How To Buy Bitcoin Anonymously - The CryptoStaunch

Weekly Crypto News — July, 03

What important crypto events happened last week?
Regulation, Government, Mass Adoption
📌 The U.S. court classified Coinbase as a traditional bank after the exchange revealed its customer information at the request of the FBI. This decision was made when considering the appeal of Richard Gratkowski, sentenced to 5 years and 10 months in prison. Earlier, the FBI found out that between June 2016 and May 2017, Richard Gratkovsky used Bitcoins to purchase prohibited pornographic materials involving minors. Having detected the wallets used by him, the agency turned to Coinbase with a request to disclose information about this client. The exchange complied with this requirement without a court order.
📌 Binance Exchange has confirmed the launch of a cryptocurrency debit card in partnership with Swipe. Information about this appeared on the official website of the company but later disappeared. One of the features of the card will be the ability to exchange cryptocurrencies for fiat money in real-time. Users will be able to transfer money to the card directly from the Binance trading account. Payments will be instant, funds can be spent immediately after crediting. In addition, cardholders will be able to withdraw cash from ATMs.
📌 The District of Columbia Bar has allowed lawyers in Washington D.C. to accept payments in Bitcoins and other cryptocurrencies. Representatives of the organization noted that cryptocurrencies are rapidly gaining popularity as a means of payment and lawyers cannot stand aside from these changes. Acceptance of payment in crypto is permissible if the lawyer is able to ensure the safe storage of assets. To do this, he must have basic knowledge in the field of blockchain.
Projects, Collaborations, Startups
📌 BlockFi, a company operating in the cryptocurrency lending market, reported a doubling of monthly revenue in the second quarter. The driver was halving and launching a mobile application. “By now, monthly income has quadrupled since the end of last year and doubled if we start from the end of March,” said Zac Prince, co-founder, and CEO of the startup.
📌 CoinGecko, an analytical service, has announced a partnership with cybersecurity company Hacken. As part of the collaboration, CoinGecko integrated into the so-called Trust Score cryptocurrency exchange security assessment metrics based on the platform data from Hacken. Among others, Hacken considers platform infrastructure security, including server security, two-factor user authentication, spam and phishing protection, and other criteria.
📌 According to Messari, the market capitalization of dollar-tied stablecoin Tether (USDT) reached $10.3 billion. The growth since the beginning of the year, when the figure was $4.76 billion, exceeded 116%. Other stablecoins are significantly inferior to USDT in terms of market supply.
📌 Binance cryptocurrency exchange has completed a major update of the trading engine, increasing the processing speed of operations by 10 times, company CEO Changpeng Zhao said. According to him, the update was the largest in the history of Binance. It took two years to develop it. Zhao noted that in doing so, the exchange is preparing the “next wave” of cryptocurrency market growth.
Blockchain
📌 According to Messari, Bitcoin and Ethereum account for more than 99% of the commissions received by all miners. Over the past 24 hours, the total amount of commissions in the Bitcoin network has amounted to $407,571. Ethereum has a significantly higher rate — $814,082.
📌 On June 30, at block # 637 056 in the Bitcoin network, the planned recalculation of mining complexity took place. The indicator has undergone the most insignificant change since March 22, 2010, having decreased by 0.0033% from 15.7847 T to 15.7842 T. Thus, the complexity of mining Bitcoin almost did not change for the first time in 10 years.
📌 A transaction of 101 857 BTC (~$ 933 million at the time of sending) was recorded in the Bitcoin network between anonymous addresses. Transaction passed between anonymous addresses. The commission was only 48 cents. An anonymous whale used the SegWit protocol, which reduced costs by 41%.
📌 One of the Bitcoin users included the message “Hello, Noah! Welcome to the world, little one” in one of the transactions, thus recording the birth of their first child. The unchanging and censorship-resistant nature of Bitcoin will ensure that this message remains forever on the blockchain while it continues to function. The current case demonstrates a widely discussed scenario for using the first cryptocurrency as a decentralized database.
Hacking, Cyber Crimes
📌 Russian Sergei Medvedev admitted involvement in the cybercriminal organization Infraud, which traded stolen personal data, compromised credit cards, malware, and other illegal things. “Over the course of its seven-year history, Infraud caused an estimated loss of about $2.2 billion and more than $568 million in actual losses to a wide range of financial institutions, sellers and individuals,” the US Department of Justice declared.
📌 The criminals received a $1.14 million ransom after a successful attack on the University of California. The software installed by hackers encrypted the data on the university’s servers at the School of Medicine, making the information temporarily unavailable. To fix the problem, the institution had to pay 116.4 BTC.
📌 An unknown hacker managed to withdraw $500,000 in altcoins WETH, WBTC, SNX, and LINK from the pool of the Balancer Labs DeFi project using a smart contract vulnerability that allowed an attacker to create a shortage of funds in the pools.

That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to btc [link] [comments]

What Is The Dark Web? How Can You Access It? What Will You Find?

What Is The Dark Web? How Can You Access It? What Will You Find?

Dark Net Hacker
DarkNetHacker.net
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Dark web definition
The dark web is a part of the internet that isn't indexed by search engines. You've no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. Researchers Daniel Moore and Thomas Rid of King's College in London classified the contents of 2,723 live dark web sites over a five-week period in 2015 and found that 57% host illicit material.

A 2019 study, Into the Web of Profit, conducted by Dr. Michael McGuires at the University of Surrey, shows that things have become worse. The number of dark web listings that could harm an enterprise has risen by 20% since 2016. Of all listings (excluding those selling drugs), 60% could potentially harm enterprises.

You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, hacked Netflix accounts and software that helps you break into other people’s computers. Buy login credentials to a $50,000 Bank of America account for $500. Get $3,000 in counterfeit $20 bills for $600. Buy seven prepaid debit cards, each with a $2,500 balance, for $500 (express shipping included). A “lifetime” Netflix premium account goes for $6. You can hire hackers to attack computers for you. You can buy usernames and passwords.

But not everything is illegal, the dark web also has a legitimate side. For example, you can join a chess club or BlackBook, a social network described as the “the Facebook of Tor.”


Note: This post contains links to dark web sites that can only be accessed with the Tor browser, which can be downloaded for free at https://www.torproject.org.

Deep web vs. dark web: What’s the difference?
The terms “deep web” and “dark web” are sometimes used interchangeably, but they are not the same. Deep web refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google. Deep web content includes anything behind a paywall or requires sign-in credentials. It also includes any content that its owners have blocked web crawlers from indexing.

Medical records, fee-based content, membership websites, and confidential corporate web pages are just a few examples of what makes up the deep web. Estimates place the size of the deep web at between 96% and 99% of the internet. Only a tiny portion of the internet is accessible through a standard web browser—generally known as the “clear web”.

RECOMMENDED WHITEPAPERS
2020 Modern Backup Buyers’ Guide

Business continuity for remote workers

10 Reasons Why 15,000+ Businesses Point DNS to Cisco Umbrella

The dark web is a subset of the deep web that is intentionally hidden, requiring a specific browser—Tor—to access, as explained below. No one really knows the size of the dark web, but most estimates put it at around 5% of the total internet. Again, not all the dark web is used for illicit purposes despite its ominous-sounding name.


Dark web tools and services that present enterprise risk
The Into the Web of Profit report identified 12 categories of tools or services that could present a risk in the form of a network breach or data compromise:

Infection or attacks, including malware, distributed denial of service (DDoS) and botnets
Access, including remote access Trojans (RATs), keyloggers and exploits
Espionage, including services, customization and targeting
Support services such as tutorials
Credentials
Phishing
Refunds
Customer data
Operational data
Financial data
Intellectual property/trade secrets
Other emerging threats
The report also outlined three risk variables for each category:

Devaluing the enterprise, which could include undermining brand trust, reputational damage or losing ground to a competitor
Disrupting the enterprise, which could include DDoS attacks or other malware that affects business operations
Defrauding the enterprise, which could include IP theft or espionage that impairs a company's ability to compete or causes a direct financial loss
Dark web browser
All this activity, this vision of a bustling marketplace, might make you think that navigating the dark web is easy. It isn’t. The place is as messy and chaotic as you would expect when everyone is anonymous, and a substantial minority are out to scam others.

Accessing the dark web requires the use of an anonymizing browser called Tor. The Tor browser routes your web page requests through a series of proxy servers operated by thousands of volunteers around the globe, rendering your IP address unidentifiable and untraceable. Tor works like magic, but the result is an experience that’s like the dark web itself: unpredictable, unreliable and maddeningly slow.

[ Is your data being sold? What you need to know about monitoring the dark web. | Get the latest from CSO by signing up for our newsletters. ]

Still, for those willing to put up with the inconvenience, the dark web provides a memorable glimpse at the seamy underbelly of the human experience – without the risk of skulking around in a dark alley.

Dark web search engine
Dark web search engines exist, but even the best are challenged to keep up with the constantly shifting landscape. The experience is reminiscent of searching the web in the late 1990s. Even one of the best search engines, called Grams, returns results that are repetitive and often irrelevant to the query. Link lists like The Hidden Wiki are another option, but even indices also return a frustrating number of timed-out connections and 404 errors.

Dark web sites
Dark web sites look pretty much like any other site, but there are important differences. One is the naming structure. Instead of ending in .com or .co, dark web sites end in .onion. That’s “a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network,” according to Wikipedia. Browsers with the appropriate proxy can reach these sites, but others can’t.

Dark web sites also use a scrambled naming structure that creates URLs that are often impossible to remember. For example, a popular commerce site called Dream Market goes by the unintelligible address of “eajwlvm3z2lcca76.onion.”

Many dark websites are set up by scammers, who constantly move around to avoid the wrath of their victims. Even commerce sites that may have existed for a year or more can suddenly disappear if the owners decide to cash in and flee with the escrow money they’re holding on behalf of customers.

Law enforcement officials are getting better at finding and prosecuting owners of sites that sell illicit goods and services. In the summer of 2017, a team of cyber cops from three countries successfully shut down AlphaBay, the dark web’s largest source of contraband, sending shudders throughout the network. But many merchants simply migrated elsewhere.

The anonymous nature of the Tor network also makes it especially vulnerable to DDoS, said Patrick Tiquet, Director of Security & Architecture at Keeper Security, and the company’s resident expert on the topic. “Sites are constantly changing addresses to avoid DDoS, which makes for a very dynamic environment,” he said. As a result, “The quality of search varies widely, and a lot of material is outdated.”

SALTED HASH
Get a hands-on, inside look at the dark web | Salted Hash Ep 25
Commerce on the dark web
The dark web has flourished thanks to bitcoin, the crypto-currency that enables two parties to conduct a trusted transaction without knowing each other’s identity. “Bitcoin has been a major factor in the growth of the dark web, and the dark web has been a big factor in the growth of bitcoin,” says Tiquet.

Nearly all dark web commerce sites conduct transactions in bitcoin or some variant, but that doesn’t mean it’s safe to do business there. The inherent anonymity of the place attracts scammers and thieves, but what do you expect when buying guns or drugs is your objective?

Dark web commerce sites have the same features as any e-retail operation, including ratings/reviews, shopping carts and forums, but there are important differences. One is quality control. When both buyers and sellers are anonymous, the credibility of any ratings system is dubious. Ratings are easily manipulated, and even sellers with long track records have been known to suddenly disappear with their customers’ crypto-coins, only to set up shop later under a different alias.

Most e-commerce providers offer some kind of escrow service that keeps customer funds on hold until the product has been delivered. However, in the event of a dispute don’t expect service with a smile. It’s pretty much up to the buyer and the seller to duke it out. Every communication is encrypted, so even the simplest transaction requires a PGP key.

Even completing a transaction is no guarantee that the goods will arrive. Many need to cross international borders, and customs officials are cracking down on suspicious packages. The dark web news site Deep.Dot.Web teems with stories of buyers who have been arrested or jailed for attempted purchases.

SECURITY
How the dark web has gone corporate
Is the dark web illegal?
We don’t want to leave you with the impression that everything on the dark web is nefarious or illegal. The Tor network began as an anonymous communications channel, and it still serves a valuable purpose in helping people communicate in environments that are hostile to free speech. “A lot of people use it in countries where there’s eavesdropping or where internet access is criminalized,” Tiquet said.

If you want to learn all about privacy protection or cryptocurrency, the dark web has plenty to offer. There are a variety of private and encrypted email services, instructions for installing an anonymous operating system and advanced tips for the privacy-conscious.

There’s also material that you wouldn’t be surprised to find on the public web, such as links to full-text editions of hard-to-find books, collections of political news from mainstream websites and a guide to the steam tunnels under the Virginia Tech campus. You can conduct discussions about current events anonymously on Intel Exchange. There are several whistleblower sites, including a dark web version of Wikileaks. Pirate Bay, a BitTorrent site that law enforcement officials have repeatedly shut down, is alive and well there. Even Facebook has a dark web presence.

“More and more legitimate web companies are starting to have presences there,” Tiquet said. “It shows that they’re aware, they’re cutting edge and in the know.”

There’s also plenty of practical value for some organizations. Law enforcement agencies keep an ear to the ground on the dark web looking for stolen data from recent security breaches that might lead to a trail to the perpetrators. Many mainstream media organizations monitor whistleblower sites looking for news.

Staying on top of the hacker underground
Keeper’s Patrick Tiquet checks in regularly because it’s important for him to be on top of what’s happening in the hacker underground. “I use the dark web for situational awareness, threat analysis and keeping an eye on what’s going on,” he said will. “I want to know what information is available and have an external lens into the digital assets that are being monetized – this gives us insight on what hackers are targeting.”

If you find your own information on the dark web, there’s precious little you can do about it, but at least you’ll know you’ve been compromised. Bottom line: If you can tolerate the lousy performance, unpredictable availability, and occasional shock factor of the dark web, it’s worth a visit. Just don’t buy anything there.
submitted by hireahackerpro to u/hireahackerpro [link] [comments]

Weekly Crypto News — July, 03

What important crypto events happened last week?
Regulation, Government, Mass Adoption
📌 The U.S. court classified Coinbase as a traditional bank after the exchange revealed its customer information at the request of the FBI. This decision was made when considering the appeal of Richard Gratkowski, sentenced to 5 years and 10 months in prison. Earlier, the FBI found out that between June 2016 and May 2017, Richard Gratkovsky used Bitcoins to purchase prohibited pornographic materials involving minors. Having detected the wallets used by him, the agency turned to Coinbase with a request to disclose information about this client. The exchange complied with this requirement without a court order.
📌 Binance Exchange has confirmed the launch of a cryptocurrency debit card in partnership with Swipe. Information about this appeared on the official website of the company but later disappeared. One of the features of the card will be the ability to exchange cryptocurrencies for fiat money in real-time. Users will be able to transfer money to the card directly from the Binance trading account. Payments will be instant, funds can be spent immediately after crediting. In addition, cardholders will be able to withdraw cash from ATMs.
📌 The District of Columbia Bar has allowed lawyers in Washington D.C. to accept payments in Bitcoins and other cryptocurrencies. Representatives of the organization noted that cryptocurrencies are rapidly gaining popularity as a means of payment and lawyers cannot stand aside from these changes. Acceptance of payment in crypto is permissible if the lawyer is able to ensure the safe storage of assets. To do this, he must have basic knowledge in the field of blockchain.
Projects, Collaborations, Startups
📌 BlockFi, a company operating in the cryptocurrency lending market, reported a doubling of monthly revenue in the second quarter. The driver was halving and launching a mobile application. “By now, monthly income has quadrupled since the end of last year and doubled if we start from the end of March,” said Zac Prince, co-founder, and CEO of the startup.
📌 CoinGecko, an analytical service, has announced a partnership with cybersecurity company Hacken. As part of the collaboration, CoinGecko integrated into the so-called Trust Score cryptocurrency exchange security assessment metrics based on the platform data from Hacken. Among others, Hacken considers platform infrastructure security, including server security, two-factor user authentication, spam and phishing protection, and other criteria.
📌 According to Messari, the market capitalization of dollar-tied stablecoin Tether (USDT) reached $10.3 billion. The growth since the beginning of the year, when the figure was $4.76 billion, exceeded 116%. Other stablecoins are significantly inferior to USDT in terms of market supply.
📌 Binance cryptocurrency exchange has completed a major update of the trading engine, increasing the processing speed of operations by 10 times, company CEO Changpeng Zhao said. According to him, the update was the largest in the history of Binance. It took two years to develop it. Zhao noted that in doing so, the exchange is preparing the “next wave” of cryptocurrency market growth.
Blockchain
📌 According to Messari, Bitcoin and Ethereum account for more than 99% of the commissions received by all miners. Over the past 24 hours, the total amount of commissions in the Bitcoin network has amounted to $407,571. Ethereum has a significantly higher rate — $814,082.
📌 On June 30, at block # 637 056 in the Bitcoin network, the planned recalculation of mining complexity took place. The indicator has undergone the most insignificant change since March 22, 2010, having decreased by 0.0033% from 15.7847 T to 15.7842 T. Thus, the complexity of mining Bitcoin almost did not change for the first time in 10 years.
📌 A transaction of 101 857 BTC (~$ 933 million at the time of sending) was recorded in the Bitcoin network between anonymous addresses. Transaction passed between anonymous addresses. The commission was only 48 cents. An anonymous whale used the SegWit protocol, which reduced costs by 41%.
📌 One of the Bitcoin users included the message “Hello, Noah! Welcome to the world, little one” in one of the transactions, thus recording the birth of their first child. The unchanging and censorship-resistant nature of Bitcoin will ensure that this message remains forever on the blockchain while it continues to function. The current case demonstrates a widely discussed scenario for using the first cryptocurrency as a decentralized database.
Hacking, Cyber Crimes
📌 Russian Sergei Medvedev admitted involvement in the cybercriminal organization Infraud, which traded stolen personal data, compromised credit cards, malware, and other illegal things. “Over the course of its seven-year history, Infraud caused an estimated loss of about $2.2 billion and more than $568 million in actual losses to a wide range of financial institutions, sellers and individuals,” the US Department of Justice declared.
📌 The criminals received a $1.14 million ransom after a successful attack on the University of California. The software installed by hackers encrypted the data on the university’s servers at the School of Medicine, making the information temporarily unavailable. To fix the problem, the institution had to pay 116.4 BTC.
📌 An unknown hacker managed to withdraw $500,000 in altcoins WETH, WBTC, SNX, and LINK from the pool of the Balancer Labs DeFi project using a smart contract vulnerability that allowed an attacker to create a shortage of funds in the pools.

That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to CryptoMarkets [link] [comments]

Weekly Crypto News — July, 03

What important crypto events happened last week?
Regulation, Government, Mass Adoption
📌 The U.S. court classified Coinbase as a traditional bank after the exchange revealed its customer information at the request of the FBI. This decision was made when considering the appeal of Richard Gratkowski, sentenced to 5 years and 10 months in prison. Earlier, the FBI found out that between June 2016 and May 2017, Richard Gratkovsky used Bitcoins to purchase prohibited pornographic materials involving minors. Having detected the wallets used by him, the agency turned to Coinbase with a request to disclose information about this client. The exchange complied with this requirement without a court order.
📌 Binance Exchange has confirmed the launch of a cryptocurrency debit card in partnership with Swipe. Information about this appeared on the official website of the company but later disappeared. One of the features of the card will be the ability to exchange cryptocurrencies for fiat money in real-time. Users will be able to transfer money to the card directly from the Binance trading account. Payments will be instant, funds can be spent immediately after crediting. In addition, cardholders will be able to withdraw cash from ATMs.
📌 The District of Columbia Bar has allowed lawyers in Washington D.C. to accept payments in Bitcoins and other cryptocurrencies. Representatives of the organization noted that cryptocurrencies are rapidly gaining popularity as a means of payment and lawyers cannot stand aside from these changes. Acceptance of payment in crypto is permissible if the lawyer is able to ensure the safe storage of assets. To do this, he must have basic knowledge in the field of blockchain.
Projects, Collaborations, Startups
📌 BlockFi, a company operating in the cryptocurrency lending market, reported a doubling of monthly revenue in the second quarter. The driver was halving and launching a mobile application. “By now, monthly income has quadrupled since the end of last year and doubled if we start from the end of March,” said Zac Prince, co-founder, and CEO of the startup.
📌 CoinGecko, an analytical service, has announced a partnership with cybersecurity company Hacken. As part of the collaboration, CoinGecko integrated into the so-called Trust Score cryptocurrency exchange security assessment metrics based on the platform data from Hacken. Among others, Hacken considers platform infrastructure security, including server security, two-factor user authentication, spam and phishing protection, and other criteria.
📌 According to Messari, the market capitalization of dollar-tied stablecoin Tether (USDT) reached $10.3 billion. The growth since the beginning of the year, when the figure was $4.76 billion, exceeded 116%. Other stablecoins are significantly inferior to USDT in terms of market supply.
📌 Binance cryptocurrency exchange has completed a major update of the trading engine, increasing the processing speed of operations by 10 times, company CEO Changpeng Zhao said. According to him, the update was the largest in the history of Binance. It took two years to develop it. Zhao noted that in doing so, the exchange is preparing the “next wave” of cryptocurrency market growth.
Blockchain
📌 According to Messari, Bitcoin and Ethereum account for more than 99% of the commissions received by all miners. Over the past 24 hours, the total amount of commissions in the Bitcoin network has amounted to $407,571. Ethereum has a significantly higher rate — $814,082.
📌 On June 30, at block # 637 056 in the Bitcoin network, the planned recalculation of mining complexity took place. The indicator has undergone the most insignificant change since March 22, 2010, having decreased by 0.0033% from 15.7847 T to 15.7842 T. Thus, the complexity of mining Bitcoin almost did not change for the first time in 10 years.
📌 A transaction of 101 857 BTC (~$ 933 million at the time of sending) was recorded in the Bitcoin network between anonymous addresses. Transaction passed between anonymous addresses. The commission was only 48 cents. An anonymous whale used the SegWit protocol, which reduced costs by 41%.
📌 One of the Bitcoin users included the message “Hello, Noah! Welcome to the world, little one” in one of the transactions, thus recording the birth of their first child. The unchanging and censorship-resistant nature of Bitcoin will ensure that this message remains forever on the blockchain while it continues to function. The current case demonstrates a widely discussed scenario for using the first cryptocurrency as a decentralized database.
Hacking, Cyber Crimes
📌 Russian Sergei Medvedev admitted involvement in the cybercriminal organization Infraud, which traded stolen personal data, compromised credit cards, malware, and other illegal things. “Over the course of its seven-year history, Infraud caused an estimated loss of about $2.2 billion and more than $568 million in actual losses to a wide range of financial institutions, sellers and individuals,” the US Department of Justice declared.
📌 The criminals received a $1.14 million ransom after a successful attack on the University of California. The software installed by hackers encrypted the data on the university’s servers at the School of Medicine, making the information temporarily unavailable. To fix the problem, the institution had to pay 116.4 BTC.
📌 An unknown hacker managed to withdraw $500,000 in altcoins WETH, WBTC, SNX, and LINK from the pool of the Balancer Labs DeFi project using a smart contract vulnerability that allowed an attacker to create a shortage of funds in the pools.

That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to CryptoNews [link] [comments]

Weekly Crypto News — July, 03

What important crypto events happened last week?
Regulation, Government, Mass Adoption
📌 The U.S. court classified Coinbase as a traditional bank after the exchange revealed its customer information at the request of the FBI. This decision was made when considering the appeal of Richard Gratkowski, sentenced to 5 years and 10 months in prison. Earlier, the FBI found out that between June 2016 and May 2017, Richard Gratkovsky used Bitcoins to purchase prohibited pornographic materials involving minors. Having detected the wallets used by him, the agency turned to Coinbase with a request to disclose information about this client. The exchange complied with this requirement without a court order.
📌 Binance Exchange has confirmed the launch of a cryptocurrency debit card in partnership with Swipe. Information about this appeared on the official website of the company but later disappeared. One of the features of the card will be the ability to exchange cryptocurrencies for fiat money in real-time. Users will be able to transfer money to the card directly from the Binance trading account. Payments will be instant, funds can be spent immediately after crediting. In addition, cardholders will be able to withdraw cash from ATMs.
📌 The District of Columbia Bar has allowed lawyers in Washington D.C. to accept payments in Bitcoins and other cryptocurrencies. Representatives of the organization noted that cryptocurrencies are rapidly gaining popularity as a means of payment and lawyers cannot stand aside from these changes. Acceptance of payment in crypto is permissible if the lawyer is able to ensure the safe storage of assets. To do this, he must have basic knowledge in the field of blockchain.
Projects, Collaborations, Startups
📌 BlockFi, a company operating in the cryptocurrency lending market, reported a doubling of monthly revenue in the second quarter. The driver was halving and launching a mobile application. “By now, monthly income has quadrupled since the end of last year and doubled if we start from the end of March,” said Zac Prince, co-founder, and CEO of the startup.
📌 CoinGecko, an analytical service, has announced a partnership with cybersecurity company Hacken. As part of the collaboration, CoinGecko integrated into the so-called Trust Score cryptocurrency exchange security assessment metrics based on the platform data from Hacken. Among others, Hacken considers platform infrastructure security, including server security, two-factor user authentication, spam and phishing protection, and other criteria.
📌 According to Messari, the market capitalization of dollar-tied stablecoin Tether (USDT) reached $10.3 billion. The growth since the beginning of the year, when the figure was $4.76 billion, exceeded 116%. Other stablecoins are significantly inferior to USDT in terms of market supply.
📌 Binance cryptocurrency exchange has completed a major update of the trading engine, increasing the processing speed of operations by 10 times, company CEO Changpeng Zhao said. According to him, the update was the largest in the history of Binance. It took two years to develop it. Zhao noted that in doing so, the exchange is preparing the “next wave” of cryptocurrency market growth.
Blockchain
📌 According to Messari, Bitcoin and Ethereum account for more than 99% of the commissions received by all miners. Over the past 24 hours, the total amount of commissions in the Bitcoin network has amounted to $407,571. Ethereum has a significantly higher rate — $814,082.
📌 On June 30, at block # 637 056 in the Bitcoin network, the planned recalculation of mining complexity took place. The indicator has undergone the most insignificant change since March 22, 2010, having decreased by 0.0033% from 15.7847 T to 15.7842 T. Thus, the complexity of mining Bitcoin almost did not change for the first time in 10 years.
📌 A transaction of 101 857 BTC (~$ 933 million at the time of sending) was recorded in the Bitcoin network between anonymous addresses. Transaction passed between anonymous addresses. The commission was only 48 cents. An anonymous whale used the SegWit protocol, which reduced costs by 41%.
📌 One of the Bitcoin users included the message “Hello, Noah! Welcome to the world, little one” in one of the transactions, thus recording the birth of their first child. The unchanging and censorship-resistant nature of Bitcoin will ensure that this message remains forever on the blockchain while it continues to function. The current case demonstrates a widely discussed scenario for using the first cryptocurrency as a decentralized database.
Hacking, Cyber Crimes
📌 Russian Sergei Medvedev admitted involvement in the cybercriminal organization Infraud, which traded stolen personal data, compromised credit cards, malware, and other illegal things. “Over the course of its seven-year history, Infraud caused an estimated loss of about $2.2 billion and more than $568 million in actual losses to a wide range of financial institutions, sellers and individuals,” the US Department of Justice declared.
📌 The criminals received a $1.14 million ransom after a successful attack on the University of California. The software installed by hackers encrypted the data on the university’s servers at the School of Medicine, making the information temporarily unavailable. To fix the problem, the institution had to pay 116.4 BTC.
📌 An unknown hacker managed to withdraw $500,000 in altcoins WETH, WBTC, SNX, and LINK from the pool of the Balancer Labs DeFi project using a smart contract vulnerability that allowed an attacker to create a shortage of funds in the pools.

That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to CryptoCurrencies [link] [comments]

Weekly Crypto News — July, 03

What important crypto events happened last week?
Regulation, Government, Mass Adoption
📌 The U.S. court classified Coinbase as a traditional bank after the exchange revealed its customer information at the request of the FBI. This decision was made when considering the appeal of Richard Gratkowski, sentenced to 5 years and 10 months in prison. Earlier, the FBI found out that between June 2016 and May 2017, Richard Gratkovsky used Bitcoins to purchase prohibited pornographic materials involving minors. Having detected the wallets used by him, the agency turned to Coinbase with a request to disclose information about this client. The exchange complied with this requirement without a court order.
📌 Binance Exchange has confirmed the launch of a cryptocurrency debit card in partnership with Swipe. Information about this appeared on the official website of the company but later disappeared. One of the features of the card will be the ability to exchange cryptocurrencies for fiat money in real-time. Users will be able to transfer money to the card directly from the Binance trading account. Payments will be instant, funds can be spent immediately after crediting. In addition, cardholders will be able to withdraw cash from ATMs.
📌 The District of Columbia Bar has allowed lawyers in Washington D.C. to accept payments in Bitcoins and other cryptocurrencies. Representatives of the organization noted that cryptocurrencies are rapidly gaining popularity as a means of payment and lawyers cannot stand aside from these changes. Acceptance of payment in crypto is permissible if the lawyer is able to ensure the safe storage of assets. To do this, he must have basic knowledge in the field of blockchain.
Projects, Collaborations, Startups
📌 BlockFi, a company operating in the cryptocurrency lending market, reported a doubling of monthly revenue in the second quarter. The driver was halving and launching a mobile application. “By now, monthly income has quadrupled since the end of last year and doubled if we start from the end of March,” said Zac Prince, co-founder, and CEO of the startup.
📌 CoinGecko, an analytical service, has announced a partnership with cybersecurity company Hacken. As part of the collaboration, CoinGecko integrated into the so-called Trust Score cryptocurrency exchange security assessment metrics based on the platform data from Hacken. Among others, Hacken considers platform infrastructure security, including server security, two-factor user authentication, spam and phishing protection, and other criteria.
📌 According to Messari, the market capitalization of dollar-tied stablecoin Tether (USDT) reached $10.3 billion. The growth since the beginning of the year, when the figure was $4.76 billion, exceeded 116%. Other stablecoins are significantly inferior to USDT in terms of market supply.
📌 Binance cryptocurrency exchange has completed a major update of the trading engine, increasing the processing speed of operations by 10 times, company CEO Changpeng Zhao said. According to him, the update was the largest in the history of Binance. It took two years to develop it. Zhao noted that in doing so, the exchange is preparing the “next wave” of cryptocurrency market growth.
Blockchain
📌 According to Messari, Bitcoin and Ethereum account for more than 99% of the commissions received by all miners. Over the past 24 hours, the total amount of commissions in the Bitcoin network has amounted to $407,571. Ethereum has a significantly higher rate — $814,082.
📌 On June 30, at block # 637 056 in the Bitcoin network, the planned recalculation of mining complexity took place. The indicator has undergone the most insignificant change since March 22, 2010, having decreased by 0.0033% from 15.7847 T to 15.7842 T. Thus, the complexity of mining Bitcoin almost did not change for the first time in 10 years.
📌 A transaction of 101 857 BTC (~$ 933 million at the time of sending) was recorded in the Bitcoin network between anonymous addresses. Transaction passed between anonymous addresses. The commission was only 48 cents. An anonymous whale used the SegWit protocol, which reduced costs by 41%.
📌 One of the Bitcoin users included the message “Hello, Noah! Welcome to the world, little one” in one of the transactions, thus recording the birth of their first child. The unchanging and censorship-resistant nature of Bitcoin will ensure that this message remains forever on the blockchain while it continues to function. The current case demonstrates a widely discussed scenario for using the first cryptocurrency as a decentralized database.
Hacking, Cyber Crimes
📌 Russian Sergei Medvedev admitted involvement in the cybercriminal organization Infraud, which traded stolen personal data, compromised credit cards, malware, and other illegal things. “Over the course of its seven-year history, Infraud caused an estimated loss of about $2.2 billion and more than $568 million in actual losses to a wide range of financial institutions, sellers and individuals,” the US Department of Justice declared.
📌 The criminals received a $1.14 million ransom after a successful attack on the University of California. The software installed by hackers encrypted the data on the university’s servers at the School of Medicine, making the information temporarily unavailable. To fix the problem, the institution had to pay 116.4 BTC.
📌 An unknown hacker managed to withdraw $500,000 in altcoins WETH, WBTC, SNX, and LINK from the pool of the Balancer Labs DeFi project using a smart contract vulnerability that allowed an attacker to create a shortage of funds in the pools.

That’s all for now! For more details follow us on Twitter, subscribe to our YouTube channel, join our Telegram.
submitted by CoinjoyAssistant to u/CoinjoyAssistant [link] [comments]

New York Man Charged In $100 Million Bitcoin Case

A New York City man has been charged with hacking, trafficking in stolen credit card data, and laundering money with bitcoin, highlighting the cryptocurrency's enduring appeal to cyber criminals.
Vitalii Antonenko, 28, was arrested and detained on money laundering charges on arrival at New York’s JFK airport from Ukraine in March last year after undercover agents linked him to two bitcoin wallets used in transactions totaling $94 million, according to a Law360 report.
On Wednesday this week, the U.S. attorney's office in Boston handed down the indictment that could see Antonenko jailed for 20 years and fined up to $500,000.
According to the indictment, Antonenko, along with a number of co-conspirators, scoured the internet for vulnerable computer networks that were likely to contain credit and debit card details.
The hackers then sold the stolen information on so-called darknet markets that are used to traffic all manner of illegal drugs, firearms, and data.
It's thought bitcoin as well as bank and cash transactions was used to launder the proceeds, with over $140,000 from the pair of bitcoin wallets found to have been funneled to wallets controlled by Antonenko.
Last year, Antonenko's lawyers took the rare step of requesting a psychiatric evaluation of their client after they said he had trouble communicating and suggested he is secretly working for the CIA.
The charges against Antonenko come as the bitcoin and cryptocurrency community struggles to overcome historic links with illegal and illicit transactions.
Bitcoin's semi-anonymous nature, which has led it to be referred to as "internet cash," makes it attractive for those wishing to avoid government scrutiny and law enforcement.
However, computer scientists have developed forensic and sophisticated techniques that often allow bitcoin and cryptocurrency users to be identified.
In January, criminal activity using bitcoin hit an all-time high, according to research from cryptocurrency and blockchain analysis firm Chainalysis.
submitted by PresentType to infsomorebitcoinmixer [link] [comments]

Amazing article that shows how bitcoin works in times of turmoil. Spoiler alert: not well.

Link to the article: https://finance.yahoo.com/news/global-protests-reveal-bitcoin-limitations-175009109.html
Notable quotes:
protesters who tried mesh-network devices, which basically bounce a message or transaction across a web of devices until it finds a device with internet access, found they were “not useful for a confrontational situation.” Although many protesters use Telegram because it allows chatting without revealing the users’ phone numbers, he said tools that rely on mobile data providers offer limited functionality in times of turmoil.
As with protests in the Middle East, sources in Hong Kong said bitcoin and related technologies are not ready for usage in chaotic environments because the movement is still nascent and money generally relies on network effects. At this point, censorship-resistant technology can still be censored as long as it remains too niche.
Blockstream bitcoin satellite and mesh network technologies aren’t useful when you’re in a massive internet desert. “In situations where we don’t have physical connection none of these fucking technologies help us,” he said.
Whoa there goes the Mad Max champagne apocalypse bitcoin thesis. You won't rule the world with your few coins if shit hits the fan. Citadels won't exist, they are a meme. It's time to wake up from the dream. Nobody gives a fuck about your buttcoin satellite when there's no internet and the order crumbles.
After all, even if he got a transaction through, there are too few tech-savvy recipients to make digital transactions a worthwhile use of his time.
Two weeks ago, a few bitcoin traders found hackers had accessed their mobile phones and stolen cryptocurrency. Local social groups brimmed with concerns about which anonymous trader accounts could be trusted. As reported by the local outlet VDL News, the alleged hacker may have knowledge of the victims’ location and access to a network run by the telecommunications company Touch, because the hack involved intercepting messages at the service level.
“They can hijack WhatsApp, Telegram [accounts],” one alleged hacking victim said. “That means you can’t trust your mobile identity. … They [hackers] can create trouble between parties, fake accounts and impersonation.”
So this hack served as a wake-up call to the local community. In short, there is no substitute for in-person networking and long-standing relationships. Without them, the privacy created by avatars is also a liability.
Yeah but new trustless paradigm!? Surely those weak hands that lost their coins must understand that this was their own fault for not being grandmasters of cybersecurity high stakes speed chess? Why won't people get it? Just don't lose your coins, it's that simple!
LocalBitcoins data on peer-to-peer bitcoin trades in Hong Kong and Iran don’t show any relative spikes, reflecting the same narrative from over-the-counter Lebansese traders. Many bitcoiners prefer to stay deep underground these days, another Tehran-based bitcoiner said, fearful of attracting the attention of authorities on the hunt for people to suspect and arrest.
Scattered and fragmented communities offer scant liquidity on the ground.
In fact, Lebanese entrepreneur Dany Moussa told CoinDesk his homeland is predominantly a cash society, so even credit and debit cards might have a learning curve for some. It should also be noted that chatter in Lebanese groups shows hardware wallets don’t always work as designed, so users often need to help each other fix them.
FUD!
When global crypto exchanges and service providers ban a population due to sanctions or compliance concerns, as they have with Iranians and Lebanese people to some extent, ties to global communities can provide a lifeline. Across the board, sources said that connectivity and accessibility on the ground were the two fundamental challenges.
Bitcoin fixes this.
“I find it ironic that the first world talks about how bitcoin is freedom to the unbanked, but the unbanked have no way to get bitcoin,” he said. “Bitcoin feels like a novelty at times, or a privilege.”
Bitcoin helps hundreds of billions of unbanked across the world already. Surely this is only a minor obstacle on the road to mainstream adoption. As soon as the gubermint turns on the internet again we'll be gucci bro.
submitted by Cthulhooo to Buttcoin [link] [comments]

Hide and Seek

I know you are reading this. You know who you are. This game has went on for long enough. It has been almost a year. Please, let it end. I am begging you. I just want my life back.
For everyone else, I will start at the beginning.
I am sure all of you have seen those youtube or twitch streamers who like to scam the scammers by wasting their time, right? I thought it was funny so I decided I would do the same thing, except without broadcasting it to the world. It was a lot of fun to see how long I could keep these assholes tied up on the phone with me instead of your trusting grandma.
Then I heard about the “Dark Web” and how there are also people on there who like to scam people. I admit, I had never been on the dark web before, but I had heard the stories. It was the wild west where you could buy drugs and have them delivered to your door and the police couldn’t track you. You could hire a hitman to kill anybody you wanted as long as you had bitcoins to pay them with. Sadly, I also heard about the child porn rings and knew I did not want to accidentally land on one of those pages. The anonymous nature of the dark web can both a blessing and a curse.
I logged on to the dark web and was able to find a page advertising hacking services. Not real hacking, but more stuff like hacking into your significant others facebook account or email to see if they are cheating on you. Stuff a simple keylogger would accomplish but they were asking for hundreds and sometimes thousands of dollars. It was clearly a scam and was exactly what I was looking for.
Before I talk to any scammer, I spoof my number and have a virtual machine set up so if they take command of my computer, they are not actually doing anything real. It is all just a charade. I never use my real name, or real telephone number.
It started off the same way these things always start off. I act interested in a service, but I am not smart enough to know how to buy and send bitcoin. I string them along, and they eventually try to walk me through it over the phone. No matter how easy they make it, I am just too dumb to figure it out. They eventually get tired of dealing with me and hang up. All I wasted was both of our time.
This call was different. After about 5 minutes of me playing dumb, they figured it out and were pissed.
“You think you’re funny?”
“What are you talking about?”
“Trying to waste our time?”
“Yea, the more time you waste on me, the less time you have to scam other people.”
“You fucked up this time. You fucked with the wrong people.”
“Why do you do this? Scam people? Does it make you feel good?”
“We aren’t the spam callers you normally talk to in Nigeria or India, Jason. You are on the Dark Web now, and you should have known better than to fuck with people on the Dark Web.”
How the hell did they know my name was Jason? I told them my name was David. What the fuck? I better get off here now.
“You are a scammer. Get a real job and stop trying to scam people.”
I ended the call.
Less than a minute later, my phone rang from my own number. I knew I shouldn’t have answered it, but I did. I knew who it was.
“Hello?”
“Jason, we don’t like it when people hang up on us.”
“Listen, I clearly messed with the wrong person. I’m sorry. I am just trying to annoy scammers who scam innocent people. That’s all. This is just a big misunderstanding. Let’s just go our separate ways. I am sorry.”
“That is not how this is going to work Jason Keys”
“How do you know my name?”
“You found hackers on the Dark Web, are you surprised we know who you are and that your address is XXXXX ?” Yes, they knew my address.
“Okay, you were able to trace my phone and get my personal information. I get it. I fucked up.”
“Where are you right now, Jason?”
“I’m at work.” I lied.
‘No, you’re not, Jason. You are in your kitchen.”
“Okay, you somehow have used my phone’s GPS to find my location. I get it. You are real hackers. I will never waste your time or anyone else’s time again. I swear.”
“Do you like games, Jason?”
“What do you mean? I have an xbox.”
“Were going to play a game.”
“No, we don’t have to do that. We can just go our own way.”
“We are going to play Hide and Seek. You know how to play Hide and Seek right Jason?”
“The kids game. Yea. Everyone knows how to play that but I don’t want to play this game. I don’t even know who you are.”
“That is what makes this game so much fun for us. We know who you are. But to you, we could be anyone, anywhere, at anytime.”
“No. I am not going to play your game.”
“You don’t seem to understand. You don’t have a choice in the matter.”
“What happens when you catch me?”
“Then you will have to hide again.”
“What if I just don’t play?”
“Bad things will happen to you.” they said. “You have 12 hours to hide. Good luck.”
They hung up. .
They are just fucking with me I thought.
I clicked on the Facebook app on my phone and a message popped up saying No Account Found. I tried my twitter and gmail account and everything was gone. Somehow they had deleted my entire online presence while they were on the phone with me.
I knew I never should have went onto the Dark Web. I should have believed all the rumors I read about that place.
Maybe this person was serious about playing their game of Hide and Seek. At worst, I thought, I should find a different place to sleep for a few days just to let this pass over. I grabbed my backpack and threw in a few pairs of clothes to last three days, a pillow, and a toothbrush. That should be enough, I thought.
I called out of work and told them I had a family emergency and would be gone for a few days. I wasn’t sure where I was going to go yet, but a full tank of gas was a start. I slid my card into the gas pump and it came back denied. That is weird, I had just gotten paid 2 days before and had plenty of money in my account. I pulled out a credit card and tried again. It was also denied.
I went to the bank to get this problem sorted out. I told the teller my card was declined but I had money in my account earlier. She took my details to pull up my account, but their system showed no account ever existed under my name. I told her that was impossible! I showed her I have a debit card with my name on it. She called a manager over and they took the card away and told me I could be charged with fraud for having a fake debit card. I tried to explain but they were certain they have never had an account under my name or social security number. Even if I had an account in the past, their system would have been able to find it under my social.
I left the bank dumbfounded. My card had worked the day before and I have had an account at that bank since I turned 18 over five years ago. There is no way even hackers could delete my accounts that fast, if it is even possible at all. It had been less than an hour.
I sat on the hood of my car and called the credit card companies, but they had no records of me on file either. The one positive thing about this entire experience is they wiped off a few grand in my credit card debt, so I guess thank you for that much.
I went back to my car and the reality of the situation came crashing down on me. They knew who I was, where I lived, and now I had no access to any money. I sat down in the car to think over my options of what to do next when I saw an envelope on the passenger seat. I opened it up and it contained $100 cash (5 twenty dollar bills) and a note.
Time is ticking. You have $100 dollars and 11 hours left. You better go hide, because soon I will start to seek.
They found me already? How were they already in my town and knew where I was and what kind of car I drove? What am I going to do now? They are already watching me and what kind of car I drive, I am not even going to be able to use my own car.
After some thinking, I drove to the bus stop and bought a ticket for a bus heading North. It would be making 6 stops between here and Chicago so I can get out of town and decide where to get off later. They can’t know where I am going to be if I don’t even know where I’ll be. The ticket was $50 dollars so that only leaves me $50. I decided I would just have to deal with it later.
The bus ride itself is a nightmare on its own, but that is a story for another time. I got on the bus and finally decided enough was enough in Indianapolis. I left a warm Atlanta for Indiana with nothing but a few changes of clothes in my backpack. Could life be much worse?
I got something to eat at a McDonalds close to the bus stop and saved what little money I had left. There wasn’t enough money to spare for a motel, no matter how shady it was. I needed to save every penny I had right now. I slept outside and froze my ass off.
I didn’t know a soul there. I just decided it would be best if I kept a low profile and tried to stay out of sight. I didn’t have any sort of electronics for them to track and I don’t have any credit cards to trace. They shouldn’t have any idea where I got off the bus at. I could be in any city between Atlanta and Chicago if they had seen what bus I got off on.
That night, I found a starbucks and decided to grab myself a coffee. I put in my order and went to the restroom to clean myself up a little. I got back just as they were calling my name telling me my drink was ready. I grabbed my coffee and the employee said someone had given him a note to give me with my coffee. My heart sank as I sat down and opened the envelope. They had found me in less than 24 hours after I traveled over 500 miles away without telling a soul.
Inside was another $100 dollars and a note.
Not a bad start, most aren’t smart enough to ditch their car and town so fast. You have $100 dollars and 24 hours to find a new hiding spot. Try a little harder next time. I like a challenge.
I sat in the starbucks exhausted and defeated. If they found me that easily then was there any way to escape them? I decided to do what I should have done when all of this started. I went to the police.
The police listened to my story and then took my ID. They asked some questions and clearly did not believe I was telling the truth. They asked if I had taken any drugs and then ran my ID. When he came back he asked me if it was a fake ID because it was not pulling any information on me. I asked him to try one more time.
Before he tried again, he asked if I might be having some mental problems or off my medicine because I sounded like I might be having an episode. I’m pretty sure he wanted to take me to the hospital for a psychiatric hold.
When he went to run my ID again, I quietly slipped out the door and escaped. I knew what they had done. I no longer exist. At least in the eyes of the law and the public. My identity was deleted. My bank accounts were gone. My credit cards were gone. My social media was gone. Everything that proved who I was is gone. Outside of those who know me, I do not exist. And if I don’t exist, they can kill me with ease.
I walked to a truck stop near the interstate and was able to hitch a ride to Chicago for $20 dollars. A random trucker seemed a lot safer than a Greyhound bus full of drug addicts and creeps like I had taken to get this far. At least I got 2 hours of sleep in a warm cab.
In Chicago, I bought a burner phone and decided it was time to call home. It was prepaid, cheap, and new. The only number I knew was my own and my mom’s so I had to call her. I called her up and she was worried and asked where I was. I told her Chicago and started to explain what had led me here, but the call dropped. I looked at my phone and it said it had no service. A few moments later I got a text message.
YOU CAN USE A PHONE. YOU CAN’T ASK FOR HELP. THE RULES ARE SIMPLE YOU HIDE. WE SEEK.
I threw the phone against the wall and it shattered into pieces. It was a brand new phone. Nobody should have been able to know or hack it so fast. I am alone. Nobody can help me. I don’t know what to do anymore. The only option I had was to play their stupid game.
Since January 16th, my life has been constantly moving from town to town, sleeping in homeless shelters or park benches. Every night I go to sleep wondering if I will wake up to a note next to my head telling me to hide again. Every day I worry a random person will hand me an envelope.
I know some of you guys must be asking yourself why I even play the game? Why don’t I just stop running? They are just playing with me. They would not actually hurt me.
I have tried that before. In Colorado, I was tired, cold, and wet when they found me. I decided enough was enough. They left me the note mocking my attempts to run away and gave me another $50 dollars. I said screw it, let them kill me. I got me a nice hotel at the Hilton and spent all the money I had on a nice steak dinner. If they decided to kill me, at least I would have a nice last meal and a warm bed on my last night.
I thought I would have been up all night worried, but I was too worn out to care. I slept like a baby. I was shocked to open my eyes the next morning and not find someone with a gun pointed at my head. I smiled and thought to myself it had all been a game. A stupid fucking game that I believed was real. I spent months on the road, homeless, cold, and hungry for nothing.
Then I looked over and saw a note on the bed with a sharp knife lying across it. Someone had been here while I was sleeping. They had broken into my room and were in the same room with me. They could have killed me and I never would have known. I almost wish they had, but they let me live. Those assholes had let me live.
We aren’t ready for the game to end yet. Keep running and hiding Jason. The next time, we will not be so nice. Now back to Hide and Seek! See you soon.
There was no money with the note. My backpack was gone. I was completely broke after spending all my money on food and a hotel. I wish they would have killed me.
I don’t know why I didn’t just stay where I was and let them kill me, but letting someone kill you and doing nothing to stop it isn’t easy.
This game of cat and mouse continued. And that is what it was. A game of cat and mouse. I realized there was no hiding from them. They always knew where I was and there was no escape. They just liked playing the game.
I don’t know what the fun of this game is for them except to watch someone suffer. I don’t know how they seem to be everywhere and know everything. It doesn’t matter how fast or far I run, they will always be the steps ahead of me.
Every person I see or talk to could be them. I constantly try to look at the faces around me to see if any of them look familiar but everyone is a stranger. They are ghost. Always close by. Always watching. Always invisible.
They find me almost as soon as I stayed in the same place for more than a night or two. Sometimes they would be nice and let me settle somewhere for a week or two, but never long enough to be comfortable. I think they just like to keep me guessing and to give me hope that they decided to stop this game.
They also always gave me exactly what I need to survive. Most of the time it was just enough money to keep me fed but still hungry with a little left over. If it was deathly cold outside I may have a little extra to afford a place inside or even a warm jacket to keep me cold but alive. If I was sick, a bag of medicine would show up. They give me just enough to live a miserable life.
I know you are reading this. And I quit. I quit your game. I’m tired of playing. You’ve taken everything from me. If you want to kill me then kill me. I would rather be dead than to keep playing your game. You know where I am. You always do. Give me my life back or kill me. I quit.
Update:
Jason was right. Our game of Hide and Seek really is a cat and mouse game. We are the cat and Jason was the mouse. Here is the thing about a cat and a mouse, a cat likes to play with the mouse, to scare a mouse, to corner a mouse, to slap the mouse with its claws. When the mouse quits playing the cats game, the mouse dies.
It looks like we have to find a new mouse since our last one decided to stop playing our game. Luckily nosleep has plenty of mice to choose from and the accounts have a comment history so we can find the perfect mouse for our next game of Hide and Seek. If you see your own number pop up on your caller ID, don’t answer. It just might be us.
LCS
submitted by LandoCommandoe to nosleep [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Hide and Seek

I know you are reading this. You know who you are. This game has went on for long enough. It has been almost a year. Please, let it end. I am begging you. I just want my life back.
For everyone else, I will start at the beginning.
I am sure all of you have seen those youtube or twitch streamers who like to scam the scammers by wasting their time, right? I thought it was funny so I decided I would do the same thing, except without broadcasting it to the world. It was a lot of fun to see how long I could keep these assholes tied up on the phone with me instead of your trusting grandma.
Then I heard about the “Dark Web” and how there are also people on there who like to scam people. I admit, I had never been on the dark web before, but I had heard the stories. It was the wild west where you could buy drugs and have them delivered to your door and the police couldn’t track you. You could hire a hitman to kill anybody you wanted as long as you had bitcoins to pay them with. Sadly, I also heard about the child porn rings and knew I did not want to accidentally land on one of those pages. The anonymous nature of the dark web can both a blessing and a curse.
I logged on to the dark web and was able to find a page advertising hacking services. Not real hacking, but more stuff like hacking into your significant others facebook account or email to see if they are cheating on you. Stuff a simple keylogger would accomplish but they were asking for hundreds and sometimes thousands of dollars. It was clearly a scam and was exactly what I was looking for.
Before I talk to any scammer, I spoof my number and have a virtual machine set up so if they take command of my computer, they are not actually doing anything real. It is all just a charade. I never use my real name, or real telephone number.
It started off the same way these things always start off. I act interested in a service, but I am not smart enough to know how to buy and send bitcoin. I string them along, and they eventually try to walk me through it over the phone. No matter how easy they make it, I am just too dumb to figure it out. They eventually get tired of dealing with me and hang up. All I wasted was both of our time.
This call was different. After about 5 minutes of me playing dumb, they figured it out and were pissed.
“You think you’re funny?”
“What are you talking about?”
“Trying to waste our time?”
“Yea, the more time you waste on me, the less time you have to scam other people.”
“You fucked up this time. You fucked with the wrong people.”
“Why do you do this? Scam people? Does it make you feel good?”
“We aren’t the spam callers you normally talk to in Nigeria or India, Jason. You are on the Dark Web now, and you should have known better than to fuck with people on the Dark Web.”
How the hell did they know my name was Jason? I told them my name was David. What the fuck? I better get off here now.
“You are a scammer. Get a real job and stop trying to scam people.”
I ended the call.
Less than a minute later, my phone rang from my own number. I knew I shouldn’t have answered it, but I did. I knew who it was.
“Hello?”
“Jason, we don’t like it when people hang up on us.”
“Listen, I clearly messed with the wrong person. I’m sorry. I am just trying to annoy scammers who scam innocent people. That’s all. This is just a big misunderstanding. Let’s just go our separate ways. I am sorry.”
“That is not how this is going to work Jason Keys”
“How do you know my name?”
“You found hackers on the Dark Web, are you surprised we know who you are and that your address is XXXXX ?” Yes, they knew my address.
“Okay, you were able to trace my phone and get my personal information. I get it. I fucked up.”
“Where are you right now, Jason?”
“I’m at work.” I lied.
‘No, you’re not, Jason. You are in your kitchen.”
“Okay, you somehow have used my phone’s GPS to find my location. I get it. You are real hackers. I will never waste your time or anyone else’s time again. I swear.”
“Do you like games, Jason?”
“What do you mean? I have an xbox.”
“Were going to play a game.”
“No, we don’t have to do that. We can just go our own way.”
“We are going to play Hide and Seek. You know how to play Hide and Seek right Jason?”
“The kids game. Yea. Everyone knows how to play that but I don’t want to play this game. I don’t even know who you are.”
“That is what makes this game so much fun for us. We know who you are. But to you, we could be anyone, anywhere, at anytime.”
“No. I am not going to play your game.”
“You don’t seem to understand. You don’t have a choice in the matter.”
“What happens when you catch me?”
“Then you will have to hide again.”
“What if I just don’t play?”
“Bad things will happen to you.” they said. “You have 12 hours to hide. Good luck.”
They hung up. .
They are just fucking with me I thought.
I clicked on the Facebook app on my phone and a message popped up saying No Account Found. I tried my twitter and gmail account and everything was gone. Somehow they had deleted my entire online presence while they were on the phone with me.
I knew I never should have went onto the Dark Web. I should have believed all the rumors I read about that place.
Maybe this person was serious about playing their game of Hide and Seek. At worst, I thought, I should find a different place to sleep for a few days just to let this pass over. I grabbed my backpack and threw in a few pairs of clothes to last three days, a pillow, and a toothbrush. That should be enough, I thought.
I called out of work and told them I had a family emergency and would be gone for a few days. I wasn’t sure where I was going to go yet, but a full tank of gas was a start. I slid my card into the gas pump and it came back denied. That is weird, I had just gotten paid 2 days before and had plenty of money in my account. I pulled out a credit card and tried again. It was also denied.
I went to the bank to get this problem sorted out. I told the teller my card was declined but I had money in my account earlier. She took my details to pull up my account, but their system showed no account ever existed under my name. I told her that was impossible! I showed her I have a debit card with my name on it. She called a manager over and they took the card away and told me I could be charged with fraud for having a fake debit card. I tried to explain but they were certain they have never had an account under my name or social security number. Even if I had an account in the past, their system would have been able to find it under my social.
I left the bank dumbfounded. My card had worked the day before and I have had an account at that bank since I turned 18 over five years ago. There is no way even hackers could delete my accounts that fast, if it is even possible at all. It had been less than an hour.
I sat on the hood of my car and called the credit card companies, but they had no records of me on file either. The one positive thing about this entire experience is they wiped off a few grand in my credit card debt, so I guess thank you for that much.
I went back to my car and the reality of the situation came crashing down on me. They knew who I was, where I lived, and now I had no access to any money. I sat down in the car to think over my options of what to do next when I saw an envelope on the passenger seat. I opened it up and it contained $100 cash (5 twenty dollar bills) and a note.
Time is ticking. You have $100 dollars and 11 hours left. You better go hide, because soon I will start to seek.
They found me already? How were they already in my town and knew where I was and what kind of car I drove? What am I going to do now? They are already watching me and what kind of car I drive, I am not even going to be able to use my own car.
After some thinking, I drove to the bus stop and bought a ticket for a bus heading North. It would be making 6 stops between here and Chicago so I can get out of town and decide where to get off later. They can’t know where I am going to be if I don’t even know where I’ll be. The ticket was $50 dollars so that only leaves me $50. I decided I would just have to deal with it later.
The bus ride itself is a nightmare on its own, but that is a story for another time. I got on the bus and finally decided enough was enough in Indianapolis. I left a warm Atlanta for Indiana with nothing but a few changes of clothes in my backpack. Could life be much worse?
I got something to eat at a McDonalds close to the bus stop and saved what little money I had left. There wasn’t enough money to spare for a motel, no matter how shady it was. I needed to save every penny I had right now. I slept outside and froze my ass off.
I didn’t know a soul there. I just decided it would be best if I kept a low profile and tried to stay out of sight. I didn’t have any sort of electronics for them to track and I don’t have any credit cards to trace. They shouldn’t have any idea where I got off the bus at. I could be in any city between Atlanta and Chicago if they had seen what bus I got off on.
That night, I found a starbucks and decided to grab myself a coffee. I put in my order and went to the restroom to clean myself up a little. I got back just as they were calling my name telling me my drink was ready. I grabbed my coffee and the employee said someone had given him a note to give me with my coffee. My heart sank as I sat down and opened the envelope. They had found me in less than 24 hours after I traveled over 500 miles away without telling a soul.
Inside was another $100 dollars and a note.
Not a bad start, most aren’t smart enough to ditch their car and town so fast. You have $100 dollars and 24 hours to find a new hiding spot. Try a little harder next time. I like a challenge.
I sat in the starbucks exhausted and defeated. If they found me that easily then was there any way to escape them? I decided to do what I should have done when all of this started. I went to the police.
The police listened to my story and then took my ID. They asked some questions and clearly did not believe I was telling the truth. They asked if I had taken any drugs and then ran my ID. When he came back he asked me if it was a fake ID because it was not pulling any information on me. I asked him to try one more time.
Before he tried again, he asked if I might be having some mental problems or off my medicine because I sounded like I might be having an episode. I’m pretty sure he wanted to take me to the hospital for a psychiatric hold.
When he went to run my ID again, I quietly slipped out the door and escaped. I knew what they had done. I no longer exist. At least in the eyes of the law and the public. My identity was deleted. My bank accounts were gone. My credit cards were gone. My social media was gone. Everything that proved who I was is gone. Outside of those who know me, I do not exist. And if I don’t exist, they can kill me with ease.
I walked to a truck stop near the interstate and was able to hitch a ride to Chicago for $20 dollars. A random trucker seemed a lot safer than a Greyhound bus full of drug addicts and creeps like I had taken to get this far. At least I got 2 hours of sleep in a warm cab.
In Chicago, I bought a burner phone and decided it was time to call home. It was prepaid, cheap, and new. The only number I knew was my own and my mom’s so I had to call her. I called her up and she was worried and asked where I was. I told her Chicago and started to explain what had led me here, but the call dropped. I looked at my phone and it said it had no service. A few moments later I got a text message.
YOU CAN USE A PHONE. YOU CAN’T ASK FOR HELP. THE RULES ARE SIMPLE YOU HIDE. WE SEEK.
I threw the phone against the wall and it shattered into pieces. It was a brand new phone. Nobody should have been able to know or hack it so fast. I am alone. Nobody can help me. I don’t know what to do anymore. The only option I had was to play their stupid game.
Since January 16th, my life has been constantly moving from town to town, sleeping in homeless shelters or park benches. Every night I go to sleep wondering if I will wake up to a note next to my head telling me to hide again. Every day I worry a random person will hand me an envelope.
I know some of you guys must be asking yourself why I even play the game? Why don’t I just stop running? They are just playing with me. They would not actually hurt me.
I have tried that before. In Colorado, I was tired, cold, and wet when they found me. I decided enough was enough. They left me the note mocking my attempts to run away and gave me another $50 dollars. I said screw it, let them kill me. I got me a nice hotel at the Hilton and spent all the money I had on a nice steak dinner. If they decided to kill me, at least I would have a nice last meal and a warm bed on my last night.
I thought I would have been up all night worried, but I was too worn out to care. I slept like a baby. I was shocked to open my eyes the next morning and not find someone with a gun pointed at my head. I smiled and thought to myself it had all been a game. A stupid fucking game that I believed was real. I spent months on the road, homeless, cold, and hungry for nothing.
Then I looked over and saw a note on the bed with a sharp knife lying across it. Someone had been here while I was sleeping. They had broken into my room and were in the same room with me. They could have killed me and I never would have known. I almost wish they had, but they let me live. Those assholes had let me live.
We aren’t ready for the game to end yet. Keep running and hiding Jason. The next time, we will not be so nice. Now back to Hide and Seek! See you soon.
There was no money with the note. My backpack was gone. I was completely broke after spending all my money on food and a hotel. I wish they would have killed me.
I don’t know why I didn’t just stay where I was and let them kill me, but letting someone kill you and doing nothing to stop it isn’t easy.
This game of cat and mouse continued. And that is what it was. A game of cat and mouse. I realized there was no hiding from them. They always knew where I was and there was no escape. They just liked playing the game.
I don’t know what the fun of this game is for them except to watch someone suffer. I don’t know how they seem to be everywhere and know everything. It doesn’t matter how fast or far I run, they will always be the steps ahead of me.
Every person I see or talk to could be them. I constantly try to look at the faces around me to see if any of them look familiar but everyone is a stranger. They are ghost. Always close by. Always watching. Always invisible.
They find me almost as soon as I stayed in the same place for more than a night or two. Sometimes they would be nice and let me settle somewhere for a week or two, but never long enough to be comfortable. I think they just like to keep me guessing and to give me hope that they decided to stop this game.
They also always gave me exactly what I need to survive. Most of the time it was just enough money to keep me fed but still hungry with a little left over. If it was deathly cold outside I may have a little extra to afford a place inside or even a warm jacket to keep me cold but alive. If I was sick, a bag of medicine would show up. They give me just enough to live a miserable life.
I know you are reading this. And I quit. I quit your game. I’m tired of playing. You’ve taken everything from me. If you want to kill me then kill me. I would rather be dead than to keep playing your game. You know where I am. You always do. Give me my life back or kill me. I quit.
Update:
Jason was right. Our game of Hide and Seek really is a cat and mouse game. We are the cat and Jason was the mouse. Here is the thing about a cat and a mouse, a cat likes to play with the mouse, to scare a mouse, to corner a mouse, to slap the mouse with its claws. When the mouse quits playing the cats game, the mouse dies.
It looks like we have to find a new mouse since our last one decided to stop playing our game. Luckily nosleep has plenty of mice to choose from and the accounts have a comment history so we can find the perfect mouse for our next game of Hide and Seek. If you see your own number pop up on your caller ID, don’t answer. It just might be us.
submitted by LandoCommandoe to LandoCommandoeStories [link] [comments]

CRYPTOCURRENCY BITCOIN

CRYPTOCURRENCY BITCOIN
Bitcoin Table of contents expand: 1. What is Bitcoin? 2. Understanding Bitcoin 3. How Bitcoin Works 4. What's a Bitcoin Worth? 5. How Bitcoin Began 6. Who Invented Bitcoin? 7. Before Satoshi 8. Why Is Satoshi Anonymous? 9. The Suspects 10. Can Satoshi's Identity Be Proven? 11. Receiving Bitcoins As Payment 12. Working For Bitcoins 13. Bitcoin From Interest Payments 14. Bitcoins From Gambling 15. Investing in Bitcoins 16. Risks of Bitcoin Investing 17. Bitcoin Regulatory Risk 18. Security Risk of Bitcoins 19. Insurance Risk 20. Risk of Bitcoin Fraud 21. Market Risk 22. Bitcoin's Tax Risk What is Bitcoin?
Bitcoin is a digital currency created in January 2009. It follows the ideas set out in a white paper by the mysterious Satoshi Nakamoto, whose true identity is yet to be verified. Bitcoin offers the promise of lower transaction fees than traditional online payment mechanisms and is operated by a decentralized authority, unlike government-issued currencies.
There are no physical bitcoins, only balances kept on a public ledger in the cloud, that – along with all Bitcoin transactions – is verified by a massive amount of computing power. Bitcoins are not issued or backed by any banks or governments, nor are individual bitcoins valuable as a commodity. Despite it not being legal tender, Bitcoin charts high on popularity, and has triggered the launch of other virtual currencies collectively referred to as Altcoins.
Understanding Bitcoin Bitcoin is a type of cryptocurrency: Balances are kept using public and private "keys," which are long strings of numbers and letters linked through the mathematical encryption algorithm that was used to create them. The public key (comparable to a bank account number) serves as the address which is published to the world and to which others may send bitcoins. The private key (comparable to an ATM PIN) is meant to be a guarded secret and only used to authorize Bitcoin transmissions. Style notes: According to the official Bitcoin Foundation, the word "Bitcoin" is capitalized in the context of referring to the entity or concept, whereas "bitcoin" is written in the lower case when referring to a quantity of the currency (e.g. "I traded 20 bitcoin") or the units themselves. The plural form can be either "bitcoin" or "bitcoins."
How Bitcoin Works Bitcoin is one of the first digital currencies to use peer-to-peer technology to facilitate instant payments. The independent individuals and companies who own the governing computing power and participate in the Bitcoin network, also known as "miners," are motivated by rewards (the release of new bitcoin) and transaction fees paid in bitcoin. These miners can be thought of as the decentralized authority enforcing the credibility of the Bitcoin network. New bitcoin is being released to the miners at a fixed, but periodically declining rate, such that the total supply of bitcoins approaches 21 million. One bitcoin is divisible to eight decimal places (100 millionths of one bitcoin), and this smallest unit is referred to as a Satoshi. If necessary, and if the participating miners accept the change, Bitcoin could eventually be made divisible to even more decimal places. Bitcoin mining is the process through which bitcoins are released to come into circulation. Basically, it involves solving a computationally difficult puzzle to discover a new block, which is added to the blockchain and receiving a reward in the form of a few bitcoins. The block reward was 50 new bitcoins in 2009; it decreases every four years. As more and more bitcoins are created, the difficulty of the mining process – that is, the amount of computing power involved – increases. The mining difficulty began at 1.0 with Bitcoin's debut back in 2009; at the end of the year, it was only 1.18. As of February 2019, the mining difficulty is over 6.06 billion. Once, an ordinary desktop computer sufficed for the mining process; now, to combat the difficulty level, miners must use faster hardware like Application-Specific Integrated Circuits (ASIC), more advanced processing units like Graphic Processing Units (GPUs), etc.
What's a Bitcoin Worth? In 2017 alone, the price of Bitcoin rose from a little under $1,000 at the beginning of the year to close to $19,000, ending the year more than 1,400% higher. Bitcoin's price is also quite dependent on the size of its mining network since the larger the network is, the more difficult – and thus more costly – it is to produce new bitcoins. As a result, the price of bitcoin has to increase as its cost of production also rises. The Bitcoin mining network's aggregate power has more than tripled over the past twelve months.
How Bitcoin Began
Aug. 18, 2008: The domain name bitcoin.org is registered. Today, at least, this domain is "WhoisGuard Protected," meaning the identity of the person who registered it is not public information.
Oct. 31, 2008: Someone using the name Satoshi Nakamoto makes an announcement on The Cryptography Mailing list at metzdowd.com: "I've been working on a new electronic cash system that's fully peer-to-peer, with no trusted third party. The paper is available at http://www.bitcoin.org/bitcoin.pdf." This link leads to the now-famous white paper published on bitcoin.org entitled "Bitcoin: A Peer-to-Peer Electronic Cash System." This paper would become the Magna Carta for how Bitcoin operates today.
Jan. 3, 2009: The first Bitcoin block is mined, Block 0. This is also known as the "genesis block" and contains the text: "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks," perhaps as proof that the block was mined on or after that date, and perhaps also as relevant political commentary.
Jan. 8, 2009: The first version of the Bitcoin software is announced on The Cryptography Mailing list.
Jan. 9, 2009: Block 1 is mined, and Bitcoin mining commences in earnest.
Who Invented Bitcoin?
No one knows. Not conclusively, at any rate. Satoshi Nakamoto is the name associated with the person or group of people who released the original Bitcoin white paper in 2008 and worked on the original Bitcoin software that was released in 2009. The Bitcoin protocol requires users to enter a birthday upon signup, and we know that an individual named Satoshi Nakamoto registered and put down April 5 as a birth date. And that's about it.
Before Satoshi
Though it is tempting to believe the media's spin that Satoshi Nakamoto is a solitary, quixotic genius who created Bitcoin out of thin air, such innovations do not happen in a vacuum. All major scientific discoveries, no matter how original-seeming, were built on previously existing research. There are precursors to Bitcoin: Adam Back’s Hashcash, invented in 1997, and subsequently Wei Dai’s b-money, Nick Szabo’s bit gold and Hal Finney’s Reusable Proof of Work. The Bitcoin white paper itself cites Hashcash and b-money, as well as various other works spanning several research fields.
Why Is Satoshi Anonymous?
There are two primary motivations for keeping Bitcoin's inventor keeping his or her or their identity secret. One is privacy. As Bitcoin has gained in popularity – becoming something of a worldwide phenomenon – Satoshi Nakamoto would likely garner a lot of attention from the media and from governments.
The other reason is safety. Looking at 2009 alone, 32,489 blocks were mined; at the then-reward rate of 50 BTC per block, the total payout in 2009 was 1,624,500 BTC, which at today’s prices is over $900 million. One may conclude that only Satoshi and perhaps a few other people were mining through 2009 and that they possess a majority of that $900 million worth of BTC. Someone in possession of that much BTC could become a target of criminals, especially since bitcoins are less like stocks and more like cash, where the private keys needed to authorize spending could be printed out and literally kept under a mattress. While it's likely the inventor of Bitcoin would take precautions to make any extortion-induced transfers traceable, remaining anonymous is a good way for Satoshi to limit exposure.
The Suspects
Numerous people have been suggested as possible Satoshi Nakamoto by major media outlets. Oct. 10, 2011, The New Yorker published an article speculating that Nakamoto might be Irish cryptography student Michael Clear or economic sociologist Vili Lehdonvirta. A day later, Fast Company suggested that Nakamoto could be a group of three people – Neal King, Vladimir Oksman and Charles Bry – who together appear on a patent related to secure communications that were filed two months before bitcoin.org was registered. A Vice article published in May 2013 added more suspects to the list, including Gavin Andresen, the Bitcoin project’s lead developer; Jed McCaleb, co-founder of now-defunct Bitcoin exchange Mt. Gox; and famed Japanese mathematician Shinichi Mochizuki.
In December 2013, Techcrunch published an interview with researcher Skye Grey who claimed textual analysis of published writings shows a link between Satoshi and bit-gold creator Nick Szabo. And perhaps most famously, in March 2014, Newsweek ran a cover article claiming that Satoshi is actually an individual named Satoshi Nakamoto – a 64-year-old Japanese-American engineer living in California. The list of suspects is long, and all the individuals deny being Satoshi.
Can Satoshi's Identity Be Proven?
It would seem even early collaborators on the project don’t have verifiable proof of Satoshi’s identity. To reveal conclusively who Satoshi Nakamoto is, a definitive link would need to be made between his/her activity with Bitcoin and his/her identity. That could come in the form of linking the party behind the domain registration of bitcoin.org, email and forum accounts used by Satoshi Nakamoto, or ownership of some portion of the earliest mined bitcoins. Even though the bitcoins Satoshi likely possesses are traceable on the blockchain, it seems he/she has yet to cash them out in a way that reveals his/her identity. If Satoshi were to move his/her bitcoins to an exchange today, this might attract attention, but it seems unlikely that a well-funded and successful exchange would betray a customer's privacy.
Receiving Bitcoins As Payment
Bitcoins can be accepted as a means of payment for products sold or services provided. If you have a brick and mortar store, just display a sign saying “Bitcoin Accepted Here” and many of your customers may well take you up on it; the transactions can be handled with the requisite hardware terminal or wallet address through QR codes and touch screen apps. An online business can easily accept bitcoins by just adding this payment option to the others it offers, like credit cards, PayPal, etc. Online payments will require a Bitcoin merchant tool (an external processor like Coinbase or BitPay).
Working For Bitcoins
Those who are self-employed can get paid for a job in bitcoins. There are several websites/job boards which are dedicated to the digital currency:
Work For Bitcoin brings together work seekers and prospective employers through its websiteCoinality features jobs – freelance, part-time and full-time – that offer payment in bitcoins, as well as Dogecoin and LitecoinJobs4Bitcoins, part of reddit.comBitGigs
Bitcoin From Interest Payments
Another interesting way (literally) to earn bitcoins is by lending them out and being repaid in the currency. Lending can take three forms – direct lending to someone you know; through a website which facilitates peer-to-peer transactions, pairing borrowers and lenders; or depositing bitcoins in a virtual bank that offers a certain interest rate for Bitcoin accounts. Some such sites are Bitbond, BitLendingClub, and BTCjam. Obviously, you should do due diligence on any third-party site.
Bitcoins From Gambling
It’s possible to play at casinos that cater to Bitcoin aficionados, with options like online lotteries, jackpots, spread betting, and other games. Of course, the pros and cons and risks that apply to any sort of gambling and betting endeavors are in force here too.
Investing in Bitcoins
There are many Bitcoin supporters who believe that digital currency is the future. Those who endorse it are of the view that it facilitates a much faster, no-fee payment system for transactions across the globe. Although it is not itself any backed by any government or central bank, bitcoin can be exchanged for traditional currencies; in fact, its exchange rate against the dollar attracts potential investors and traders interested in currency plays. Indeed, one of the primary reasons for the growth of digital currencies like Bitcoin is that they can act as an alternative to national fiat money and traditional commodities like gold.
In March 2014, the IRS stated that all virtual currencies, including bitcoins, would be taxed as property rather than currency. Gains or losses from bitcoins held as capital will be realized as capital gains or losses, while bitcoins held as inventory will incur ordinary gains or losses.
Like any other asset, the principle of buying low and selling high applies to bitcoins. The most popular way of amassing the currency is through buying on a Bitcoin exchange, but there are many other ways to earn and own bitcoins. Here are a few options which Bitcoin enthusiasts can explore.
Risks of Bitcoin Investing
Though Bitcoin was not designed as a normal equity investment (no shares have been issued), some speculative investors were drawn to the digital money after it appreciated rapidly in May 2011 and again in November 2013. Thus, many people purchase bitcoin for its investment value rather than as a medium of exchange.
However, their lack of guaranteed value and digital nature means the purchase and use of bitcoins carries several inherent risks. Many investor alerts have been issued by the Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA), the Consumer Financial Protection Bureau (CFPB), and other agencies.
The concept of a virtual currency is still novel and, compared to traditional investments, Bitcoin doesn't have much of a long-term track record or history of credibility to back it. With their increasing use, bitcoins are becoming less experimental every day, of course; still, after eight years, they (like all digital currencies) remain in a development phase, still evolving. "It is pretty much the highest-risk, highest-return investment that you can possibly make,” says Barry Silbert, CEO of Digital Currency Group, which builds and invests in Bitcoin and blockchain companies.
Bitcoin Regulatory Risk
Investing money into Bitcoin in any of its many guises is not for the risk-averse. Bitcoins are a rival to government currency and may be used for black market transactions, money laundering, illegal activities or tax evasion. As a result, governments may seek to regulate, restrict or ban the use and sale of bitcoins, and some already have. Others are coming up with various rules. For example, in 2015, the New York State Department of Financial Services finalized regulations that would require companies dealing with the buy, sell, transfer or storage of bitcoins to record the identity of customers, have a compliance officer and maintain capital reserves. The transactions worth $10,000 or more will have to be recorded and reported.
Although more agencies will follow suit, issuing rules and guidelines, the lack of uniform regulations about bitcoins (and other virtual currency) raises questions over their longevity, liquidity, and universality.
Security Risk of Bitcoins
Bitcoin exchanges are entirely digital and, as with any virtual system, are at risk from hackers, malware and operational glitches. If a thief gains access to a Bitcoin owner's computer hard drive and steals his private encryption key, he could transfer the stolen Bitcoins to another account. (Users can prevent this only if bitcoins are stored on a computer which is not connected to the internet, or else by choosing to use a paper wallet – printing out the Bitcoin private keys and addresses, and not keeping them on a computer at all.) Hackers can also target Bitcoin exchanges, gaining access to thousands of accounts and digital wallets where bitcoins are stored. One especially notorious hacking incident took place in 2014, when Mt. Gox, a Bitcoin exchange in Japan, was forced to close down after millions of dollars worth of bitcoins were stolen.
This is particularly problematic once you remember that all Bitcoin transactions are permanent and irreversible. It's like dealing with cash: Any transaction carried out with bitcoins can only be reversed if the person who has received them refunds them. There is no third party or a payment processor, as in the case of a debit or credit card – hence, no source of protection or appeal if there is a problem.
Insurance Risk
Some investments are insured through the Securities Investor Protection Corporation. Normal bank accounts are insured through the Federal Deposit Insurance Corporation (FDIC) up to a certain amount depending on the jurisdiction. Bitcoin exchanges and Bitcoin accounts are not insured by any type of federal or government program.
Risk of Bitcoin Fraud
While Bitcoin uses private key encryption to verify owners and register transactions, fraudsters and scammers may attempt to sell false bitcoins. For instance, in July 2013, the SEC brought legal action against an operator of a Bitcoin-related Ponzi scheme.
Market Risk
Like with any investment, Bitcoin values can fluctuate. Indeed, the value of the currency has seen wild swings in price over its short existence. Subject to high volume buying and selling on exchanges, it has a high sensitivity to “news." According to the CFPB, the price of bitcoins fell by 61% in a single day in 2013, while the one-day price drop in 2014 has been as big as 80%.
If fewer people begin to accept Bitcoin as a currency, these digital units may lose value and could become worthless. There is already plenty of competition, and though Bitcoin has a huge lead over the other 100-odd digital currencies that have sprung up, thanks to its brand recognition and venture capital money, a technological break-through in the form of a better virtual coin is always a threat.
Bitcoin's Tax Risk
As bitcoin is ineligible to be included in any tax-advantaged retirement accounts, there are no good, legal options to shield investments from taxation.
SPONSORED
Start with ¥3000 trading bonus
Trade forex and CFDs on stock indices, commodities, metals and energies with alicensed and regulated broker. For all clients who open their first real account, XM offers a¥3000 trading bonus to test the XM products and services without any initial deposit needed. Learn more about how you can trade from your PC and Mac, or from a variety of mobile devices.
Compare Investment Accounts
Advertiser Disclosure
Related Terms
Satoshi
The satoshi is the smallest unit of the bitcoin cryptocurrency. It is named after Satoshi Nakamoto, the creator of the protocol used in block chains and the bitcoin cryptocurrency.
Chartalism Chartalism is a non-mainstream theory of money that emphasizes the impact of government policies and activities on the value of money.
Satoshi Nakamoto The name used by the unknown creator of the protocol used in the bitcoin cryptocurrency. Satoshi Nakamoto is closely-associated with blockchain technology.
Bitcoin Mining, Explained Breaking down everything you need to know about Bitcoin Mining, from Blockchain and Block Rewards to Proof-of-Work and Mining Pools.
Understanding Bitcoin Unlimited Bitcoin Unlimited is a proposed upgrade to Bitcoin Core that allows larger block sizes. The upgrade is designed to improve transaction speed through scale.
Blockchain Explained
A guide to help you understand what blockchain is and how it can be used by industries. You've probably encountered a definition like this: “blockchain is a distributed, decentralized, public ledger." But blockchain is easier to understand than it sounds.
Top 6 Books to Learn About Bitcoin About UsAdvertiseContactPrivacy PolicyTerms of UseCareers Investopedia is part of the Dotdash publishing family.The Balance Lifewire TripSavvy The Spruceand more
By Satoshi Nakamoto
Read it once, go read other crypto stuff, read it again… keep doing this until the whole document makes sense. It’ll take a while, but you’ll get there. This is the original whitepaper introducing and explaining Bitcoin, and there’s really nothing better out there to understand on the subject.
“What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party

submitted by adrian_morrison to BlockchainNews [link] [comments]

BITCOIN Scammers Conduct Massive Twitter Hack Including Crypto Community & $1 Million Bounty BitPlastic Anonymous Bitcoin Debit Card Meet a hacker BITCOIN TWITTER HACKERS CAUGHT!! Stock Market WORST CRASH EVER LOOMS!! Crypto News Hack bitcoin script & non spendable bitcoin 2019

Bitcoin scams have been famously criminal and public in nature. With no bank as a middleman in exchange, things become more complicated; so hackers and con men have had a heyday. Use a prepaid debit card In the US and some other countries, it is possible to walk into any convenience store and buy a prepaid debit card that you can load up with cash over the counter. You can then use the same card to buy bitcoin on any fiat-to-bitcoin exchange such as Coinbase or Kraken in just the same way as you would have done if you Twitter-Bitcoin scam: Hackers amass as much as $112,000 which have mostly been deleted offered to send back $2,000 for every $1,000 sent to an anonymous Bitcoin address. Debit card for The best way to use Bitcoin for purchases in offline stores, as well as turn smaller amounts of Bitcoin into cash, is through Bitcoin debit cards.. Bitcoin cards are prepaid plastic VISA or MasterCard cards that are tied to your Bitcoin wallet hosted by the card providing company. A. Bitcoin must be stored in a secure wallet, which has proper privacy, and hackers cannot infiltrate. You can refer to the top Bitcoin wallets here. You can choose the wallet based on your preferences of the device. Q. Is It Safe to Buy Bitcoin with Credit Card ? A. Yes, it is safe to buy Bitcoin with Credit card as: It is secure; You will

[index] [15149] [20979] [28331] [10984] [23793] [20972] [25705] [28601] [22804] [12556]

BITCOIN Scammers Conduct Massive Twitter Hack Including Crypto Community & $1 Million Bounty

* Money transfer and bank wire from any country, cc hacking and sales, buy credit card for online payments, carding, buy keylogger and other hacking/software tools. * buy goods safely online with ... Uquid-ANONYMOUS Bitcoin/Altcoin debit Cards- Virtual & plastic No documentation-Low Fee Uquid guaranteed for free access to bitcoin, ethereum, litecoint, ripple, monero, dash and other 35 ... Want to know how the BitPlastic anonymous Bitcoin debit card works? Watch this short video to learn how real people use the Bitcoin debit card. TWITTER GOT HACKED BY BITCOIN BOTS! BILL GATES & ELON MUSK TWITTER HACKED! Today i show you how the government will track these hackers! bitcoin twitter has been all over the news! STOCK MARKET is ... Bitcoin scammers conducted a huge hack on Twitter which included the following accounts: Bill Gates Barack Obama Elon Musk Uber Jeff Bezos Apple Kanye West Mike Bloomberg Mr Beast Joe Biden ...

Flag Counter