity.
A great example of Bitcoin's lack of fungibility was reposted by u/ViolentlyPeaceful:
"Imagine you sell cupcakes and receive Bitcoin as payment. It turns out that someone who owned that Bitcoin before you was involved in criminal activity. Now you are worried that you have become a suspect in a criminal case, because the movement of funds to you is a matter of public record. You are also worried that certain Bitcoins that you thought you owned will be considered ‘tainted’ and that others will refuse to accept them as payment."
This lack of fungibility means that certain businesses will be obligated to avoid accepting BTC that have been previously used for purposes which are illegal, or simply run afoul of their Terms of Service. Currently some large Bitcoin companies are blocking, suspending, or closing accounts that have received Bitcoin used in online gambling or other purposes deemed unsavory by said companies. Monero has been built specifically to address the problem of traceability and non-fungibility inherent in other cryptocurrencies. By having completely private transactions Monero is truly fungible and there can be no blacklisting of certain XMR, while at the same time providing all the benefits of a secure, decentralized, permanent blockchain.
The world is moving cashless. Fact. The ramifications of this are enormous as we move into a cashless world in which transactions will be tracked and there is a potential for data to be used by third parties for adverse purposes. While most new cryptocurrency investors speculate upon vaporware ICO tokens in the hope of generating wealth, Monero provides salvation for those in which financial privacy is paramount. Too often people equate Monero's features with criminal endeavors. Privacy is not a crime, and is necessary for good money. Transparency in Monero is possible OFF-CHAIN, which offers greater transparency and flexibility. For example, a Monero user may share their Private View Key with their accountant for tax purposes.
Monero aims to be adopted by more than just those with nefarious use cases. For example, if you lived in an oppressive religious regime and wanted to buy a certain item, using Monero would allow you to exchange value privately and across borders if needed. Another example is that if everybody can see how much cryptocurrency you have in your wallet, then a certain service might decide to charge you more, and bad actors could even use knowledge of your wallet balance to target you for extortion purposes. For example, a Russian cryptocurrency blogger was recently beaten and robbed of $425k. This is why FUNGIBILITY IS ESSENTIAL. To summarise this in a nutshell:
"A lack of fungibility means that when sending or receiving funds, if the other person personally knows you during a transaction, or can get any sort of information on you, or if you provide a residential address for shipping etc. – you could quite potentially have them use this against you for personal gain"
For those that wish to seek more information about why Monero is a superior form of money, read The Merits of Monero: Why Monero Vs Bitcoin over on the Monero.how website.
Monero's Humble Origins
Something that still rings true today despite the great influx of money into cryptocurrencies was outlined in Nick Tomaino's early 2016 opinion piece. The author claimed that "one of the most interesting aspects of Monero is that the project has gained traction without a crowd sale pre-launch, without VC funding and any company or well-known investors and without a pre-mine. Like Bitcoin in the early days, Monero has been a purely grassroots movement that was bootstrapped by the creator and adopted organically without any institutional buy-in. The creator and most of the core developers serve the community pseudonymously and the project was launched on a message board (similar to the way Bitcoin was launched on an email newsletter)."
The Organic Growth of the Monero Community
The Monero community over at monero is exponentially growing. You can view the Monero reddit metrics here and see that the Monero subreddit currently gains more than 10,000 (yes, ten thousand!) new subscribers every 10 days! Compare this to most of the other coins out there, and it proves to be one of the only projects with real organic growth. In addition to this, the community subreddits are specifically divided to ensure the main subreddit remains unbiased, tech focused, with no shilling or hype. All trading talk is designated to xmrtrader, and all memes at moonero.
Forum Funding System
While most contributors have gratefully volunteered their time to the project, Monero also has a Forum Funding System in which money is donated by community members to ensure it attracts and retains the brightest minds and most skilled developers. Unlike ICOs and other cryptocurrencies, Monero never had a premine, and does not have a developer tax. If ANYONE requires funding for a Monero related project, then they can simply request funding from the community, and if the community sees it as beneficial, they will donate. Types of projects range from Monero funding for local meet ups, to paying developers for their work.
Monero For Goods, Services, and Market Places
There is a growing number of online goods and services that you can now pay for with Monero. Globee is a service that allows online merchants to accept payments through credit cards and a host of cryptocurrencies, while being settled in Bitcoin, Monero or fiat currency. Merchants can reach a wider variety of customers, while not needing to invest in additional hardware to run cryptocurrency wallets or accept the current instability of the cryptocurrency market. Globee uses all of the open source API's that BitPay does making integrations much easier!
Project Coral Reef is a service which allows you to shop and pay for popular music band products and services using Monero.
Linux, Veracrypt, and a whole array of VPNs now accept Monero.
There is a new Monero only marketplace called Annularis currently being developed which has been created for those who value financial privacy and economic freedom, and there are rumours Open Bazaar is likely to support Monero once Multisig is implemented.
In addition, Monero is also supported by The Living Room of Satoshi so you can pay bills or credit cards directly using Monero.
Monero can be found on a growing number of cryptocurrency exchange services such as Bittrex, Poloniex, Cryptopia, Shapeshift, Changelly, Bitfinex, Kraken, Bisq, Tux, and many others.
For those wishing to purchase Monero anonymously, there are services such as LocalMonero.co and Moneroforcash.com.
With XMR.TO you can pay Bitcoin addresses directly with Monero. There are no other fees than the miner ones. All user records are purged after 48 hours. XMR.TO has also been added as an embedded feature into the Monerujo android wallet.
Coinhive Browser-Based Mining
Unlike Bitcoin, Monero can be mined using CPUs and GPUs. Not only does this encourage decentralisation, it also opens the door to browser based mining. Enter side of stage, Coinhive browser-based mining. As described by Hon Lau on the Symnatec Blog Browser-based mining, as its name suggests, is a method of cryptocurrency mining that happens inside a browser and is implemented using Javascript. Coinhive is marketed as an alternative to browser ad revenue. The motivation behind this is simple: users pay for the content indirectly by coin mining when they visit the site and website owners don't have to bother users with sites laden with ads, trackers, and all the associated paraphern. This is great, provided that the websites are transparent with site visitors and notify users of the mining that will be taking place, or better still, offer users a way to opt in, although this hasn't always been the case thus far.
Skepticism Sunday
The main Monero subreddit has weekly Skepticism Sundays which was created with the purpose of installing "a culture of being scientific, skeptical, and rational". This is used to have open, critical discussions about monero as a technology, it's economics, and so on.

///Speculation///

Major Investors And Crypto Figureheads Are Interested
Ari Paul is the co-founder and CIO of BlockTower Capital. He was previously a portfolio manager for the University of Chicago's $8 billion endowment, and a derivatives market maker and proprietary trader for Susquehanna International Group. Paul was interviewed on CNBC on the 26th of December and when asked what was his favourite coin was, he stated "One that has real fundamental value besides from Bitcoin is Monero" and said it has "very strong engineering". In addition, when he was asked if that was the one used by criminals, he replied "Everything is used by criminals including the US dollar and the Euro". Paul later supported these claims on Twitter, recommending only Bitcoin and Monero as long-term investments.
There are reports that "Roger Ver, earlier known as 'Bitcoin Jesus' for his evangelical support of the Bitcoin during its early years, said his investment in Monero is 'substantial' and his biggest in any virtual currency since Bitcoin.
Charlie Lee, the creator of Litecoin, has publicly stated his appreciation of Monero. In a September 2017 tweet directed to Edward Snowden explaining why Monero is superior to Zcash, Charlie Lee tweeted:
All private transactions, More tested privacy tech, No tax on miners to pay investors, No high inflation... better investment.
John McAfee, arguably cryptocurrency's most controversial character at the moment, has publicly supported Monero numerous times over the last twelve months(before he started shilling ICOs), and has even claimed it will overtake Bitcoin.
Playboy instagram celebrity Dan Bilzerian is a Monero investor, with 15% of his portfolio made up of Monero.
Finally, while he may not be considered a major investor or figurehead, Erik Finman, a young early Bitcoin investor and multimillionaire, recently appeared in a CNBC Crypto video interview, explaining why he isn't entirely sold on Bitcoin anymore, and expresses his interest in Monero, stating:
"Monero is a really good one. Monero is an incredible currency, it's completely private."
There is a common belief that most of the money in cryptocurrency is still chasing the quick pump and dumps, however as the market matures, more money will flow into legitimate projects such as Monero. Monero's organic growth in price is evidence smart money is aware of Monero and gradually filtering in.
The Bitcoin Flaw
A relatively unknown blogger named CryptoIzzy posted three poignant pieces regarding Monero and its place in the world. The Bitcoin Flaw: Monero Rising provides an intellectual comparison of Monero to other cryptocurrencies, and Valuing Cryptocurrencies: An Approach outlines methods of valuing different coins.
CryptoIzzy's most recent blog published only yesterday titled Monero Valuation - Update and Refocus is a highly recommended read. It touches on why Monero is much more than just a coin for the Darknet Markets, and provides a calculated future price of Monero.
CryptoIzzy also published The Power of Money: A Case for Bitcoin, which is an exploration of our monetary system, and the impact decentralised cryptocurrencies such as Bitcoin and Monero will have on the world. In the epilogue the author also provides a positive and detailed future valuation based on empirical evidence. CryptoIzzy predicts Monero to easily progress well into the four figure range.
Monero Has a Relatively Small Marketcap
Recently we have witnessed many newcomers to cryptocurrency neglecting to take into account coins' marketcap and circulating supply, blindly throwing money at coins under $5 with inflated marketcaps and large circulating supplies, and then believing it's possible for them to reach $100 because someone posted about it on Facebook or Reddit.
Compared to other cryptocurrencies, Monero still has a low marketcap, which means there is great potential for the price to multiply. At the time of writing, according to CoinMarketCap, Monero's marketcap is only a little over $5 billion, with a circulating supply of 15.6 million Monero, at a price of $322 per coin.
For this reason, I would argue that this is evidence Monero is grossly undervalued. Just a few billion dollars of new money invested in Monero can cause significant price increases. Monero's marketcap only needs to increase to ~$16 billion and the price will triple to over $1000. If Monero's marketcap simply reached ~$35 billion (just over half of Ripple's $55 billion marketcap), Monero's price will increase 600% to over $2000 per coin.
Another way of looking at this is Monero's marketcap only requires ~$30 billion of new investor money to see the price per Monero reach $2000, while for Ethereum to reach $2000, Ethereum's marketcap requires a whopping ~$100 billion of new investor money.
Technical Analysis
There are numerous Monero technical analysts, however none more eerily on point than the crowd-pleasing Ero23. Ero23's charts and analysis can be found on Trading View. Ero23 gained notoriety for his long-term Bitcoin bull chart published in February, which is still in play today. Head over to his Trading View page to see his chart: Monero's dwindling supply. $10k in 2019 scenario, in which Ero23 predicts Monero to reach $10,000 in 2019. There is also this chart which appears to be freakishly accurate and is tracking along perfectly today.
Coinbase Rumours
Over the past 12 months there have been ongoing rumours that Monero will be one of the next cryptocurrencies to be added to Coinbase. In January 2017, Monero Core team member Riccardo 'Fluffypony' Spagni presented a talk at Coinbase HQ. In addition, in November 2017 GDAX announced the GDAX Digit Asset Framework outlining specific parameters cryptocurrencies must meet in order to be added to the exchange. There is speculation that when Monero has numerous mobile and hardware wallets available, and multisig is working, then it will be added. This would enable public accessibility to Monero to increase dramatically as Coinbase had in excess of 13 million users as of December, and is only going to grow as demand for cryptocurrencies increases. Many users argue that due to KYC/AML regulations, Coinbase will never be able to add Monero, however the Kraken exchange already operates in the US and has XMfiat pairs, so this is unlikely to be the reason Coinbase is yet to implement XMfiat trading.
Monero Is Not an ICO Scam
It is likely most of the ICOs which newcomers invest in, hoping to get rich quick, won't even be in the Top 100 cryptocurrencies next year. A large portion are most likely to be pumps and dumps, and we have already seen numerous instances of ICO exit scams. Once an ICO raises millions of dollars, the developers or CEO of the company have little incentive to bother rolling out their product or service when they can just cash out and leave. The majority of people who create a company to provide a service or product, do so in order to generate wealth. Unless these developers and CEOs are committed and believed in their product or service, it's likely that the funds raised during the ICO will far exceed any revenue generated from real world use cases.
Monero is a Working Currency, Today
Monero is a working currency, here today.
The majority of so called cryptocurrencies that exist today are not true currencies, and do not aim to be. They are a token of exchange. They are like a share in a start-up company hoping to use blockchain technology to succeed in business. A crypto-assest is a more accurate name for coins such as Ethereum, Neo, Cardano, Vechain, etc.
Monero isn't just a vaporware ICO token that promises to provide a blockchain service in the future. It is not a platform for apps. It is not a pump and dump coin.
Monero is the only coin with all the necessary properties to be called true money.
Monero is private internet money.
Some even describe Monero as an online Swiss Bank Account or Bitcoin 2.0, and it is here to continue on from Bitcoin's legacy.
Monero is alleviating the public from the grips of banks, and protests the monetary system forced upon us.
Monero only achieved this because it is the heart and soul, and blood, sweat, and tears of the contributors to this project. Monero supporters are passionate, and Monero has gotten to where it is today thanks to its contributors and users.

///Key Issues for Monero to Overcome///

Scalability
While Bulletproofs are soon to be implemented in order to improve Monero's transaction sizes and fees, scalability is an issue for Monero that is continuously being assessed by Monero's researchers and developers to find the most appropriate solution. Ricardo 'Fluffypony' Spagni recently appeared on CNBC's Crypto Trader, and when asked whether Monero is scalable as it stands today, Spagni stated that presently, Monero's on-chain scaling is horrible and transactions are larger than Bitcoin's (because of Monero's privacy features), so side-chain scaling may be more efficient. Spagni elaborated that the Monero team is, and will always be, looking for solutions to an array of different on-chain and off-chain scaling options, such as developing a Mimblewimble side-chain, exploring the possibility of Lightning Network so atomic swaps can be performed, and Tumblebit.
In a post on the Monero subreddit from roughly a month ago, monero moderator u/dEBRUYNE_1 supports Spagni's statements. dEBRUYNE_1 clarifies the issue of scalability:
"In Bitcoin, the main chain is constrained and fees are ludicrous. This results in users being pushed to second layer stuff (e.g. sidechains, lightning network). Users do not have optionality in Bitcoin. In Monero, the goal is to make the main-chain accessible to everyone by keeping fees reasonable. We want users to have optionality, i.e., let them choose whether they'd like to use the main chain or second layer stuff. We don't want to take that optionality away from them."
When the Spagni CNBC video was recently linked to the Monero subreddit, it was met with lengthy debate and discussion from both users and developers. u/ferretinjapan summarised the issue explaining:
"Monero has all the mechanisms it needs to find the balance between transaction load, and offsetting the costs of miner infrastructure/profits, while making sure the network is useful for users. But like the interviewer said, the question is directed at "right now", and Fluffys right to a certain extent, Monero's transactions are huge, and compromises in blockchain security will help facilitate less burdensome transactional activity in the future. But to compare Monero to Bitcoin's transaction sizes is somewhat silly as Bitcoin is nowhere near as useful as monero, and utility will facilitate infrastructure building that may eventually utterly dwarf Bitcoin. And to equate scaling based on a node being run on a desktop being the only option for what classifies as "scalable" is also an incredibly narrow interpretation of the network being able to scale, or not. Given the extremely narrow definition of scaling people love to (incorrectly) use, I consider that a pretty crap question to put to Fluffy in the first place, but... ¯_(ツ)_/¯"
u/xmrusher also contributed to the discussion, comparing Bitcoin to Monero using this analogous description:
"While John is much heavier than Henry, he's still able to run faster, because, unlike Henry, he didn't chop off his own legs just so the local wheelchair manufacturer can make money. While Morono has much larger transactions then Bitcoin, it still scales better, because, unlike Bitcoin, it hasn't limited itself to a cripplingly tiny blocksize just to allow Blockstream to make money."
Setting up a wallet can still be time consuming
It's time consuming and can be somewhat difficult for new cryptocurrency users to set up their own wallet using the GUI wallet or the Command Line Wallet. In order to strengthen and further decentralize the Monero network, users are encouraged to run a full node for their wallet, however this can be an issue because it can take up to 24-48 hours for some users depending on their hard-drive and internet speeds. To mitigate this issue, users can run a remote node, meaning they can remotely connect their wallet to another node in order to perform transactions, and in the meantime continue to sync the daemon so in the future they can then use their own node.
For users that do run into wallet setup issues, or any other problems for that matter, there is an extremely helpful troubleshooting thread on the Monero subreddit which can be found here. And not only that, unlike some other cryptocurrency subreddits, if you ask a question, there is always a friendly community member who will happily assist you. Monero.how is a fantastic resource too!
Despite still being difficult to use, the user-base and price may increase dramatically once it is easier to use. In addition, others believe that when hardware wallets are available more users will shift to Monero.

///Conclusion///

I actually still feel a little shameful for promoting Monero here, but feel a sense of duty to do so.
Monero is transitioning into an unstoppable altruistic beast. This year offers the implementation of many great developments, accompanied by the likelihood of a dramatic increase in price.
I request you discuss this post, point out any errors I have made, or any information I may have neglected to include. Also, if you believe in the Monero project, I encourage you to join your local Facebook or Reddit cryptocurrency group and spread the word of Monero. You could even link this post there to bring awareness to new cryptocurrency users and investors.
I will leave you with an old on-going joke within the Monero community - Don't buy Monero - unless you have a use case for it of course :-) Just think to yourself though - Do I have a use case for Monero in our unpredictable Huxleyan society? Hint: The answer is ?
Edit: Added in the Tail Emission section, and noted Dan Bilzerian as a Monero investor. Also added information regarding the XMR.TO payment service. Added info about hardfork
submitted by johnfoss69 to CryptoCurrency [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Brave.

Brave est un navigateur blockchain type Open source qui met la vie privée des utilisateurs en tête et bloque par défaut les publicités et les trackers. Il dispose d'un cryptage de bout en bout des données et d'un client VPN/TOR intégré, il vous permet de travailler avec des torrents et des liens magnet, il prend en charge des applications décentralisées ... et, en plus, il paie les utilisateurs pour chaque affiche des publicités avec des Basic Attention Tokens natifs. Pour ce faire, la portefeuille de crypto-monnaie est intégré dans le navigateur, qui prend en charge des BAT.

Basic Attention Token n'est pas une sorte de noname sur la ligne 2000 de CoinMarketCap. Ceci est une crypto-monnaie, qui est à la place 30 en termes de capitalisation, elle est à vendre sur toutes les plus grandes bourses, telles que Binance, et elle est soutenue par tous les portefeuilles de crypto-monnaie populaires.

À ce jour Brave est considéré comme l'un des meilleurs navigateurs pour le Web 3.0.

Le navigateur blockchain Brave a été introduit en 2015 pour la première fois. Le fondateur du projet est Brendan Eich, co-fondateur de Mozilla Project et créateur de JavaScript. Sabge fonctionne sur la base de Chromium de Google, et son code source est entièrement ouvert. Il y a des versions pour Windows, MacOS, Linux, IOS et Android.

Le fait intéressant: en 2018, Brave Software Inc. a fini à la douzième place dans le classement des entreprises technologiques les plus prometteuses à surveiller, selon le Wall Street Journal. En outre, Brave est devenu le navigateur par défaut dans le smartphone blockchain HTC EXODUS.

Les trucs essentiels du navigateur:

- la possibilité de gagner des Basic Attention Tokens (BAT) pour regarder des publicités, créer du contenu, participer à airdrops et effectuer des tâches simples (nous en parlerons plus en détail ci-dessous);

- bloquer les publicités, les bannières, les pop-ups, les trackers et les cookies de tiers par défaut (vous pouvez également désactiver les boutons des réseaux sociaux et les messages intégrés dans les paramètres);

- cryptage de bout en bout des données, VPN et TOR intégrés, HTTPS forcé (par exemple, en plus de la fonction trés connue « ouvrir l'onglet privé », il y a aussi une fonction « ouvrir l'onglet privé avec TOR »);

- portefeuille crypto-monnaie intégrée avec le soutien de Basic Attention Tokens, Bitcoin, ethereum et lightcoin, qui vous permet de travailler avec des applications décentralisées basées sur ethereum et ETH-nodes. L'icône pour accéder au portefeuille se trouve juste à côté de la barre d'adresse, et l'interface ressemble à MetaMask. Pour trouver votre adresse et recharger votre portefeuille, cliquez sur Add funds. Pour obtenir SEED à restaurer, appuyez sur l'engrenage.

- système de micropaiement Brave Payments intégré. En bref, vous pouvez effectuer de petits paiements en faveur de vos sites préférés que vous visitez le plus souvent : dans les paramètres, il suffit de spécifier le montant en BAT ou d'une autre crypto monnaie que vous êtes prêt.e.s à dépenser dans un mois, et le navigateur lui-même divisera l'argent entre les ressources que vous choisissez proportionnellement au nombre de vos visites;

NB: les identifiants de portefeuilles et toutes les transactions sont anonymes, donc personne, même Brave lui-même, ne sait qui à qui et combien de BAT il envoie.

- possibilité d'envoyer des dons directement aux créateurs de contenu, tels que les blogueurs qui ont leur propres sites ou les utilisateurs de YouTube, Twitch et Twitter. Par ailleurs, le navigateur détermine lui-même les créateurs de la vidéo, indépendamment du site sur lequel la vidéo est publiée.

- prise en charge des fichiers torrent et des liens magnet.

En plus, puisque le navigateur est basé sur Chromium, vous pouvez synchroniser rapidement vos données, signets, histore et onglets.

Les analystes confirment la perspective prometteuse du navigateur Brave — même si l'utilisateur n'est pas intéressé par une publicité de qualité, il va avoir un excellent navigateur rapide pour accéder l’Internet. De son coté, les annonceurs reçoivent un outil d'analyse offrant des données pertinentes sur l'activité des utilisateurs.
Télécharger https://brave.com/vad601
submitted by vadim77top to u/vadim77top [link] [comments]

12-22 13:34 - ' Etherscan Export CSV Data - 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-4699...' by /u/mahdiamolimoghadam removed from /r/Bitcoin within 128-138min

'''
 Etherscan Export CSV Data - 0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-46998878-6', { 'anonymize_ip': true }); .ether-search-heading { pointer-events: none !important; } .ether-search-heading .ui-menu-item-wrapper, .[link]^^1 .ui-menu-item-wrapper { cursor: default !important; border-color: transparent !important; 0 } .ui-menu-item .ether-search, .[link]^^2 .ether-search { background-color: transparent !important; border-color: #e7eaf3 !important; } .[link]^^2 .ether-search { background-color: #f8fafd !important; } .ui-menu-item .ether-search, .ui-menu-item .ether-search { background-color: transparent !important; border-color: transparent !important; } body.dark-mode .[link]^^2 .ether-search { background-color: #012137 !important; color: #a2b9c8 !important; border-color: #013558 !important; } //  Eth: $148.33 (-0.12%) Home Blockchain 
View Txns
View Pending Txns
View Contract Internal Txns
 View Blocks Forked Blocks (Reorgs) 
View Uncles
Top Accounts
Verified Contracts
 Tokens 
ERC-20 Top Tokens
View ERC-20 Transfers
ERC-721 Top Tokens
View ERC-721 Transfers
 Resources 
Ethereum Directory
Charts & Stats
Top Statistics
 More Developers 
APIs
Verify Contract
Byte to Opcode
Broadcast TXN
Vyper Online Compiler
 Swarm & ENS 
SWARM Search
SWARM Upload
ENS Events
ENS Lookup
 Service Tracker 
Dapp Tracker New
DEX Tracker
DEX OrderBooks
Gas Tracker
Node Tracker
Loan Tracker
 Misc 
Mining Calculator
Verified Signature
Similiar Contracts
Label Word Cloud
 Sign In  Explorers 
Ethereum Mainnet
Ethereum Mainnet CN
Ropsten Testnet
Kovan Testnet
Rinkeby Testnet
Goerli Testnet
EWC Chain
Beacon Testnet Eth2.0
 All FiltersAddressesTokensName TagsLabelsWebsites 
Download Data (Transactions)
The information you requested can be downloaded from this page. But before continuing please verify that you are not a robot by completing the captcha below.
 Export the earliest 5000 records starting from  Powered by Ethereum 
Etherscan is a Block Explorer and Analytics Platform for Ethereum, a decentralized smart contracts platform.
 Preferences 
Company
About Us
Advertise
Contact Us
Brand Assets
Terms of Service
Community
Developer APIs
Knowledge Base
Network Status
Disqus Comments
Social Links
Twitter
Facebook
Medium
Reddit
Etherscan آ© 2019 (A)
Donations 0x71c7656ec7ab88b098defb751b7401b5f6d8976f
 This website uses cookies to improve your experience and has an updated Privacy Policy. Got It $(window).on('load', function () { // initialization of HSMegaMenu component $('.js-mega-menu').HSMegaMenu({ event: 'hover', pageContainer: $('.container'), breakpoint: 767.98, hideTimeOut: 0 }); }); $(document).on('ready', function () { // initialization of header $.HSCore.components.HSHeader.init($('#header')); // initialization of unfold component $.HSCore.components.HSUnfold.init($('[data-unfold-target]'), { afterOpen: function () { $(this).find('input[type="search"]').focus(); } }); // initialization of malihu scrollbar $.HSCore.components.HSMalihuScrollBar.init($('.js-scrollbar')); // initialization of focus state $.HSCore.components.HSFocusState.init(); // initialization of go to $.HSCore.components.HSGoTo.init('.js-go-to'); // initialization of cubeportfolio //$.HSCore.components.HSCubeportfolio.init('.cbp'); }); var strGlobal = sessionStorage.getItem("ShowAs"); var cookieconsent = getCookie("etherscan_cookieconsent"); if (cookieconsent !== "True") { document.getElementById("divcookie").style.display = "block"; }; function getCookie(cname) { var name = cname + "="; var ca = document.cookie.split(';'); for (var i = 0; i < ca.length; i++) { var c = ca[i]; while (c.charAt(0) === ' ') { c = c.substring(1); } if (c.indexOf(name) === 0) { return c.substring(name.length, c.length); } } return ""; } $("#btnCookie").click(function () { $("#divcookie").fadeOut("slow", function () { var d = new Date(); d.setTime(d.getTime() + (1095 * 24 * 60 * 60 * 1000)); var expires = "expires=" + d.toUTCString(); document.cookie = "etherscan_cookieconsent=True" + ";" + expires + ";path=/";; }); }); function handleSearchText(data) { searchAddress = false; if ($("txtSearchInput").val() == "") { $("#hdnSearchText").val(""); } } jQuery(document).ready(function () { $.HSCore.components.HSRangeDatepicker.init('.js-range-datepicker'); $.HSCore.components.HSValidation.init('.js-validate'); }); var correctCaptcha = function (response) { //alert(response); }; function get_action(form) { var v = grecaptcha.getResponse(); if (v.length == 0) { console.log("You can't leave captcha code empty"); return false; } else { console.log("Captcha completed"); document.getElementById("responsetext").innerHTML = "
Your download is being processed.
"; document.getElementById("ContentPlaceHolder1_divAlertMsg").style.display = "none"; document.getElementById("ContentPlaceHolder1_btnSubmit").style.display = "none"; document.getElementById("rcaptcha").style.visibility = "hidden"; return true; } }
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: mahdiamolimoghadam
1: ether-search-heading:hover 2: ui-menu-item:hover 3: ui-menu-item:hover 4: ui-menu-item:hover
submitted by removalbot to removalbot [link] [comments]

A proposal for a decentralized social network layer capable of storing rich media

Hello folks!
I have been thinking about the idea of decentralised social network for quite some time, and recently the ideas formed what I think is a rather compete picture. In light of recent Yours announcements I think it's a proper time to share these ideas with a community.
It turned into a long post, and there is no guarantee these idea have a contact with reality, so forgive me if I stole a few minutes of your time.
Protools and standards that will help to understand the proposal (besides blockchain): Memo - blockchain-based base social network protocol, WebRTC transport protocol, WebTorrent JavaScript BitTorrent protocol implementation, BidDB - blockchain crawler by u/unwriter, Progressive Web Apps –– cross platform mobile and desktop apps installable without gatekeepers.
Overall, I prefer WebTorrent in my proposal instead of IPFS as BitTorrent protocol is proved to be robust for almost two decades, while IPFS at this moment is very young and overhyped.
What I propose is a layer that can exist on top of any Memo-like protocol, where Memo forms a base social network state, and the media layer extends its capabilities so that it's possible to store rich media files without any centralised hostings.
Here are the hypothesis/axioms I use as a basement for such a media layer
The proposed idea is based on a play of three actors, or a triangle of 'Original Posters' 'Moderators' and 'Viewers'. Below is detailed explanation of each role, and there are some sub-roles that will be discussed alongside.
Original Poster is anyone connected to the internet who is willing to share any kind of content with the world with only modern browser and a content itself in possession.
Moderator is anyone in the connected world who is willing to be engaged into a socially important role with only a desktop computer with decent amount of free disk space in possession. There is no need to ask a permission to become a moderator.
Viewer is anyone willing to enjoy the media without the need to be engaged with existing social media platforms.
Base technologies:
  1. A webtorrent enabled website with a support of basic bch wallet functionaloty.
  2. A webtorrent enabled website with a feed of op_return messages. Note: 1 and 2 can be implemented as a single platform. (e.g. instant.io x datacash x chainfeed)
  3. A webrtc enabled cross platform desktop torrent client hybridised with a bitdb instance
  4. A webtorrent enabled torrent tracker(s)
The flow:
The Original Poster uses a web browser to create a torrent of the attached media. OP registers the torrent on a tracker, puts infohash alongside a tracker url and desired hashtags into op_return and publishes the memo formatted transaction to bitcoin network. The progress bar shows the status of the 'pseudo' upload that's familiar to most non-tech savvy people. During that phase the content is in network’s ‘working-memory’.
The Moderator uses software to parse the op_return feed. The software continuously downloads all the media from initial seeders and presents it to moderator one by one. It does not open itself as a seeder until moderator decided whether this is a kind of content worth bothering. It's completely subjective decision and every moderator can follow personal strategy. It can be imagined as clicking the green and red buttons where the red one is clicked if the content is subjectively a complete garbage. Once the green button is clicked, moderator becomes a seeder of the content. Moderator can also 'reply' to OPs message with hashtags: every hashtag that corresponds to one of initial hashtags gives it additional weight. Every omitted hashtag loses weight. Some new hashtags can as well be introduced by a moderator. The deeper the history of moderator’s categorization activity, the more weight categorization transaction gives to hashtags (but this is a higher level concept and can vary from implementation to implementation). Moderator creates an internal queue of stored media and deletes the oldest content as soon as the storage threshold is hit (but some other policy can be implemented if moderator decides so). Described above is a level00 moderator who decided to judge the very unclassified content that's received directly from initial seeders.
If the collective speed of content approval is lower than speed of new content introduction, OPs is notified that it maybe necessary to wait for a prolonged time for content to be uploaded, or the fee can be included towards a 'super-moderator' address, so moderators who operate under a single swarm will priorities that content. That address can be a mulitisig where each moderator is a part of a joint account. Once in a while they unlock funds and distribute them in accordance to each moderator's contribution based on the number of 'categorisation transactions' – replies with hashtags, and there can be additional rules that prevent cheating such as only one categorisation transaction to each OP post is taken into account, or rules with some degree of centralisation that encourage seeding, such as the more the moderator seeds the more he earns from these fees if the swarm operates under a single tracker). Alternatively, payouts can be implemented as simple and centralised as existing mining pools.
There are Moderator sub-roles, such as a moderator can choose to only parse the content that was categorised to some degree (e.g. only nsfw content, or only non-nsfw content). The deeper the categorisation, the more precise is the kind of content that's fetched by a moderator, to a degree where moderator can actually enjoy the process a lot as he approves the kind of content he is the most interested in, akin to browsing chronologically filtered subreddit feed. Moderator can also choose to parse several 'categories' simply by 'subscribing' to several hashtags or hashtag tuples. The subroles can be named like moderator level01, level10, level11 etc. By replying to lower level moderator's categorisation transactions, higher-level moderators gives or removes hashtags weight.
The Viewer is presented with a feed of op_return media posts (similar to chainfeed.org), and the content is fetched on the fly from the webtorrent network. The moment the content is fetched the viewer becomes a seeder and continues seeding for as long as content is cached inside browser's storage. That way, the more moderators have approved the content, and the more followers the OP has, the longer the content will persist in a network's 'short-term’ memory.
The Viewer role has sub-roles as well. As soon as the user is engaged into that kind of social network, he can become a Loyal User by installing a special software on a desktop computer that is very similar to Moderators's software, but differs in a following way: viewer inputs Memo account identifier (which is a bitcoin address) into the software that only fetches and seeds the content that was liked by a user, completely in background. As the whole network state is a public information, each user can increase the level of loyalty by specifying the maximum 'dimension' of the content being fetched and seeded, where 1D is the content liked by initial viewer, 2D is the content liked by initial viewer and accounts followed by initial viewer and so on, up until around 6D, where mostly anything that was liked is stored within individual's storage threshold. Loyal Viewers can adopt different policies to restrict the content being fetched and seeded by blacklisting or prioritising certain hashtags, adopting some third-party priority/black lists, as well as specifying storage threshold. Contented that is stored by Loyal Users can be imagined as persisted in networks ‘long-term’ memory. The more Loyal Users are engaged in a network, and the more likes certain content has, the longer it will be stored.
It's worth noting that centralised torrent trackers are not points of failure per se as they are mostly used to pass the content from initial [browser] seeders to moderators. As soon as the content is approved by at least one moderator it can be listed on different trackers operated by different entities, and there can be a rotation of trackers if necessary. That said, each moderator can always re-register all of the content in possession on a new tracker, and the tracker can be adopted by web op_return feed providers. Moreover, the ongoing evolution of browser standards related to web-workers will make in-browser dht lookup a reality in a 2-3 years, which is likely a reasonable window to bootstrap such a network. OP can use some trackers only known among neighbours in particular area.
The layer is vulnerable to a situation where trackers blacklist certain content, and such content can be accessed by using a different op_return feed provider with different trackers, or a native app that will be able to fetch content seeders from the dht. Networks such as i2p can be used to create deep media layers operated anonymously. Also, as Tor is adopted by mainstream browsers (e.g. Brave) Viewers can access trackers through Tor, and such trackers are more resilient. These viewers will be unable to seed, however.
The layer is capable of storing any kind of content, but during bootstrap phase it will be most suitable for images, short video/audio messages, markdown formatted blogposts with embedded media. Each Moderator / Loyal Viewer can adopt different policies related to the size of the content being fetched and stored according to investments into storage facilities. If the proposed idea works, there will be parties willing to store some heavyweight content such as movies. If the layer is accessed from within a native app, it's even capable of livestreams, where the more users are watching a stream the more bandwidth there is for others to join, completely without any centralised content distribution networks.
As outlined above, the layer consist of short-term memory layer capable of storing content for minutes-days, and long-term memory layer capable of storing content for months and probably years. I use biological metaphors here instead of computer science ones as in my opinion the behaviour of this media layer resembles human memory more than computer memory, as ultimately it's a collective human brain decides what to remember and for how long. There is no guarantee that something will be stored at all, and at the same time some kind of content that's collectively perceived as valuable can be stored for a prolonged period of time.
Few words in regard to monetisation. Some heavily engaged players can choose to archive old content and provide access in trade for some micropayments. I see like the Joystream protocol can be used here with little changes such as adoption of webrtc transport protocol. Some different monetisation strategies can be discussed later as microtransaction technologies are more mature and well understood.
I am willing to form a workgroup of developers and creative enthusiasts who find the described idea interesting. I have been thinking about a possible starting point, so I have acquired the BlockPress source code with intention to distribute it in open source. We postponed the announcement a bit as the process of open-source release always takes time. BlockPress is an alternative Memo protocol implementation with a rather slick UI that's familiar to non tech savvy users - the quality I find extremely important. I think this can be a good starting point. If you think so as well, feel free to drop me a telegram message @taowanzou or [proton mail](mailto:[email protected]). Follow me on memo as well!
Sorry for any possible mistakes as English is not my primary language. And thanks for you time reading this!
submitted by taowanzou to btc [link] [comments]

r/Bitcoin recap - February 2018

Hi Bitcoiners!
I’m back with the fourteenth monthly Bitcoin news recap.
For those unfamiliar, each day I pick out the most popularelevant/interesting stories in Bitcoin and save them. At the end of the month I release them in one batch, to give you a quick (but not necessarily the best) overview of what happened in bitcoin over the past month.
You can see recaps of the previous months on Bitcoinsnippets.com
A recap of Bitcoin in February 2018
submitted by SamWouters to Bitcoin [link] [comments]

Alternative, DAO ANDROID APP STORE, DApps, on ETH blockchain, STO + DEX Exchange

Alternative, DAO ANDROID APP STORE, DApps, on ETH blockchain, STO + DEX Exchange

https://preview.redd.it/ql4cxspalv831.png?width=800&format=png&auto=webp&s=6887e75c9e10ceb8b1c2596c0256410d9f8bb5d1
DAO PlayMarket 2.0 - is the alternative, decentralized marketplace of Android applications and games, DApps applications, on the Ethereum blockchain (ETH), with the STO platform, for monetization of applications and a decentralized exchange.
HONESTY. TRANSPARENCY. ACCESSIBILITY.
Individual freedom cannot exist without economic security and independence. So we created the smooth, stable lock store Android apps and the DApp store using the Ethereum blockchain and smart contracts for fast-growing, huge market of mobile applications for Android. Behind more than 2 and a half years of active development and improvements that continue to bring even more new features. You, as a developer, nothing to lose, can only benefit from publishing their developments on the platform and attract new users.
Now we are preparing to implement our international marketing plan, familiarity with the platform a large number of users, developers, and investors in dividend tokens of projects with the STO (Security Token Offering) platform and in the PMT token. Placing your application on DAO Playmarket 2.0 will be useful, especially if you have users from those countries and regions where the use of the built-in Google Play Market or some of your application is prohibited there, because of failures or non-compliance with politic. Like many crypto applications, or competing directories.
DAO PlayMarket 2.0 is the only decentralized Android app store that accepts payment in ETH cryptocurrency and a marketplace platform for Dapp applications on the Ethereum blockchain, in combination with the developer platform STO and DEX Crypto Exchange. The main goals and objectives of DAO PlayMarket 2.0 are the creation of a stable economic model for developers, investors and users, as well as the introduction of a single standard for the tokenization of the mobile application market. Automatic operation of the entire platform on more than 52 internal smart contracts and open source. Advantages of DAO PlayMarket 2.0 over other platforms:
BENEFITS FOR THE USER
On the platform of DAO Playmarket 2.0, via the web site and Android application, the user can:
  • Invest through STO, in the development of the application you like and receive dividend income in ETH, from it, buy and sell on the DEX exchange.
  • Receive additional benefits, for example, in the form of application tokens for purchasing it, or for performing actions within the application. Payments to users in Ethereum, for installing applications from developers, participants of STO. Soon the first payment for the installation, after the STO game CryptoDuel.
  • Get secure and uninterrupted access to a decentralized, censorship-resistant platform, both at the country level and at the level of specific mobile app stores.
  • Built-in mobile application and platform, DApps browser, based on MetaMask wallet, with a DApp application directory.
  • A decentralized cryptocurrency exchange is integrated into the DAO PlayMarket 2.0 platform, which includes an open API.
  • Public and open source all the internal smart contracts, and documentation of the whole platform on GitHub.
  • Pay for purchases for cryptocurrency. All paid applications and in-app purchases are paid through the ETH cryptocurrency.
  • Holding 2000 PMT tokens, the user can vote for the further development of the entire project.
  • Holders PMT received dividends from STO and listings in the form of other tokens from any number of tokens PMT, a one-time.
Thus, the user gets a chance to be not just consumers, but also to participate actively in the work of the platform, contribute to, and benefit from financial benefits, to participate in the vote on the development platform.
BENEFITS FOR ANDROID APPLICATION DEVELOPERS
  • The ability to produce a token of your Android application and distribute them among the current shareholders and to implement them on integrated platform STO (Security Token Offering - the location of the investment (security) tokens. Release tokens into the possession of investors, with the aim to dividends or voting rights. STO requires a license, approved by the SEC and other regulatory bodies).
  • DAO PlayMarket 2.0 will provide developers with simple and effective tools to promote your application, including a handy feedback between developers and users.
  • DApp mobile browser, with a directory of affiliate applications to attract users into Your infrastructure. Soon to be a full-fledged office developer DApp. Now can be added only with our help.
  • The platform is resistant to censorship — basic information is stored on the blockchain, which allows access to applications from anywhere in the World.
  • Commission platform is 1% (for others stores about 30%). This commission is taken as a node of the platform, as a reward for financial operations, support of the node and storing all files.
  • Payment to the developer of income from sales of his application and content within it for a strictly fixed period according to the concluded smart contract, as well as payments to all holders of a developer's token, a specific application.
  • The source code of all PlayMarket 2.0 internal smart contracts, the DAO PlayMarket 2.0 mobile app and the playmarket.io web site are available on GitHub. All platform documentation is open.
  • The ability to sell their applications and make domestic sales for cryptocurrency.
  • You Will also be available to all users of the platform, and other applications, from all countries of the planet Earth.
  • Push notification is implemented using pubsub system IPFS in order to meet decentralization.
  • Referral system for all application developers, soon.
  • The complete absence of bureaucracy.
To add your Android version of an application or game, you need to register via MetaMask the browser extension or file keys from the Ethereum wallet in the DAO PlayMarket 2.0 blockchain, as a developer - https://dev.playmarket.io/auth/ . Add an application, description, contacts, categories (now there are 2 subject categories with crypto applications https://playmarket.io/category/1/1 and https://playmarket.io/category/1/34, among others), etc. information. Then, if necessary, update the version of your app, add any other development for free (the cost of gas for the transaction in the Ethereum network). Now You can sell your app for the cryptocurrency, or we help to start STO - monetization of Your apps, games, generating income (through the addition, by contact with our specialist in Telegrams https://t.me/totalGreX ) and automatically add your new token ERC-20, domestic decentralized exchange DAO Playmarket 2.0. If you are going to put a link to download the app from PlayMarket DAO 2.0, alternatively, next to the link to download from Google Play Market, use the icon from here https://github.com/CryptonStudio/PlayMarket-2.0-App the verification Process of the developer - transfer code to confirm the authorship, implemented through ipfs/pubsub and mailing address with the Google Play store if the app is there.
ADVANTAGES FOR DAPP APPLICATION DEVELOPERS ON THE ETHEREUM BLOCKCHAIN
Dapps for high-quality applications, we offer a reciprocal link exchange on Your Dapp from our directory, shopping sites https://dapps.playmarket.io in exchange for a link from a page with your instructions on how to access Your DApp, using a variety of wallets, Android app to Playmarket 2.0 - https://playmarket.io/detail/0 in the directory which will be your DApp. It is a browser Dapp based on MetaMask and a public account developers Dapp will also appear in the near future, as other improvements in this section. Now add to the catalog Dapp, occurs only with our help. If You already have your token, then its possible listing on the stock exchange DAO market, 5% of the total number of tokens, as in STO, which will go to dividends to all holders of the PMT token.
After placement, You will have access to all current and future users of the international multi-platform Game DAO 2.0, which potentially may be interested in and Your multilingual application Dapp.
Help at any stage of cooperation, consider various options, please contact us.
ADVANTAGES FOR OWNERS OF NODES
For stable operation of the platform, it is necessary to have a certain number of nodes in the network (now there are 10 nodes, the nodes in different countries, a link to a map with nodes) which provide reception and transmission of transactions to the blockchain, application transmission and information about them, and storing all files. The owners of the nodes as a motivation receive a reward in the form of 1% of processed transactions. This and all Commission platform.
The more users the platform will have, the more need nodes. To add your node to the list of trusted, its owner must make a guarantee deposit, in the base currency of the platform - 10 ETH and 5000 PMT token, on a smart contract. A Deposit is required as collateral and guarantees fairness in the node, while its size is computed dynamically based on the pass-through payment transactions. Details in the English language the white paper.
BENEFITS FOR INVESTORS
Investors who participated in the DAO PlayMarket 2.0 crowdsale who bought PMT tokens in 2017 now receive dividend income from PMF (PlayMarket Foundation). This fund is replenished by a 5 percent commission, with the release of application tokens on STO. The DEX exchange is already built into the platform, on which CDLT tokens of the first STO from CryptoDuel can already be exchanged for TUSD or ETH, as well as the PMT token. Exchange decentralized, and therefore more resistant to possible hacker attacks and disruptions in work.
The Ticker token DAO PlayMarket 2.0 - PMT. Standard tokens - ERC20 (the Ethereum blockchain). The total delivery volume of 3 000 000 PMT tokens (750 000 PMT frozen in development team for 2 years). In 2017, 2 250 000 PMT tokens were sold through ICO, and distributed to investors.
PMT holders automatically become members of the PMF Fund - PlayMarket Fund (wallet address fund). The main goal of the fund is to openly manage the resources of the Fund together with other members of DAO PlayMarket 2.0, to receive dividends. Application developers at DAO PlayMarket 2.0 can issue independent tokens for their applications. The PlayMarket Foundation saves 5% of tokens from each application hosted on the DAO PlayMarket 2.0 platform, as well as 5% from the listing of tokens of Dapp applications and Android applications, on the market exchange, for paying dividends to PMT token holders, based on their share.
All holders of tokens PMT that hold more than 2000 PMT token, have the right to vote in DAO PlayMarket.io 2.0, in all directions of further project development - all in the hands of users. Holders PMT received dividends from STO and listings in the form of other tokens from any number of tokens PMT, a one-time. In the future, receive dividends at the ETH, received the dividend from STO tokens (in total, depending on the specific turnover of the application), by type, as dividends from shares of large companies, only then with specific games and applications.
Wish everyone a good day, developers, future users, investors and partners! Thank you for any feedback and Your opinion about the new platform, made with love, for a just future, all participants of the market of Android games, apps and DApps, on the Ethereum blockchain.
Requires Android: 5.0 x and aboveEnglish interface: Yes
Download:Version: 1.4.24. Download APK file from the official website of the platform.
Developer: https://crypton.studioYouTube Video: https://youtu.be/QYjyfCt6gWc
Screenshots of the internal functions of the platform:
https://preview.redd.it/9c1b6bvmlv831.jpg?width=606&format=pjpg&auto=webp&s=037c89227be84a698ed82e97d9c28975afbdccc8
https://preview.redd.it/9frsievmlv831.jpg?width=606&format=pjpg&auto=webp&s=2dc970a2f15722d378c40577f537d7c3dee24f09
https://preview.redd.it/rhaftevmlv831.jpg?width=606&format=pjpg&auto=webp&s=69a2215a217b99e1d2bd55f203d8f551a90679a9
https://preview.redd.it/mgr2jevmlv831.jpg?width=606&format=pjpg&auto=webp&s=a1d6df295f1885ddcbcb27156621ec0eb04ee5bf
https://preview.redd.it/g25z7hvmlv831.jpg?width=606&format=pjpg&auto=webp&s=0bbfb329b5771185128432b41a84844204397f5f
https://preview.redd.it/8ic9rfvmlv831.jpg?width=606&format=pjpg&auto=webp&s=80e824307433bf81de048fc7312a9d819428d7f0
https://preview.redd.it/aiek5evmlv831.jpg?width=606&format=pjpg&auto=webp&s=8607ba009de04bb91170246b0579a24a870f2464
https://preview.redd.it/8x7i9fvmlv831.jpg?width=606&format=pjpg&auto=webp&s=5fd8489907b51c106ad8759807109ab19e9b599e

Changes: update the app to version 1.4.21 - 1.4.24What's new:
  1. Added DApps Browser with support MetaMask- you can Now open any website with support MetaMask, and work with built-in wallet app.- By default the website opens https://dapps.playmarket.io
  2. The IPFS module updated to stable version 0.4.19 (you can update in settings).
  3. Changed the order of the updates and display the data on the pages of the wallet and dividends.
  4. In My application now displays the version name of the application and size, not just a code version of the application.
A decentralized exchange:https://dex.playmarket.io/
  1. Dobalina trading pair to TUSD.
  2. Implemented data updates through a WebSocket connection.
  3. Added chat (anonymous).
Platform:
  1. The IPFS module on all nodes updated to the stable version 0.4.19.
  2. Transfer code to confirm the authorship is implemented through ipfs/pubsub.
  3. Website developer fixed bugs, made improvements on the interface.
------------------------------------------------------------------------------------
Read more about the platform and the last in 2017 ICO: https://ico.playmarket.ioWebsite DAO PlayMarket 2.0 App Store: https://playmarket.ioDownload Android app DAO Game 2.0: https://playmarket.io/detail/0Developers add your app: https://dev.playmarket.ioPlatform for ICO/STO: https://playmarket.io/stoManaging nodes nodes: https://nodes.playmarket.ioGroup Telegram: https://t.me/playmarket_2Page in FB: https://www.facebook.com/playmarket2.0/Page on Twitter: https://twitter.com/en_playmarket2Youtube Channel: https://www.youtube.com/channel/UCErfyOgXb_3UQh9i7LZAYwA/featuredBitcoinTalk: https://bitcointalk.org/index.php?topic=2311696Medium: https://medium.com/@playmarket2.0White paper EN: https://ico.playmarket.io/images/docs/wp_playmarket_ru.pdfWhite paper en: https://ico.playmarket.io/images/docs/wp_playmarket_en.pdfThe #Developers of #DAO #PlayMarket 2.0: https://crypton.studioGitHub: https://github.com/CryptonStudioToken Tracker: https://etherscan.io/token/0xc1322d8ae3b0e2e437e0ae36388d0cfd2c02f1c9Buy token PMT: https://yobit.net/en/trade/PMT/USD , https://yobit.net/en/trade/PMT/BTC , https://dappdex.io/PMT/ETH and https://dex.playmarket.io/PMT/ETH
We look forward to seeing Your work on a decentralized platform, join the future!
submitted by DAO_PlayMarket_2_0 to u/DAO_PlayMarket_2_0 [link] [comments]

BITCOIN WALLET VERSPRICHT ANONYME TRANSAKTIONEN How to Trace a Bitcoin Transaction using a Bitcoin ... How to remain anonymous while using bitcoin - YouTube Free Anonymous Bitcoin Hacker Tool - NO servey 2015 Tutorial: How to use CashShuffle to Have Anonymous Bitcoin ...

After using Bitcoin Tracker to make tracking bitcoin through the blockchain easier and recordable, using Bitcoin Tracker's 3 pane wallet explorer, or three pane block explorer, you might have saved time. Spend that time with your family or enjoying life your own way. Save the transaction flows and wallet tags for future reference. Were your wallets anonymous or had someone tagged your wallet ... A Bitcoin transaction is a confirmed transfer of Bitcoins, which is broadcasted to the network, and consequently saved there in the form of blocks (this is the way the data is recorded in files). Every user can track the chain of operations, even from the beginning (receiving of the very first crypto assets). Transactions are carried out between special wallets. Normally, users (investors) buy ... Buying bitcoin is a bit like buying contraception: it’s a basic human right, you should be entitled to do so privately, and it’s nobody’s business what Bitcoin transactions are recorded on a public ledger. Anyone who traces a public address can know the origin and/or destination. There is no protocol-level procedure to anonymize these bitcoins, which is why a Bitcoin mixer is required to hide identity.. Bitcoin mixing is a process that tries to break the linkability or traceability. Since it’s inception, Bitcoin has been thought of as an anonymous way to move money. Recently, however, a few firms have built software that can track the movement of coins and help law enforcement track illicit earnings. Pseudo-anonymous Transactions. When creating a wallet, users are given an address that allows them to receive coins. This address is just a long string of numbers and ...

[index] [5780] [10460] [3508] [17664] [10910] [34322] [30779] [4556] [15741] [18636]

BITCOIN WALLET VERSPRICHT ANONYME TRANSAKTIONEN

Is Bitcoin Anonymous? Bitcoin and Distrust of Governments - Duration: 7 ... How To Double Spend Your Stuck Bitcoin Transaction with FSS-RBF - Duration: 8:22. m1xolyd1an 86,315 views. 8:22 "The ... Bitcoin is a cryptocurrency that can help protect your identity when making purchases online. But it's not foolproof. Kevin Mitnick, one of the world's most ... You may not be able to buy Bitcoin completely anonymously, but some ways do protect your privacy more than others. This video shows 5 ways you can try purchasing bitcoins anonymously! If you have ... CashShuffle allows you to make your Bitcoin Cash non-traceable. You can stay anonymous with this easy-to-use software. Roger Ver walks you through the steps ... The Crypto Dad shows you how to trace a Bitcoin transaction. Important software used is: Electrum bitcoin wallet: https://electrum.org/#home The Blockchain e...

#