ALERT: Tracing extorted bitcoin - CipherTrace

Command & Conquer: Red Alert 3 - Uprising Origin Key is for sale on cryptothrift.com for Bitcoin and Litecoin https://cryptothrift.com/auctions/download-software/command-conquer-red-alert-3-uprising-origin-key-2/

Command & Conquer: Red Alert 3 - Uprising Origin Key is for sale on cryptothrift.com for Bitcoin and Litecoin https://cryptothrift.com/auctions/download-software/command-conquer-red-alert-3-uprising-origin-key-2/ submitted by duetschpire to cryptothrift [link] [comments]

Idea | Tip Nano to creators

Hey guys, my name is Tolik and I'm new to Nano.
I would like to tell you a bit about myself, and then about some ideas that I would like to share with you :)
I'm a content creator form Israel, and I have about 65k subscribers over my 3 channels. I'm also the first Israeli partnered on Twitch and been doing that for 8 years now.
Had a lot of fun with it for the first few years, playing my favorite games and earning good money, and eventually burning out hating the game that got me all my following. Our (Israeli) community exploded on youtube, but to make the most of it you need to make mindless trendy content, playing trendy and pretty childish games. I did that for a while, but it was too hard for my mind and I ended up burning out hard stepping away for a long while.
Back in 2013 I first stumbled upon the world of crypto and realized the potential of the blockchain and the implementation of that technology in our world. Not enough to buy enough to get rich, but I never even considered that it could get to the volumes it got to now. In 2017 when it exploded, I realized I had some leftover coins from 2013-14 and cashed out a few thousand dollars, with the pain it could have been millions if I was a little more aware. Oh Well.
A few years ago, I got into the world of self-development and got a new perspective on life. Doing only what I love and grooming a small but good community on youtube, not caring about trends, views, and money in my pocket.
A few days ago, a colleague of mine started to promote some unknown coin to his child viewers, basically, the premise is a coin that you could mine on your phone. Immediately I had some red flags popping off my mind, especially because he promoted some shady CSGO gambling sites that I didn't even want to look into. He of course had his promotion code for registering to the gambling site, and using the mentioned crypto (downloading the app).
If you can mine it on your phone, what would stop you using an expensive setup and just dominate the market? The fact that he advertised it as a get rich scheme, and the fact that it's a referral pyramid network, does not seem safe.
After looking into it I did not see any promise, especially after I found so many altcoins with big communities that his crypto didn't have, information that did not add up, and a bunch of weird stuff going on.
Because I started researching the crypto world (after so many years not being aware of what happened to it), youtube started suggesting me videos about it, one of them was u/SonderDev 's nanoPaint (Sorry I made SpongeBobs eye red) and started doing some research on nano and the technology. For 3 days I devoured all the info I can, reading most of the posts here on reddit, and joining on Discord and TG. I again felt that butterfly feeling in my gut, the one I felt so many years ago when I found out about bitcoin (and some other rare occasions). So much potential, and I kind of feel I am already late to the party, and yet, my mind can't stop thinking about what is possible.
Now to the good stuff! Donations(tips) to streamers and content creators were always a huge part of our revenue. But we had a lot of problems with it - High fees, making small donations pretty much impossible, and the fear of someone charging you back and having you pay the fees for every donation that got charged back. I had someone give me about $2k for the span of two months with small donations, ended up charging all that money back, and having me pay $10 for each of his donations, even if they were under that amount. PayPal is pretty crazy.
Also, If you consider something like Patreon (a monthly donation for a project or a creator you like for benefits) they also charge extra for their fee, and people can still charge you back, even though they will handle it, you still give them the benefits. Twitch takes a huge cut for subscribers (user pays $4.99 and I get as little as $1.70) and youtube are getting about 30% for their cut.
See where I'm going with this? As proof of concept, a simple donation website/app could be made. You send the creator any amount of nano, it pops up on the screen for everyone to see. People would love the idea to impact the stream with as little money the creator allows. That would start up a conversation, people would start seeing the technology in action, how fast and feeless everything is going.
Not to mention an integrated service could be made that is similar to delegate.it (allows users to do tasks for nano/fiat) in this instance, the tasks could be - follow the creator on Twitter, Instagram, like his posts and whatever else he decides, and it could be cheap, because people would be doing it to pop up on stream and help the creator, not for the actual fiat amount of the nano given. killing 3 birds with one stone. Promoting nano, allowing everybody a voice to a degree they choose, and promoting himself to his viewers.
If this works, we could either go to one of the 2 biggest platforms (StreamLabs and StreamElements (who are Israeli and I know the 2 founders personally)) and they would integrate it to their already build system, or develop something to solely promote nano. We could reach out to smaller streamers that have small dedicated communities, not many donations and revenue coming in and allow them to use our system to promote their content and interact with their viewers.
A few more ideas I have in mind for a project like that:
For the donations (tips)
• Having different donation alerts for different QR codes that you scan. Similarly to what NanoPaint accomplishes, we could have a different QR code to scan for an alert that the user chooses to show up.
• Coloring the Camera frame - similarly to NanoPaint, drawing pixels on the frame of the camera of the streamer, changing it in real-time for nano.
• Having text to speech for the alert
• Have your donation impact the streamer in AR (putting something on his face or head).
Crowd Funding
• Donation goal that will make a purchase only if it gets there - setting up an X day goal to buy a new GPU for example, and having people contribute to it, and if it's reached, it automatically makes the order from amazon or wherever (having the data safe with our service), and if it's not - fully refunding the users. It could be a daily goal for pizza or whatever they choose. It will allow integration with businesses that would work with us.
• Stream goals - if we get to X Nano this stream, 24 hour stream tomorrow! If we won't, get your nano back! Would encourage people to participate even if they are not sure the goal will be met, have the assurance that the full amount would be refunded if it did not get there.
• Challenges - starting a bounty challenge, for example, have an Ace in CSGO (kill all 5 enemies) and get X amount of nano. If you didn't, money goes back. the crowd could vote on it having more interaction and validating if the challenge is complete.
Voting
• Have people engage with polls in real-time with nano, could scan their option to vote, and even get refunded if their option did not win, encouraging them to vote for their favorite option, even if it seems unlikely to win.
User Battles
• Having people start a challenge of a game, in an app or on the web, or perhaps even something random like gambling, and having it appear on stream for everybody to witness. Maybe even challenging the streamer for a nano incentive or someone else who watches.
Chat
• Having an on-screen chat that changes the colors and design of the people who donated with nano, and linked their account. more incentive to donate.
Stream Sponsors
• Having a rotating banner on-screen at all times, allowing users to pay nano to show their banner. As an auction or a price set from the creator.
Most of these ideas occurred to me as I was writing this post, and I'm sure we could think of better ones with some effort. Some of them are already implemented on the websites that were mention above, however, having the power and speed of the nano is a game-changer IMHO.
So why am I writing this post? First, just to share with you and get to know you better, maybe spark an idea or a motivation for anyone to do something good for nano.
Second, money is tight now, moved back to my parents due to the pandemic, hard to find a decent job as we have more than %20 of the people in Israel looking for a job and as I mentioned before the content I make is not very profitable. I can't afford to invest money in this idea, and I lack the skills to do it myself. So maybe if it's good someone else could.
If, however, someone would be inclined to help make this a reality, I would appreciate any comments, suggestions, investment of time, or money in testing this out. I have a dedicated community with thousands of people that will be aware of nano if we'll do it, years of experience in this field, and not to mention that I'm in good relations with most of the other content creators and platforms here in Israel, and some international.
Discord: ToLy#2657
Feel free to DM me at any time :)
Nice to meet you, and thank you for reading.
submitted by tolikr94 to nanocurrency [link] [comments]

Releasing mods have some issues

It's super cool we have source code access, but the way mods are released could use some work.
Random plug, this is the one mod I made: https://steamcommunity.com/sharedfiles/filedetails/?id=2122093636
I went for something quick and easy (though it took more time than expected as I kept trying to change UI code which I eventually figured out is unused). And I also made sure to include a link to my source changes (which no one else seems to be doing despite the GPL license requiring you to do so).
submitted by FluffyQuack to commandandconquer [link] [comments]

𝐈-𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 @ Binance Customer Care Number For Binance Technical Help

𝐈-𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 @ Binance Customer Care Number For Binance Technical Help 𝐈-𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 @ Binance Customer Care Number For Binance Technical Help 𝐈-𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 @ Binance Customer Care Number For Binance Technical Help 𝐈-𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 @ Binance Customer Care Number For Binance Technical Help
Binance Wallet Phone Number billing mail has been launched for fulfilling requirement of checking the mails through any device. It has made easy for the users to access the account from even a simple computer. With this mail account you can simply “Sign-In” in your account by putting the email address and the password. Once you “Sign In” you can check the activity of your mail account. You can compose, read the incoming mail and also download the large file attachments.Binance Customer Service Number (𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑) @ Binance Customer Service Number. Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑 CEO Changpeng “CZ” Zhao really doesn’t want to tell you where his firm’s headquarters is located.. To kick off ConsenSys’ Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt.You can always call on Binance customer care number which is always functional and the team is ready to help you. Read more Powered by Blogger Theme images by Michael Elkan. btcwalletexchange Visit profile Archive June 2020 140; May 2020 301; April 2020 158; March 2020 9; January 2020 93; December 2019 16; November 2019 120; October 2019 124; September 2019 114; August 2019 34.
Why Contact Binance 24/7 Support Number{1+/844+/907+/0583-}Being a part of Yahoo and AT&T services it offers a easy handling mailing option but there are also many customer carenical glitches occurs with users that you may face as well. For these issues you can contact customer carenical support to get help and you can find plenty of them in the internet. Customer carenical support is available 24×7 so that you can contact them according to your convenience.
Then it hit. Shin asked the one question Zhao really didn’t want to have to answer, but many want to know: Where is Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑’s headquarters?
This seemingly simple question is actually more complex. Until February, Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑is not under its jurisdiction. Since then Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑has not said just where, exactly, it is now headquartered.
Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. “Well, I think what this is is the beauty of the blockchain, right, so you don’t have to … like where’s the Bitcoin office, because Bitcoin doesn’t have an office,” he said.
The line trailed off, then inspiration hit. “What kind of horse is a car?” Zhao asked. Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn’t need registered bank accounts and postal addresses.
“Wherever I sit, is going to be the Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑office. Wherever I need somebody, is going to be the Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑office,” he said.
Zhao may have been hoping the host would move onto something easier. But Shin wasn’t finished: “But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?”
Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. “It’s not that we don’t want to admit it, it’s not that we want to obfuscate it or we want to kind of hide it. We’re not hiding, we’re in the open,” he said.
Shin interjected: “What are you saying that you’re already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it’s not the old way [having a headquarters], it’s actually the current way … I actually don’t know what you are or what you’re claiming to be.”
Zhao said Binance support number isn’t a traditional company, more a large team of people “that works together for a common goal.” He added: “To be honest, if we classified as a DAO, then there’s going to be a lot of debate about why we’re not a DAO. So I don’t want to go there, either.”
“I mean nobody would call you guys a DAO,” Shin said, likely disappointed that this wasn’t the interview where Zhao made his big reveal.
Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.
“I’m in Asia,” Zhao said. The blank white wall behind him didn’t provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it’s the Earth’s largest continent.
“I prefer not to disclose that. I think that’s my own privacy,” he cut in, ending the interview.
It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.
In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”
President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”
You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.
That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.
But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.
Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.
Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future “Westworld”-like existence.
Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.
Yes, freedom matters
Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”
Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.
Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.
Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.
Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.
The excluded
But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.
An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.
Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.
And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.
Caring about privacy
Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.
Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.
To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.
But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.
Let’s talk about this, people.
A missing asterisk
Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.
So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.
Binance support number has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.
Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑 announced that the exchange had frozen the funds. He also added that Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.
submitted by Ok_Photo_141 to u/Ok_Photo_141 [link] [comments]

Binance Customer Care Number【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone Number

Binance Customer Support 【【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Service Phone Number
Binance Customer Care Number【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone Number Binance Customer Care Number【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone NumberBinance Customer Care Number【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone Number Binance Customer Care Number【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone Number Binance Customer Care Number【𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone Number
Binance Wallet Phone Number billing mail has been launched for fulfilling requirement of checking the mails through any device. It has made easy for the users to access the account from even a simple computer. With this mail account you can simply “Sign-In” in your account by putting the email address and the password. Once you “Sign In” you can check the activity of your mail account. You can compose, read the incoming mail and also download the large file attachments.Binance Customer Service Number (1844-907-0583) @ Binance Customer Service Number. Binance support number 1844-907-0583CEO Changpeng “CZ” Zhao really doesn’t want to tell you where his firm’s headquarters is located.. To kick off ConsenSys’ Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt.You can always call on Binance customer care number which is always functional and the team is ready to help you. Read more Powered by Blogger Theme images by Michael Elkan. btcwalletexchange Visit profile Archive June 2020 140; May 2020 301; April 2020 158; March 2020 9; January 2020 93; December 2019 16; November 2019 120; October 2019 124; September 2019 114; August 2019 34.
Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.
Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.
The excluded
But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.
An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.
Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.
And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.
Caring about privacy
Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.
Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.
To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.
But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.
Why Contact Binance 24/7 Support Number{1+/844+/907+/0583-}Being a part of Yahoo and AT&T services it offers a easy handling mailing option but there are also many customer carenical glitches occurs with users that you may face as well. For these issues you can contact customer carenical support to get help and you can find plenty of them in the internet. Customer carenical support is available 24×7 so that you can contact them according to your convenience.
Then it hit. Shin asked the one question Zhao really didn’t want to have to answer, but many want to know: Where is Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑’s headquarters?
This seemingly simple question is actually more complex. Until February, Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑is not under its jurisdiction. Since then Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑has not said just where, exactly, it is now headquartered.
Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. “Well, I think what this is is the beauty of the blockchain, right, so you don’t have to … like where’s the Bitcoin office, because Bitcoin doesn’t have an office,” he said.
The line trailed off, then inspiration hit. “What kind of horse is a car?” Zhao asked. Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn’t need registered bank accounts and postal addresses.
“Wherever I sit, is going to be the Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑office. Wherever I need somebody, is going to be the Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑office,” he said.
Zhao may have been hoping the host would move onto something easier. But Shin wasn’t finished: “But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?”
Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. “It’s not that we don’t want to admit it, it’s not that we want to obfuscate it or we want to kind of hide it. We’re not hiding, we’re in the open,” he said.
Shin interjected: “What are you saying that you’re already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it’s not the old way [having a headquarters], it’s actually the current way … I actually don’t know what you are or what you’re claiming to be.”
Zhao said Binance support number isn’t a traditional company, more a large team of people “that works together for a common goal.” He added: “To be honest, if we classified as a DAO, then there’s going to be a lot of debate about why we’re not a DAO. So I don’t want to go there, either.”
“I mean nobody would call you guys a DAO,” Shin said, likely disappointed that this wasn’t the interview where Zhao made his big reveal.
Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.
“I’m in Asia,” Zhao said. The blank white wall behind him didn’t provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it’s the Earth’s largest continent.
“I prefer not to disclose that. I think that’s my own privacy,” he cut in, ending the interview.
It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.
In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”
President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”
You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.
That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.
But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.
Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.
Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future “Westworld”-like existence.
Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.
Yes, freedom matters
Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”
Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.
Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.
Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.
Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.
The excluded
But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.
An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.
Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.
And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.
Caring about privacy
Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.
Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.
To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.
But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.
Let’s talk about this, people.
A missing asterisk
Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.
So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.
Binance support number has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.
Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑 announced that the exchange had frozen the funds. He also added that Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.
submitted by Majestic_Wallaby_155 to u/Majestic_Wallaby_155 [link] [comments]

Binance Customer Care Number【+𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑 】Binance Customer Support Phone Number

Binance Customer Care Numberr 【+𝟏𝟖𝟒𝟒-𝟗𝟎𝟕-𝟎𝟓𝟖𝟑】Binance Customer Service Phone Number

Binance Wallet Phone Number billing mail has been launched for fulfilling requirement of checking the mails through any device. It has made easy for the users to access the account from even a simple computer. With this mail account you can simply “Sign-In” in your account by putting the email address and the password. Once you “Sign In” you can check the activity of your mail account. You can compose, read the incoming mail and also download the large file attachments.Binance Customer Service Number (𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑) @ Binance Customer Service Number. Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑 CEO Changpeng “CZ” Zhao really doesn’t want to tell you where his firm’s headquarters is located.. To kick off ConsenSys’ Ethereal Summit on Thursday, Unchained Podcast host Laura Shin held a cozy fireside chat with Zhao who, to mark the occasion, was wearing a personalized football shirt.You can always call on Binance customer care number which is always functional and the team is ready to help you. Read more Powered by Blogger Theme images by Michael Elkan. btcwalletexchange Visit profile Archive June 2020 140; May 2020 301; April 2020 158; March 2020 9; January 2020 93; December 2019 16; November 2019 120; October 2019 124; September 2019 114; August 2019 34.
Why Contact Binance 24/7 Support Number{1+/844+/907+/0583-}Being a part of Yahoo and AT&T services it offers a easy handling mailing option but there are also many customer carenical glitches occurs with users that you may face as well. For these issues you can contact customer carenical support to get help and you can find plenty of them in the internet. Customer carenical support is available 24×7 so that you can contact them according to your convenience.
Then it hit. Shin asked the one question Zhao really didn’t want to have to answer, but many want to know: Where is Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑’s headquarters?
This seemingly simple question is actually more complex. Until February, Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑was considered to be based in Malta. That changed when the island European nation announced that, no, Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑is not under its jurisdiction. Since then Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑has not said just where, exactly, it is now headquartered.
Little wonder that when asked Zhao reddened; he stammered. He looked off-camera, possibly to an aide. “Well, I think what this is is the beauty of the blockchain, right, so you don’t have to … like where’s the Bitcoin office, because Bitcoin doesn’t have an office,” he said.
The line trailed off, then inspiration hit. “What kind of horse is a car?” Zhao asked. Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑has loads of offices, he continued, with staff in 50 countries. It was a new type of organization that doesn’t need registered bank accounts and postal addresses.
“Wherever I sit, is going to be the Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑office. Wherever I need somebody, is going to be the Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑office,” he said.
Zhao may have been hoping the host would move onto something easier. But Shin wasn’t finished: “But even to do things like to handle, you know, taxes for your employees, like, I think you need a registered business entity, so like why are you obfuscating it, why not just be open about it like, you know, the headquarters is registered in this place, why not just say that?”
Zhao glanced away again, possibly at the person behind the camera. Their program had less than two minutes remaining. “It’s not that we don’t want to admit it, it’s not that we want to obfuscate it or we want to kind of hide it. We’re not hiding, we’re in the open,” he said.
Shin interjected: “What are you saying that you’re already some kind of DAO [decentralized autonomous organization]? I mean what are you saying? Because it’s not the old way [having a headquarters], it’s actually the current way … I actually don’t know what you are or what you’re claiming to be.”
Zhao said Binance support number isn’t a traditional company, more a large team of people “that works together for a common goal.” He added: “To be honest, if we classified as a DAO, then there’s going to be a lot of debate about why we’re not a DAO. So I don’t want to go there, either.”
“I mean nobody would call you guys a DAO,” Shin said, likely disappointed that this wasn’t the interview where Zhao made his big reveal.
Time was up. For an easy question to close, Shin asked where Zhao was working from during the coronavirus pandemic.
“I’m in Asia,” Zhao said. The blank white wall behind him didn’t provide any clues about where in Asia he might be. Shin asked if he could say which country – after all, it’s the Earth’s largest continent.
“I prefer not to disclose that. I think that’s my own privacy,” he cut in, ending the interview.
It was a provocative way to start the biggest cryptocurrency and blockchain event of the year.
In the opening session of Consensus: Distributed this week, Lawrence Summers was asked by my co-host Naomi Brockwell about protecting people’s privacy once currencies go digital. His answer: “I think the problems we have now with money involve too much privacy.”
President Clinton’s former Treasury secretary, now President Emeritus at Harvard, referenced the 500-euro note, which bore the nickname “The Bin Laden,” to argue the un-traceability of cash empowers wealthy criminals to finance themselves. “Of all the important freedoms,” he continued, “the ability to possess, transfer and do business with multi-million dollar sums of money anonymously seems to me to be one of the least important.” Summers ended the segment by saying that “if I have provoked others, I will have served my purpose.”
You’re reading Money Reimagined, a weekly look at the technological, economic and social events and trends that are redefining our relationship with money and transforming the global financial system. You can subscribe to this and all of CoinDesk’s newsletters here.
That he did. Among the more than 20,000 registered for the weeklong virtual experience was a large contingent of libertarian-minded folks who see state-backed monitoring of their money as an affront to their property rights.
But with due respect to a man who has had prodigious influence on international economic policymaking, it’s not wealthy bitcoiners for whom privacy matters. It matters for all humanity and, most importantly, for the poor.
Now, as the world grapples with how to collect and disseminate public health information in a way that both saves lives and preserves civil liberties, the principle of privacy deserves to be elevated in importance.
Just this week, the U.S. Senate voted to extend the 9/11-era Patriot Act and failed to pass a proposed amendment to prevent the Federal Bureau of Investigation from monitoring our online browsing without a warrant. Meanwhile, our heightened dependence on online social connections during COVID-19 isolation has further empowered a handful of internet platforms that are incorporating troves of our personal data into sophisticated predictive behavior models. This process of hidden control is happening right now, not in some future “Westworld”-like existence.
Digital currencies will only worsen this situation. If they are added to this comprehensive surveillance infrastructure, it could well spell the end of the civil liberties that underpin Western civilization.
Yes, freedom matters
Please don’t read this, Secretary Summers, as some privileged anti-taxation take or a self-interested what’s-mine-is-mine demand that “the government stay away from my money.”
Money is just the instrument here. What matters is whether our transactions, our exchanges of goods and services and the source of our economic and social value, should be monitored and manipulated by government and corporate owners of centralized databases. It’s why critics of China’s digital currency plans rightly worry about a “panopticon” and why, in the wake of the Cambridge Analytica scandal, there was an initial backlash against Facebook launching its libra currency.
Writers such as Shoshana Zuboff and Jared Lanier have passionately argued that our subservience to the hidden algorithms of what I like to call “GoogAzonBook” is diminishing our free will. Resisting that is important, not just to preserve the ideal of “the self” but also to protect the very functioning of society.
Markets, for one, are pointless without free will. In optimizing resource allocation, they presume autonomy among those who make up the market. Free will, which I’ll define as the ability to lawfully transact on my own terms without knowingly or unknowingly acting in someone else’s interests to my detriment, is a bedrock of market democracies. Without a sufficient right to privacy, it disintegrates – and in the digital age, that can happen very rapidly.
Also, as I’ve argued elsewhere, losing privacy undermines the fungibility of money. Each digital dollar should be substitutable for another. If our transactions carry a history and authorities can target specific notes or tokens for seizure because of their past involvement in illicit activity, then some dollars become less valuable than other dollars.
The excluded
But to fully comprehend the harm done by encroachments into financial privacy, look to the world’s poor.
An estimated 1.7 billion adults are denied a bank account because they can’t furnish the information that banks’ anti-money laundering (AML) officers need, either because their government’s identity infrastructure is untrusted or because of the danger to them of furnishing such information to kleptocratic regimes. Unable to let banks monitor them, they’re excluded from the global economy’s dominant payment and savings system – victims of a system that prioritizes surveillance over privacy.
Misplaced priorities also contribute to the “derisking” problem faced by Caribbean and Latin American countries, where investment inflows have slowed and financial costs have risen in the past decade. America’s gatekeeping correspondent banks, fearful of heavy fines like the one imposed on HSBC for its involvement in a money laundering scandal, have raised the bar on the kind of personal information that regional banks must obtain from their local clients.
And where’s the payoff? Despite this surveillance system, the U.N. Office on Drugs and Crime estimates that between $800 billion and $2 trillion, or 2%-5% of global gross domestic product, is laundered annually worldwide. The Panama Papers case shows how the rich and powerful easily use lawyers, shell companies, tax havens and transaction obfuscation to get around surveillance. The poor are just excluded from the system.
Caring about privacy
Solutions are coming that wouldn’t require abandoning law enforcement efforts. Self-sovereign identity models and zero-knowledge proofs, for example, grant control over data to the individuals who generate it, allowing them to provide sufficient proof of a clean record without revealing sensitive personal information. But such innovations aren’t getting nearly enough attention.
Few officials inside developed country regulatory agencies seem to acknowledge the cost of cutting off 1.7 billion poor from the financial system. Yet, their actions foster poverty and create fertile conditions for terrorism and drug-running, the very crimes they seek to contain. The reaction to evidence of persistent money laundering is nearly always to make bank secrecy laws even more demanding. Exhibit A: Europe’s new AML 5 directive.
To be sure, in the Consensus discussion that followed the Summers interview, it was pleasing to hear another former U.S. official take a more accommodative view of privacy. Former Commodities and Futures Trading Commission Chairman Christopher Giancarlo said that “getting the privacy balance right” is a “design imperative” for the digital dollar concept he is actively promoting.
But to hold both governments and corporations to account on that design, we need an aware, informed public that recognizes the risks of ceding their civil liberties to governments or to GoogAzonBook.
Let’s talk about this, people.
A missing asterisk
Control for all variables. At the end of the day, the dollar’s standing as the world’s reserve currency ultimately comes down to how much the rest of the world trusts the United States to continue its de facto leadership of the world economy. In the past, that assessment was based on how well the U.S. militarily or otherwise dealt with human- and state-led threats to international commerce such as Soviet expansionism or terrorism. But in the COVID-19 era only one thing matters: how well it is leading the fight against the pandemic.
So if you’ve already seen the charts below and you’re wondering what they’re doing in a newsletter about the battle for the future of money, that’s why. They were inspired by a staged White House lawn photo-op Tuesday, where President Trump was flanked by a huge banner that dealt quite literally with a question of American leadership. It read, “America Leads the World in Testing.” That’s a claim that’s technically correct, but one that surely demands a big red asterisk. When you’re the third-largest country by population – not to mention the richest – having the highest number of tests is not itself much of an achievement. The claim demands a per capita adjustment. Here’s how things look, first in absolute terms, then adjusted for tests per million inhabitants.
Binance support number has frozen funds linked to Upbit’s prior $50 million data breach after the hackers tried to liquidate a part of the gains. In a recent tweet, Whale Alert warned Binance support number that a transaction of 137 ETH (about $28,000) had moved from an address linked to the Upbit hacker group to its wallets.
Less than an hour after the transaction was flagged, Changpeng Zhao, the CEO of Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑 announced that the exchange had frozen the funds. He also added that Binance support number 𝟏𝟖𝟒𝟒-*𝟗𝟎𝟕-*𝟎𝟓𝟖𝟑is getting in touch with Upbit to investigate the transaction. In November 2019, Upbit suffered an attack in which hackers stole 342,000 ETH, accounting for approximately $50 million. The hackers managed to take the funds by transferring the ETH from Upbit’s hot wallet to an anonymous crypto address.
submitted by Accomplished_Car_190 to u/Accomplished_Car_190 [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

[UPDATED] It’s Time to Get Real: Stop Relying on Third Parties to Protect You & Your Funds. You are responsible for your security.

Eight months ago ETH was ~$13, phishing sites were everywhere, and too many people were losing ETH.
Today ETH is ~$260, Bitcoin bloggers, low-entropy phrases, and Teamviewer hacks are (not quite) everywhere, but getting more popular, and too many people are losing ETH.

How can you protect yourself?

  1. Get yourself a Ledger or Trezor Hardware wallet. They are less than 0.5 ETH now and a variety of wallets support them. There is really, really no excuse. https://www.ledgerwallet.com & https://shop.trezor.io/
  2. If you don't want one of these nifty devices, use cold storage for a majority of your savings. Please. Pretty please.
  3. Bookmark your crypto sites. Use those bookmarks and only those.
  4. Turn on 2FA for everything. Go do it. Right now. Quit your excuses. Choose Google Authenticator over Authy. Don't use your phone number. Then, make sure your phone number is NOT tied to your Google account (look in privacy settings). Turns out, you and your BFF Mr. Hacker can "recover" access to your account via that number, completely destroying the point of 2FA. PS: Don't forget to cold-storage your backup words for these 2FA things. It's a huge pain when your phone goes for a swim and your entire life is 2FA'd. 😊
  5. Do not use cloud storage (Dropbox, Drive, iCloud) for storing your keys :(Now your keys would only be protected by your cloud storage password. Also, see #4.
  6. For Token Sales: do not trust any address except the one posted on the official site. Bookmark the URL before the sale, get the address from the URL from your bookmark at time of purchase. Do not trust any other source (especially a random bot on Slack). PS: When are token sales going to start using ENS names?
  7. Double check the URL. Check it. Then, check it again right before entering any information. This is especially important for any sites that require usernames, passwords, email addresses, private keys, and any other personal information. SSL certs do not mean a site is trustworthy, just that they bought an SSL cert. Not sure about the correct URL? Cross reference Reddit, Twitter, Github, Slack and wherever else the project hangs out.
  8. Triple check Github URLs. These are much easier to fake and much easier to miss. Instead of downloading from that random URL on reddit, seek out the URL on your own. Following the developers of these repos on Twitter, friending them on reddit (lol...but seriously it's nice because their name will be orange), or starring said repos on Github helps.
  9. Always verify that the site you landed on is legit. Especially if you are about to entire your private key or download an application. What is legit? A service that people have used for a decent period of time with good results. If the URL has been registered in the last week or the site "just launched", err on the side of caution and avoid it for a while.
  10. Google the service name + "scam" or "reviews". Scam sites rarely last long. Value real comments by real people over a random blog. Value a collection of information over a single source. Understand that legit services will likely have a mix of positive and negative reviews over a long period of time. Scam sites typically have no one talking about them, everyone yelling about how they got robbed, or the most perfect reviews ever. The latter one is just as red of a flag as the first one.
  11. Don't ever run remote-access software (e.g. TeamViewer) ever...but especially not on a computer with keys on them. The number of security holes in these programs is atrocious. You 2FA your entire life, but then let a single string of characters give someone access to your entire computer & every account. 😱
  12. Don’t click any link regarding anything crypto, money, banking, or a service like Dropbox / Google Drive / Gmail in any email ever. And if the scammy clickbait was simply too irresistible for you, don’t enter any information on the page.
  13. Install an adblocker that actually turns off Google/Bing Ads. I recommend going with uBlock Orgin. If you are already using Adblock Plus, it does not hide Google Ads from you. Go into your Adblock Plus settings and uncheck the box that says “Allow some non-intrusive advertising”.
  14. Don’t click on advertisements. With or without an adblocker, you should never, ever click on advertisements.
  15. If you have accidentally visited or typed a malicious site, clean out your recent history and autocomplete. This will prevent you from typing kra… and having it autocomplete to the malicious krakken.com.
  16. No one is giving you free or discounted ETH. Even for completing a survey.
  17. The guys who just finish their token sale don't want to sell you tokens via Slack DM. Neither does that smokin' hot 125px x 125px avatar.
  18. Lastly: use your brain. Think for a moment. Don't assume, ask. Don't blindly follow, question. If something doesn't seem right...if you feel like the luckiest fucker on Earth...or if you find yourself asking, "I wonder why I haven't seen this on reddit yet", there is likely a reason. 👍

A note about Ethereum Chamber scam yesterday

As some of you are aware, there was a scam site yesterday that was a clone of MyEtherWallet.com, but red. I was alerted to it via a Facebook message ~5am from a diligent user. That is one of 3 messages I received about it before our tweet went up at 1pm, not including the 5 from our internal team (thank goodness someone realizes our site isn't red!)
Since that site has come to light, a number of folks have mentioned things like, "Oh yeah I saw it, I figured you guys were just rebranding" or "Oh weird. Yeah I figured it was a scam."
This site, which I thought was only a paid CoinTelgraph blurb at the time, was actually on a large number of Bitcoin blogs: podcasts, blogs, news sites, Twitter, the works.
How does this happen? How do a number of bloggers promote a direct (red) clone of MEW, people see it, and no one says anything? (The fact that all these bloggers & "news" organizations gleefully accepted money from a wallet site without Googling "ether wallet" or "Name of the Site" is a far too angry and long rant, but should not go unnoticed.)
Anyways!

While the above post is all about the steps you should take to protect yourself, there is another one that is even more important:

Look out for one another

Scammers thrive because they have victims -- because they know they can throw a stupid website out there and people will click it. Stop thinking, "Well, they shouldn't have clicked it" and start doing what you can to prevent people from making a mistake that will cost them their hard-earned coins.
  • If you notice something looks like MEW, say "Hey, that looks like a clone of MEW! I wonder if they've seen it?"
  • If you think that Github URL looks weird but you don't have the time to check, throw a "hey u sure thats rite url?" up there.
  • If that reddit post is an unheard of wallet, leave a comment and report it with a "??????????" in the report reason.
  • If the Token Sale you are participating it doesn't tell you explicitly when & where their address will be posted, ask them, in public, over and over again. If its not at least 24 hours before the Token Sale, question that choice, in public, over and over again.
  • Remind people about best practices! If you've been visiting /ethereum for more than 3 months, you have 3 months on 25% of the people here. You are a bloody expert now. Time to put on your big boy pants:
  • "@nooboob Remember the address will be posted on their website, NOT in this Slack."
  • "It looks like this is an okay link, but it's not a good idea to click or install things from a random user on reddit. It could be malware."
There needs to be more due diligence everywhere, but this is easier diligence than most. It requires no advance knowledge or skills. You don't even have to be able to write good. Stay aware, trust your gut, ask more questions, trust the internet less, and google the fuck out of everything.
Stay safe out there. 💖
submitted by insomniasexx to ethereum [link] [comments]

05-17 03:43 - 'Mom! need help here! Download us on the APP STORE/GOOGLEPLAY www.redlinecoin.com instagram.com/redlinecoin twitter.com/redlinecoin2 fb.com/redlinecoin #altcoin #altcoin #alert #altcoins #cryptocurrencynews #coins...' (i.redd.it) by /u/RedLineCoin removed from /r/Bitcoin within 0-8min

Mom! need help here! Download us on the APP STORE/GOOGLEPLAY www.redlinecoin.com instagram.com/redlinecoin twitter.com/redlinecoin2 fb.com/redlinecoin #altcoin #altcoin #alert #altcoins #cryptocurrencynews #coins #cryptotrading #cryptoalerts #crypto #cryptocurrency #ethd #binance #binancenews
Go1dfish undelete link
unreddit undelete link
Author: RedLineCoin
submitted by removalbot to removalbot [link] [comments]

It’s Time to Get Real: Stop Relying on Third Parties to Protect You & Your Funds. You are responsible for your security. (x-post /r/ethereum)

Eight months ago ETH was ~$13, phishing sites were everywhere, and too many people were losing ETH.
Today ETH is ~$260, Bitcoin bloggers, low-entropy phrases, and Teamviewer hacks are (not quite) everywhere, but getting more popular, and too many people are losing ETH.

How can you protect yourself?

  1. Get yourself a Ledger or Trezor Hardware wallet. They are less than 0.5 ETH now and a variety of wallets support them. There is really, really no excuse. https://www.ledgerwallet.com & https://shop.trezor.io/
  2. If you don't want one of these nifty devices, use cold storage for a majority of your savings. Please. Pretty please.
  3. Bookmark your crypto sites. Use those bookmarks and only those.
  4. Turn on 2FA for everything. Go do it. Right now. Quit your excuses. Choose Google Authenticator over Authy. Don't use your phone number. Then, make sure your phone number is NOT tied to your Google account (look in privacy settings). Turns out, you and your BFF Mr. Hacker can "recover" access to your account via that number, completely destroying the point of 2FA. PS: Don't forget to cold-storage your backup words for these 2FA things. It's a huge pain when your phone goes for a swim and your entire life is 2FA'd. 😊
  5. Do not use cloud storage (Dropbox, Drive, iCloud) for storing your keys :(Now your keys would only be protected by your cloud storage password. Also, see #4.
  6. For Token Sales: do not trust any address except the one posted on the official site. Bookmark the URL before the sale, get the address from the URL from your bookmark at time of purchase. Do not trust any other source (especially a random bot on Slack). PS: When are token sales going to start using ENS names?
  7. Double check the URL. Check it. Then, check it again right before entering any information. This is especially important for any sites that require usernames, passwords, email addresses, private keys, and any other personal information. SSL certs do not mean a site is trustworthy, just that they bought an SSL cert. Not sure about the correct URL? Cross reference Reddit, Twitter, Github, Slack and wherever else the project hangs out.
  8. Triple check Github URLs. These are much easier to fake and much easier to miss. Instead of downloading from that random URL on reddit, seek out the URL on your own. Following the developers of these repos on Twitter, friending them on reddit (lol...but seriously it's nice because their name will be orange), or starring said repos on Github helps.
  9. Always verify that the site you landed on is legit. Especially if you are about to entire your private key or download an application. What is legit? A service that people have used for a decent period of time with good results. If the URL has been registered in the last week or the site "just launched", err on the side of caution and avoid it for a while.
  10. Google the service name + "scam" or "reviews". Scam sites rarely last long. Value real comments by real people over a random blog. Value a collection of information over a single source. Understand that legit services will likely have a mix of positive and negative reviews over a long period of time. Scam sites typically have no one talking about them, everyone yelling about how they got robbed, or the most perfect reviews ever. The latter one is just as red of a flag as the first one.
  11. Don't ever run remote-access software (e.g. TeamViewer) ever...but especially not on a computer with keys on them. The number of security holes in these programs is atrocious. You 2FA your entire life, but then let a single string of characters give someone access to your entire computer & every account. 😱
  12. Don’t click any link regarding anything crypto, money, banking, or a service like Dropbox / Google Drive / Gmail in any email ever. And if the scammy clickbait was simply too irresistible for you, don’t enter any information on the page.
  13. Install an adblocker that actually turns off Google/Bing Ads. I recommend going with uBlock Orgin. If you are already using Adblock Plus, it does not hide Google Ads from you. Go into your Adblock Plus settings and uncheck the box that says “Allow some non-intrusive advertising”.
  14. Don’t click on advertisements. With or without an adblocker, you should never, ever click on advertisements.
  15. If you have accidentally visited or typed a malicious site, clean out your recent history and autocomplete. This will prevent you from typing kra… and having it autocomplete to the malicious krakken.com.
  16. No one is giving you free or discounted ETH. Even for completing a survey.
  17. The guys who just finish their token sale don't want to sell you tokens via Slack DM. Neither does that smokin' hot 125px x 125px avatar.
  18. Lastly: use your brain. Think for a moment. Don't assume, ask. Don't blindly follow, question. If something doesn't seem right...if you feel like the luckiest fucker on Earth...or if you find yourself asking, "I wonder why I haven't seen this on reddit yet", there is likely a reason. 👍

A note about Ethereum Chamber scam yesterday

As some of you are aware, there was a scam site yesterday that was a clone of MyEtherWallet.com, but red. I was alerted to it via a Facebook message ~5am from a diligent user. That is one of 3 messages I received about it before our tweet went up at 1pm, not including the 5 from our internal team (thank goodness someone realizes our site isn't red!)
Since that site has come to light, a number of folks have mentioned things like, "Oh yeah I saw it, I figured you guys were just rebranding" or "Oh weird. Yeah I figured it was a scam."
This site, which I thought was only a paid CoinTelgraph blurb at the time, was actually on a large number of Bitcoin blogs: podcasts, blogs, news sites, Twitter, the works.
How does this happen? How do a number of bloggers promote a direct (red) clone of MEW, people see it, and no one says anything? (The fact that all these bloggers & "news" organizations gleefully accepted money from a wallet site without Googling "ether wallet" or "Name of the Site" is a far too angry and long rant, but should not go unnoticed.)
Anyways!

While the above post is all about the steps you should take to protect yourself, there is another one that is even more important:

Look out for one another

Scammers thrive because they have victims -- because they know they can throw a stupid website out there and people will click it. Stop thinking, "Well, they shouldn't have clicked it" and start doing what you can to prevent people from making a mistake that will cost them their hard-earned coins.
  • If you notice something looks like MEW, say "Hey, that looks like a clone of MEW! I wonder if they've seen it?"
  • If you think that Github URL looks weird but you don't have the time to check, throw a "hey u sure thats rite url?" up there.
  • If that reddit post is an unheard of wallet, leave a comment and report it with a "??????????" in the report reason.
  • If the Token Sale you are participating it doesn't tell you explicitly when & where their address will be posted, ask them, in public, over and over again. If its not at least 24 hours before the Token Sale, question that choice, in public, over and over again.
  • Remind people about best practices! If you've been visiting /ethtrader for more than 3 months, you have 3 months on 25% of the people here. You are a bloody expert now. Time to put on your big boy pants:
  • "@nooboob Remember the address will be posted on their website, NOT in this Slack."
  • "It looks like this is an okay link, but it's not a good idea to click or install things from a random user on reddit. It could be malware."
There needs to be more due diligence everywhere, but this is easier diligence than most. It requires no advance knowledge or skills. You don't even have to be able to write good. Stay aware, trust your gut, ask more questions, trust the internet less, and google the fuck out of everything.
Stay safe out there. 💖
__
All credit to insomniasexx
submitted by jack to ethtrader [link] [comments]

Tron v7.2.0 (2015-11-20) // Block bad Windows updates; De-bloat improvements; Win10 Start Menu crash fix; OneDrive fixes; multiple other improvements

x-post /TronScript

Background

Tron is a script that "fights for the User"; basically a glorified batch file that automates a bunch of scanning/disinfection/cleanup tools on a Windows system. I got tired of running everything manually and decided to just script the whole thing. The goal is to automate ~85-90% of the tasks a technician would usually perform. I hope this helps other techs and admins.
Tron supports all versions of Windows from XP to Windows 10.

Stages of Tron

  1. Prep
  2. Tempclean
  3. De-bloat
  4. Disinfect
  5. Repair
  6. Patch
  7. Optimize (don't panic when you see the word "optimize"; this stage is very conservative)
  8. Wrap-up
  9. Manual stuff
Saves a log to C:\Logs\tron\tron.log (configurable).

Screenshots

Welcome Screen | Email Report | New version detected | Help screen | Config dump | Dry run | Pre-run System Restore checkpoint | Disclaimer

Changelog

(significant changes in bold; full changelog on Github)
v7.2.0 (2015-11-20)
  • + tron.bat:prep: Add ERRORS_DETECTED variable. If tripped by an operation, Tron's end screen will be red instead of green
  • + tron.bat:prep: Add WARNINGS_DETECTED variable. If tripped by an operation, Tron's end screen will be yellow instead of green
  • ! tron.bat:runlocation: Fix detection of running from TEMP folder
  • * tron.bat:autorun: If autorun flag (-a) is used and we're not in Safe Mode, automatically reboot into Safe Mode after 10 seconds. Thanks to staticextasy, Chimaera12 and ComputersByte
  • * stage_1_prep:SMART: Turn screen yellow if SMART errors are detected. This is just to alert the user something is amiss
  • + stage_2_de-bloat:metro: Add sub-script OEM_modern_apps_to_target_by_name.ps1, called during Windows 10 Metro de-bloat. Targets OEM-loaded Modern Apps. Thanks to danodemano
  • - stage_2_de-bloat:metro: Remove line that deletes users OneDrive folder. We still remove OneDrive, but at least now we're not nuking user files. This is a half-fix until I figure out how to check if OneDrive is actually in use or not.
  • ! stage_4_telemetry:bugfix: Fix incorrect ASCII hyphens on Modern App removal commands due to HTML copy-paste. Thanks to cuddlychops06, staticextasy, and Chimaera12
  • * stage_4_telemetry:updates: Add blocking ("hiding") of bad Windows Updates to prevent automatic re-installation. Thanks to sofakingdead for suggestion
  • + stage_4_telemetry:logging: Add missing logging support to Windows 10 telemetry cleanup, with support for -v (VERBOSE) flag
  • * See included changelog for a full list of other fixes and improvements

Download

  1. Primary method: Download a self-extracting .exe pack from one of the mirrors:
    Mirror HTTPS HTTP Location Host
    Official link link US-NY SGC-Hosting
    #1 link link DE bodkov
    #2 link --- FR mxmod
    #3 link link US-NY danodemano
    #4 link link NZ iDanoo
    #5 link --- BT Sync mirror Falkerz (HTTP mirror of the BT Sync repo)
  2. Secondary method: Connect to the BT Sync repo to get fixes/updates immediately. Use the read-only key:
    B3Y7W44YDGUGLHL47VRSMGBJEV4RON7IS 
    Make sure the settings for your Sync folder look like this (or this on v1.3.x). I recommend this instead of Syncthing due to some issues with Syncthing.
  3. Tertiary method: Connect to the SyncThing repo (instructions) to get fixes/updates immediately. This method is still under testing and not 100% reliable. I recommend BT Sync if you want a live-sync method.
  4. Quaternary method: Source code
    All the code for Tron is available here on Github (Note: this doesn't include many of the utilities Tron relies on to function). If you want to see the code without downloading a big package, or want to contribute to the project, the Git page is a good place to do it.

Command-Line Support

Tron has full command-line support. All flags are optional, can be combined, and override their respective script default when used.
Usage: tron.bat [-a -c -d -dev -e -er -m -o -p -r -sa -sb -sd -se -sfr -sk -sm -sp -spr -srr -ss -str -sw -v -x] | [-h] Optional flags (can be combined): -a Automatic mode (no welcome screen or prompts; implies -e) -c Config dump (display current config. Can be used with other flags to see what WOULD happen, but script will never execute if this flag is used) -d Dry run (run through script without executing any jobs) -dev Override OS detection (allow running on unsupported Windows versions) -e Accept EULA (suppress display of disclaimer warning screen) -er Email a report when finished. Requires you to configure SwithMailSettings.xml -m Preserve OEM Metro apps (don't remove them) -np Skip the pause at the end of the script -o Power off after running (overrides -r) -p Preserve power settings (don't reset power settings to default) -r Reboot automatically (auto-reboot 30 seconds after completion) -sa Skip anti-virus scans (MBAM, KVRT, Sophos) -sb Skip de-bloat (OEM bloatware removal; implies -m) -sd Skip defrag (force Tron to ALWAYS skip Stage 5 defrag) -se Skip Event Log clearing -sfr Skip filesystem permissions reset (saves time if you're in a hurry) -sk Skip Kaspersky Virus Rescue Tool (KVRT) scan -sm Skip Malwarebytes Anti-Malware (MBAM) installation -sp Skip patches (do not patch 7-Zip, Java Runtime, Adobe Flash or Reader) -spr Skip page file settings reset (don't set to "Let Windows manage the page file") -srr Skip registry permissions reset (saves time if you're in a hurry) -ss Skip Sophos Anti-Virus (SAV) scan -str Skip Telemetry Removal (don't remove Windows user tracking, Win7 and up only) -sw Skip Windows Updates (do not attempt to run Windows Update) -v Verbose. Show as much output as possible. NOTE: Significantly slower! -x Self-destruct. Tron deletes itself after running and leaves logs intact Misc flags (must be used alone): -h Display this help text 

Integrity

\tron\integrity_verification\checksums.txt contains SHA-256 checksums for every file and is signed with my PGP key (0x07d1490f82a211a2; pubkey included). You can use this to verify package integrity.
Please suggest modifications and fixes; community input is helpful and appreciated.
Donations (bitcoin): 1LSJ9qDzuHyRx6FfbUmHVSii4sLU3sx2TF
Quiet Professionals
submitted by vocatus to sysadmin [link] [comments]

Could THIS Be The Reason for All the Craziness With WL, JA, and Riseup?

FIRST: Let me preface this post by saying that I still don't believe it is yet safe for anybody to upload or download anything to/from WL. Until they can openly explain everything that has been going on.
I was reading about a Booze-Allen-Hamilton Employee named Harold Martin III. BAH is an NSA Subcontractor, and Martin worked for them, until he went to work directly for "Tailored Access Operations". For those unfamiliar, TAO are the US Governments top hackers. They develop custom exploits, and use them to hack governments and businesses (and individuals).
http://www.washingtontimes.com/news/2016/oct/27/harold-martin-stole-identities-us-covert-agents-p
I was originally drawn to this story, because all the news on him is dated middle to end of October (after the 17th HINT HINT). After digging in, I found that he was arrested in August. Even though he was in jail before October 17th, it doesn't mean it is not related.
Not only did Martin steal FIFTY TERABYTES (yes folks fifty tera-fucking-bytes) of Top Secret NSA Hacking Exploits, part of his trove was a list of the identities of many covert Intelligence Agents Worldwide.
EDIT: After his arrest, a Hacking Group called "Shadow Brokers" tweeted that they had the exploits, and were auctioning them off (As of today, SB tweeted that the auction is off, but if they receive 10,000 bitcoin, they will publicly release the Private Key to access all exploits). True or not, if even the tiniest inkling of a possibility that the secret agent list (NOC List for you Mission Impossible Fans) could be in the wild, would be a cause to pull out all the stops to make sure that list isn't compromised (God I am starting to hate that word).
https://twitter.com/shadowbrokerss
Since Manning, Snowden, and many other Whistleblowers' Upload Site of Choice is Wikileaks, I am sure the NSA/FBI want to keep those names FAAAAAAAAAAAR from public eyes, and it would be a YUUUUUUUUUGE thing. It would be cause for a "Battle Stations" "Red Alert" and "All Hands on Deck". "They" would definitely want to look at both WL's and Riseup's Servers to see if Martin had uploaded any of the 50 terabytes of data he stole.
A list of covert US Intelligence Agents would ABSOLUTELY be good enough cause for England, Sweden, and Ecuador to let our Intelligence Services come in and make sure that list is not out in the wild.
To date, I personally think THIS may be the actual reason behind everything that is going on.
OPINIONS?
EDIT: What I have been trying to do for the last few days, is research possible reasons that are more Occam's Razor Based, as opposed to the Rendition, Dead, etc theories. That is why I first posted "Everything Seems To Be Getting A Little Clearer Now....."
https://www.reddit.com/WhereIsAssange/comments/5hld34/everything_seems_to_be_getting_a_little_cleare
That was my first find, but this one actually makes the most sense, and tics all the correct checkboxes to explain all the silence.
submitted by notscaredofclowns to WhereIsAssange [link] [comments]

ٍDownload Red Alert 3 + crack 1.12+ patch 1.12 Red Alert 3 Science MOD - Allies , War Time , Live Skirmish Gameplay วิธีโหลดเกมส์ Command & Conquer Red Alert 3 How to download Red Alert 3 Full Version For Free Red Alert 3 free download

bitcoin alert free download - Bitcoin Monitor - BTC Price Alert, Red Alert 2: Apocalypse, Command & Conquer: Red Alert, and many more programs CIPHERTRACE GLOBAL ALERT: New Phishing Attack Claims to Have Webcam Video of Victims Performing Embarrassing Act – Asks for Ransom in Bitcoin Global Alert, December 11, 2019: In early December 2019, CipherTrace researchers received multiple reports of a new strain of phishing extortion. These “sextortion” emails attempt to fool recipients into believing that the scammer… Red Alert Slot by Everi game overview and reviews by real players, free play mode, screenshots, bonuses and list of top online casinos that offer the game. You will be redirected in 3 seconds. You are leaving 1337x to a website that is not affiliated with us in any way. We cannot guarantee for security of a linked website. Red Deer, Alberta – A warning sign posted by the RCMP on a local Bitcoin ATM may have prevented a man from becoming a victim of fraud and losing $90,000.. On July 3, 2020, RCMP initiated an investigation into a phone scam incident. The victim had received a phone call from scammers pretending to be from the CRA and RCMP.

[index] [5954] [27629] [27118] [15214] [27758] [157] [28898] [9303] [21312] [7594]

ٍDownload Red Alert 3 + crack 1.12+ patch 1.12

How to Download & Install C&C Red Alert 3 🔥 Full Version for Free (Works on Windows 10) - Duration: 11:51. Mr.Techie DIY 2,951 views. 11:51. Minecraft Speedrunner VS 3 Hunters - Duration: 36:22. Oh yes back on red alert 3 playing the science mod , this one is a banger , sit back and enjoy this guys , have fun !! Red Alert 3 : Typical Questions and the Answers : ----- In Red Alert 3 the ... Red Alert 3 Skirmish #1 (Empire) - สุ่มทีม 3 ต่อ 3 รวมทุกชนชาติ - Duration: 40:43. Aurora Pentaguin 59,619 views 40:43 How To Download red alert 3 for free(MAC) - Duration: 3:21. Muhd Zul 74,005 views. 3:21. Command and Conquer Red Alert 3 Soviet last mission - Duration: 20:13. Murtaza Rasheed 333,161 views. [Red Alert 3 Multiplayer Gameplay] Dimon(Soviets) vs Kohaji(Allies) - Duration: 40:01. GeneralsGentlemen 72,654 views. 40:01. Kiro[E] vs Vindies[A] - 7 New Maps - Red Alert 3 - Duration: 53:19.

Flag Counter