Armory Bitcoin Install Dir - The Shalva Registry

Bitcoin champion official

Bitcoin champion official
Bitcoin champion Print ArticleShare this article on FacebookShare this article on TwitterShare this article on LinkedinShare this article on Delicious1Share this article on DiggShare this article on RedditShare this article on Pinterest1
Searching for a Bitcoin Buying Guide? Pondering where to begin? Individuals have a ton of misinterpretations about bitcoin - the absolute first generally known and acknowledged digital money around the world.
https://preview.redd.it/8i4q0vbud1u51.jpg?width=1193&format=pjpg&auto=webp&s=400b5fcc3f8cfc424fdc3a03bf2e40c3950e9b9f
Many individuals think for instance that lone programmers and obscure individuals use it. Anyway bitcoin is really going standard with everybody from TigerDirect to o Dell and even Subway tolerating installments in bitcoin now.
Indeed, bitcoin has a ton of advantages over different monetary standards. For instance, you can send bitcoins to somebody as installment without experiencing the bank broker (and get hit with additional expenses). It's likewise a lot quicker than sending cash through a bank wire or move. You can send bitcoins to somebody and make them get the coins like a flash. B
With the entirety of this present, it's nothing unexpected that numerous individuals are currently attempting to purchase bitcoin unexpectedly. Anyway it's not as simple as setting off to your bank and pulling back bitcoins - or heading off to a store and plunking down some well deserved money for

The framework works a piece uniquely in contrast to that. This Bitcoin Buying Guide will go over a couple of things you have to know before you purchase - so you can purchase securely and safely.

Above all else, while the cost may be over $2000 us per coin, you don't need to purchase a whole bitcoin. Most places will let you purchase parts of a bitcoin for as meager as $20. So you can begin little and go from that point as you get more OK with the manner in which things work.
Besides, this article is for general purposes just and not to be taken as money related exhortation. Bitcoin can be hazardous and before making any buy you ought to talk with your money related guide to check whether it's appropriate for you.
The primary activity before you purchase your coins is to get a virtual wallet to store your coins. This wallet is a line of text that individuals can use to send you bitcoins.

There are various kinds of wallets including ones you download to your telephone or PC, online wallets and even disconnected, cold stockpiling wallets.

A great many people want to get a wallet on their telephone or PC. Mainstream wallets incorporate Blockchain, Armory, Bitgo MyCelium and Xapo.
Generally it's as basic as downloading the wallet to your telephone as an application or downloading the product to your PC from the wallet's principle site.
There are a few kinds of spots to purchase and every one is somewhat unique. There are online merchants that will sell you bitcoins straightforwardly for money (or bank wire or charge card).
There are trades where you can purchase and sell bitcoins from others - like a securities exchange. There are likewise nearby trades that connect you up with venders in your general vicinity hoping to sell. Bitcoin champion
There are additionally ATMs where you go to buy with money and get your coins conveyed to your wallet in minutes.
Each bitcoin merchant has their advantages and downsides. For instance ATMs are extraordinary for security, however they'll energize you to 20% on head of the current value, which is absurd. (On a BTC cost of $2000, that $400! So you're paying $2400 rather than $2000).
https://preview.redd.it/6vfnhrlvd1u51.jpg?width=2560&format=pjpg&auto=webp&s=f00d6b2c52ba69f5f10bf22273a8eff3298b1ba8
Regardless of where you choose to purchase, make sure to do your exploration and go with a believed merchant with a decent notoriety and solid client support. First time purchasers will particularly have questions and may require the additional help to assist them with their first exchange.
Take as much time as necessary and examination the better places to purchase before you choose. Elements to consider incorporate coin costs, additional charges, strategy for installment and client assistance.
Whenever you've discovered a spot to purchase, prepare your assets (for example you may send a wire move or utilize your Visa to finance your record). At that point sit tight at a decent cost. (Bitcoin costs are continually fluctuating 24 hours, 7 days every week). At that point put in your request when you're prepared.
When your request is filled and you have your coins, you'll need to send them to your wallet. Just enter your bitcoin address and get the vender to send you your bitcoins. You should see them appear in your wallet inside minutes to 60 minutes (contingent upon how quick the vender sends them out).
Presto, you are presently a bitcoin proprietor. You would now be able to send coins to pay for different merchandise and enterprises, or hold tight to them for a blustery.
https://preview.redd.it/5a9jjoxmd1u51.png?width=333&format=png&auto=webp&s=04e1d18d92c6d4a5fc7d192703b02ba29748940a
submitted by Bitcoinchampionorder to u/Bitcoinchampionorder [link] [comments]

[RF] Just another quiet Friday night

"You're fucking crazy John," the man in the black T-Shirt announced. "Seriously, you want to pretend to be a paedo, so you can lure in the FBI and fuck with them? That is some next level warped shit."
"Chill out dude. That was just an example. Doesn't have to be a paedo."
"I don't give a fuck. Anything that's gonna make them zero-day you is some dark shit that you can't just laugh off. And what if they chain the sploits? They'll bounce out of your sandbox and be kicking the door down in minutes."
"No, no, it's ok. Really. I bought these laptops from a heroin addict in another city. Totally untraceable. I've had the lid off and de-soldered the camera, microphone and wireless."
"That's no use, we've got to get online somehow. And when their payload fires they'll trace us through a ToR bypass."
"That's why we need three laptops. Physical separation. This one," he tapped the metallic blue case, "is the bait. It's a regular laptop, but it's only connection is a single wired Ethernet. The only route to the Internet is via this one," tap tap, "which is running hardened Kali and only connects via ToR."
"Seriously, you're going to actually do this?"
"Come on dude, I've always wanted to try. Live a little."
"What's the third one for?"
"It's hardened Kali too. We proxy everything from the bait browser through here. When they deliver their exploit we'll catch it here, do some reverse engineering, and get ready for the fun bit!"
"What the hell. But you're crazy man. And we never speak of this."
"Of course. Goes without saying."
"How do we start?"
"You get a proxy running on that. I'll get the ToR connection set up. I got a 4G dongle off the same guy."
John removed a small ethernet hub from his bag, connected its power but held off from plugging in the laptops. He connected the 4G dongle, started the ToR service and watch its status update. With the connection active he configured the iptables firewall so outbound traffic was permitted only through ToR. Cal started the intercepting proxy, exposed its listener and looked at John. "Ready" They both plugged into the hub, and Cal watched as John connected the bait laptop, accessed the proxy settings and linked it to the listener.
He accessed a non-descript site to check the setup. It loaded a little slowly, while the series of requests popped up on the intercepting proxy. "Are we sure it's going through ToR?" Cal asked. "Don't worry". "Seriously, show me a packet trace." John started a sniffer, gestured to Cal to refresh the bait browser, while a series of packets scrolled up the screen, all safely encrypted by ToR.
"So what now?" a pause "And definitely no paedo stuff. That's too dark to mess about with."
"Old school," John replied, "I guess it's a bit of a cliche. We go on the dark net and try to order a murder for BitCoin. We'll make it an American prosecutor, that'll get the FBI going."
Cal stared at him. But that didn't stop him typing and Cal watched with grim fascination as he navigated around dark net markets, registering accounts, searching vendors and sending onimous enquiries. Cal monitored the proxy, configuring ever more intricate filters to weed out the mundane.
They'd crossed a line of no return and complicit Cal joined in, weaving convincing tales in their messages, striking the right tone to complete their deception. This went on for hours, with no sign of any incoming exploits. Until the browser popped up with "Do you want to allow this site to access WebGL?"
"That's it," John smiled, "there's no way that site really uses WebGL. This is an exploit. Stands to reason too, we always knews that had huge attack surface." He was about to permit it, but Cal stopped him. "No, don't allow it. If we allow it, we'll just get a lame zero day that requires WebGL. Deny it and carry on. They'll send a better exploit soon enough."
The intensity increased, Cal identified the malicious code that had tried to access WebGL. But it was just a stager - no exploit there. John carried on his ruse, until he noticed the browser stutter. He grabbed Cal's arm, "this is it!" Fear in the room intensified. This was serious now, some hacker - be it FBI or otherwise - had control of the laptop right in front of them. "Carry on with the messaging Cal. If we stop now they'll know our game."
Cal typed into the bait laptop while John began to investigate the exploit delivery. He identified the malware quickly enough, and a lingering connection that could be to the command and control server. Alarmingly, it was transferring a lot of data in both directions, a detail he decided not to share with Cal. He loaded the malware into a binary analysis tool and begun the painstaking process of unpicking its workings. 20 minutes in he told Cal to stop. "That'll do. Sign off naturally and shut it down."
Cal joined him with the binary anaysis and gradually they formed a picture of its armory. "It's not like one I've seen before," Cal said, "it's tighter coded than a typical rootkit. Really could be FBI." John nodded. "You can see it repeatedly copying this string. That's gotta be a heap spray. And it looks like self-decrypting machine code. Yeah, that's the payload for sure. We can just plug our own in here."
"What if the exploit's been watermarked?" Cal interjected, "We don't know where they could have hidden one."
"Who cares? We're gonna deliver it anonymously anyway."
They worked industriously to decouple the exploit and payload, build a delivery mechanism, and soon they were ready to test it. They watched in delight as a fully-patched browser accessed their delivery site, churned the laptop's CPU, then registered a ping back on the console.
The next step was to incorporate a real payload.
"So what's it gonna do John?"
"Persist itself to disk, then sit quietly and await further instructions. I've got the C&C software figured out already, it was a fun project from long ago. What I need you to do is use BitCoin to rent a couple of dozen virtual servers in different data centres around the world."
As Cal started registering the servers, John used the third laptop to generate a public/private key pair. One by one, the servers came online, and John installed the C&C software, configuring each to only respond to instructions signed by their private key. On the 20th he told Cal to stop.
There was a sparkle in his eyes. "We're nearly there! Everything's in place."
"How are we going to deliver it?"
"That's why we had to do this today. I found something earlier. A cache poisoning vulnerability on a major site."
Cal stared at him. The chain was complete. This was not real.
They completed their final maneouvers. Scripted a mechanism to dynamically generate payloads containing a random sample of C&C servers. Uploaded the exploit delivery mechanism into the control cloud, and generated a list of exploit URLs. John accessed the vulnerable major site, saved the HTML code locally, and modified it to include an exploit URL. Then he exploited the cache poisoning flaw, so that every visitor - at least every visitor coming through that particular cache cluster - would receive not the legitimate site but his malicious modificiations.
They watched the C&C management console. Around the world, thousands of unsuspecting web users experienced an annoying pause while their web pages loaded. Each time, under the hood, the zero day exploit fired, the payload persisted itself to disk, and made a connection to their C&C network to receive further instructions. Each time a new node joined their botnet, a line was logged to their console, and soon the screen was scrolling uncontrollably.
John was elated, Cal terrified. Cal watched in horror as John repeated the cache poison process across multiple clusters in different data centres. The rate of scrolling on the C&C console exploded. John cancelled it with a smile.
"Lets just look at the numbers"
Running a grep count on the log showed over 900,000 payload activations. And their malware had been live for barely 15 minutes.
"What are you going to do with it?"
"That's for another day. Now, we cover our tracks."
John removed two USB drives from his bag. He created an encrypted container, and into it put his decoy. Some nudes of an office chick that had been circulating. Incriminating enough, but not the crown jewels. He then created a hidden container within the free space of the first container, using a very strong password. Into this hidden container he copied the private key for the C&C network. This key put him in control. The only way to control the botnot was having both the USB drive, and his strong password. He repeated the process for Cal, inviting him to choose his own passwords. When he handed over the drive, Cal held it like it was on fire.
He shut down the bait laptop, gesturing Cal to do the same with the proxy. Removed the hard drive and connected it via USB to the ToR relay. The ToR relay was unlikely to have been compromised that night, a trustworthy system he could use to erase the others. After a secure erase of both drives, then of the ToR relay itself, John started putting everything in a bag.
They left the hotel room in silence. Bag on the rear seat and John drove. Cal was acutely aware of the USB drive in his pocket, the angled corners pressing into his leg. He went out of town, down lanes Cal didn't recognise, and stopped by a chain link fence. They both got out, John retrieved the bag, and with a big hurl, launched it over the fence into the landfill.
Back home, John smoked a large joint of double zero hash and fell fast asleep. He awoke a few hours later. It almost felt like a dream. But he ran his fingers along the USB drive and remembered the sheer power it contained.
submitted by netsecwarrior to shortstories [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

Beginner's Guide to Trading Crypto. Part 11

Beginner's Guide to Trading Crypto. Part 11

Money Loves Security And So Do Cryptos: A Brief Guide Down Crypto Wallet Lane

Since time immemorial people have been keeping their money and valuables in safe places. Be they purses, clay pots full of coins buried in their backyards or treasure chests hidden in caves with piles of bones strewn around to keep unwanted visitors at bay, they means conceived for safekeeping hoarded valuables are just as creative as they are limitless.
The advent of cryptocurrencies as a new class of valuables and assets instantly spawned the need to keep them safe from the clammy hands of criminals. The logical solution was to develop wallets that would be used to keep cryptos safe. As a result, a multitude of wallets have emerged offering all kinds of added services to their users while remaining means of storage at heart.
There is a huge variety of wallets available: Coinomi, GreenAddress, Blockchain.info, Atomic, Exodus, Jaxx, Electrum, Copay, Bread, Airbitz, Armory, Mycelium, Blockchain Wallet and dozens of others, each offering their services to suit any taste.
https://preview.redd.it/tai1ax5q3u341.jpg?width=1200&format=pjpg&auto=webp&s=0a33622327c7e52eea02e77f7c843423e6aeba12

Types Of Wallets

There are several types of wallets available to users and everyone must decide for themselves which one suits their needs best.
Hardware wallets: These are the most secure and reliable wallets available, since they are not connected to the internet at all. Hardware wallets are like flash memory cards that store the user’s cryptocurrencies and access offline. A bright example is the Trezor wallet, which is deemed to be impermeable to hackers. Unless the user loses the device itself, it is safe to assume that the cryptos will stay on it indefinitely and no one will ever gain access to them.
Online, Web or Hot wallets: These are online services, or online wallets that offer to store the user’s cryptos online with direct access to the internet at any time. In essence, online wallets are online accounts in which users store their funds. The risks are very high, since exchange wallets are routinely being hacked and the cryptos stored therein stolen.
Desktop wallets: Desktop wallets are software programs that can be downloaded and installed on a PC and will only be accessible from the device they were downloaded onto. The risks are the same as with hot wallets and another added inconvenience is that loss of the device or loss of access to it means loss of all cryptos stored on it.
Mobile wallets: Mobile wallets are software programs that can be downloaded onto a mobile device, such as a phone or a tablet. There are wallets for Android and iPhones and all of them bear even greater risks than hot wallets. Since mobile devices are susceptible to theft and a variety of viruses, it is extremely risky to store cryptos on them. Though access to the cryptos without private keys is impossible, unless the user stores them on the device, loss of all cryptos with the mobile device is guaranteed.
Paper wallets: Paper wallets are offline cold storage for cryptocurrencies. This is by far the safest means of storing cryptos, which includes printing the public and private keys on a piece of paper and storing it in a safe place. The keys are printed in the form of QR codes for convenience. With paper wallets, the user has complete control over their funds and the only risk lies in losing the piece of paper with the keys.
Other types of wallets: Apart from the five main types of wallets, there were attempts at creating other types of services, such as atomic wallets using atomic swap technology and even combinations of mobile/hot/cold wallets. Despite limited success, hybrids models of wallets did not become popular.

Main Pros And Cons

When looking at wallets and their main advantages and disadvantages, it is easiest to speak of the division between cold and hot wallets.
When speaking of cold wallets, such as the Trezor Bitcoin wallet and Ledger Nano S or X, the same issue will be observed, and that is the fact that such wallets can be physically lost. Though anyone who ever finds them will never be able to gain access to the stored cryptos without the private keys (unless they are pasted on the device), loss of all cryptos on the device is guaranteed. In addition, cold wallets can be difficult to install and are inconvenient for frequent use.
https://preview.redd.it/ff2dukdx3u341.png?width=1021&format=png&auto=webp&s=f36cdc26b13f33433c5124f5e5a67c0e40f9dbf4
Hot wallets are far more susceptible to risk than their cold counterparts. Though hot storage is much faster and convenient with a wide variety of options from Coinbase to Blockchain.info, the risk of cybercrime runs high. Mobile or desktop storage is also considered to be hot storage and is also risky, if the device is damaged or destroyed.

Bitcoin Problems

Bitcoin, as the firstborn cryptocurrency, was born with a number of defects. One of the main problems of the king of cryptos is the yet unsolved scalability problem. This refers to the limit on the amount of transactions the Bitcoin network can process due to the limited size of and frequency of blocks in the Bitcoin blockchain.
Said problem poses some difficulties to all Bitcoin users and leads to what is known as backlog in the blockchain. The backlog leads to long queues of transactions in the system. With the average transaction time in the Bitcoin blockchain being around 7 transactions per second and the theoretical maximum standing at 27, it is not difficult to understand how long users of the blockchain have to wait for their transactions to pass in times of heightened demand – the time is in the hours and sometimes even days.

Bitcoin Wallets Review

Since Bitcoin is the most popular cryptocurrency on the market, it is logical to judge wallets by their support of the first cryptocurrency. As such, the following will be a brief review of some of the best and most popular Bitcoin wallets on the market.
Online Bitcoin Wallets
Online or web wallets are the most popular ones out there and the best Bitcoin wallet overall is widely considered to be Blockchain.info, which is easily accessible and convenient for everyday use with good security. As an anonymous Bitcoin wallet, Coinbase follows in the lead with its ability to store a multitude of various coins, but with the same security risks that are inherent to all hot wallets.
Android Bitcoin Wallets
Android is the most popular mobile system in the world and plays host to a number of good mobile wallets. The best Android Bitcoin wallet is widely considered to be the Electrum Bitcoin wallet with its excellent reputation, good security and convenience. Though Electrum has some occasional glitches, they are never critical. Another excellent wallet for Android is the Coinomi wallet with its support for a wide variety of cryptos and excellent user support, which even allows for restore options using special phrases. Coinomi has its issues as well, such as occasional exchange glitches, but the many pros outweigh the cons.
Bitcoin Hardware Wallets
The undisputed leaders as the best hardware wallets for Bitcoin are Ledger Nano X and S, Trezor T and Trezor One, and Keepkey. Bitcoin hardware wallets are comparable in their security, accessibility and usability. The difference is mainly in the price, which ranges from $165 for Trzeor T to $59 for the Ledger Nano S model. In fact, the Ledger Bitcoin wallet is often called the king of hardware wallets. The KeepKey Bitcoin wallet is the in the top three hardware wallets as a convenient and stylish device. Though KeepKey supports over 40 assets, it still lacks coin support.
Bitcoin Wallets For iPhone
iPhone’s iOS system is the second most popular for mobile devices in the world and has support for some good wallets as well. The best iOS Bitcoin wallet for iPhone is considered to be the Abra software, which offers credit card support for topping up crypto balances and a good user interface, which is even more oriented at exchanges. The next software is Edge, formerly known as Airbitz. The Edge wallet is best known for high security and good user-friendliness along with multi-currency support.
Bitcoin Wallets For Windows
Bitcoin wallets for PC are very popular and Windows is leading the way with some excellent offers for wallets. Atomic is by far the most advanced and the best option for Windows users as it offers Atomic swaps technology as its basis. The application offers a wide variety of operations and supports over 300 cryptocurrencies. Exodus is the second most popular choice as a desktop only wallet with support for Bitcoin and many other altcoins. Exodus offers its users a good interface and it is free for use.
Bitcoin Wallets For Mac
Since Atomic and Exodus are cross-platform wallets, they can be used on Windows and Mac. Apart from them, there are also Jaxx and Electrum, which can be used on Mac. Jaxx is a multi-currency wallet with support for around 40 cryptos and has a PIN feature. In addition, Jaxx is free for use. Electrum is one of the oldest desktop wallets and is a lightweight wallet that does not require the full blockchain to operate, meaning less storage needed for its operation. The wallet requires a PIN and is essentially a desktop bank with good security and usability. Electrum is also a Bitcoin wallet for iPad, since it can be used on mobile platforms.
Bitcoin Paper Wallet
Since storing cryptos online on exchange or hot wallets or even on devices is risky, it is oftentimes more convenient to use a simple printer to print out the keys and store them. BitAddress offers a convenient and easy to use, step by step guide to creating a paper wallet with the added benefit of sleeping in peace, known that nothing and no one will ever threaten your Bitcoins.
https://preview.redd.it/bh7wi0d64u341.png?width=600&format=png&auto=webp&s=9f7fbd269eea43ac3b8897ad470553ba8b3c730d

Checklist

When embarking on the journey of creating your first wallet, think well of which type to use. The type will depend on the priorities that stand before the user. If security is paramount, then paper or cold storage wallets are the go-to solution. If frequency of use is the name of the day, then hot wallets and their inherent risks are the best way to go.
The most frequent questions related to wallets are how to add money to a Bitcoin wallet and how to set up a Bitcoin wallet. Both questions have no single answer, as each wallet offers its own instructions on how to top up balances and how to set them up. Therefore it is recommended to study all instructions carefully prior to operation.
Either way, there is no silver bullet and some features will have to be sacrificed in deciding how to store cryptocurrencies. The one thing that is constant is the need to store Bitcoins and cryptos and make use of them.

Check us out at https://moontrader.io
Facebook: https://www.facebook.com/MoonTraderPlatform
Twitter: https://twitter.com/MoonTrader_io
LinkedIn: https://www.linkedin.com/company/19203733
Reddit: https://www.reddit.com/Moontrader_official/
Telegram: https://t.me/moontrader_news_en

Originally posted on our blog.
submitted by MoonTrader_io to Moontrader_official [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Getting frustrated with Ubuntu. Are my experiences the norm for a Linux user?

Let me start off by saying that I'm not a total newb, but still pretty green. I like to believe I'm capable with computers, and know enough to figure out most issues. I also have a pretty solid general understanding of how they function. Been a Windows user most of my life, but decided to make the switch to Linux a few years back.
My experiences thus far are making me reconsider the switch, despite the fact that I've really become opposed to using Windows. I'm curious if I should expect more of the same indefinitely, or if my experiences up to this point are unusual, and I should expect to reach a point where I can just use the OS, instead of spend hours trying to perform every task.
It all started when I downloaded Ubuntu about three years ago. I easily got it installed as a dual boot on a Windows machine. Had to start by allocating disk space in Windows for the new Linux install, prepared a live usb, went through the install, cake. Then I started trying to do stuff, like use a printer. Well HP doesn't make a driver for Linux and, probably, 2-4 hours of research led to me still not having a working printer. I found a driver, but the process to get it installed did not work as it was supposed to. I forget the specifics, but I followed a tutorial to the T, but ran into unforeseen installation issues, and never could figure out how to get the process complete.
After that I started running into issues with the FireFox browser. I've alwasy used FF on Windows with no issues. On Ubuntu it ran slower than dial-up from the mid-90's. Again, 2-4 hours worth of research and several changes to things like FF settings, disabling add-ons, etc., and I still had no fix.
Still I wasn't deterred. Then the dual boot broke. I tried boot repair. No dice. Tried for several hours to get it working. Asked about it on forums, sent in results of boot repair (where I forget) only to get no response, and finally I threw in the towel.
I also struggled to get Bitcoin Armory working, with some very frustrating success, but I didn't count that against Linux, since it was very new software, and I wasn't surprised it was buggy.
Fast forward to today. I've been using Windows for a couple years, with few attempts made to use Linux, except for trying to retrieve a very small amount of BTC from Armory, which consumed about three weekends of my life to finally achieve.
Now I've decided to give it another go. I downloaded UbuntuStudio b/c I'd like to use some of the music production software that comes with it.
Following some tutorials online, I tried to connect my midi keyboard to the computer using QJackCtl. I couldn't remember the issue that I ran into when starting to type this up, so I tried to repeat the process, only to have the program crash during start up, three times. The computer had literally just restarted 20 minutes ago, so I doubt a reboot would work, but maybe. It's almost funny at this point. I'm really disappointed that I can't get the audio software that came with the distro working "fresh out of the box." Maybe with a few hours, or weekends, worth of research?
I've also been getting a system error message every time I login. I posted a query on the Ubuntu forums. That issue has yet to be sorted out.
I hesitate to include this next part, because it involves software that is really still in it's early stages, and I'm trying to be realistic in taking the perspective that any problems I encounter are with the new software, not Ubuntu, but the fact that I had zero problems getting the same stuff to work in Windows just adds to my frustration with Ubuntu.
Everything I'm about to describe is involved with installing monero mining and wallet software. The exception is the AMD drivers needed for the GPU I'm using to mine. Those I expected to work without issue. I followed the directions for installing the AMD drivers for Ubuntu on the AMD website, and the program would not work. After, you guessed it, 2-4 hours of research, I finally, almost by accident, installed an older version of the driver software. Boom, it worked. WTF man?! When I installed the Windows version it took 2 minutes.
Moving on, I tried getting the xmr-stak mining software working. This took me several hours, spread over several days to sort out. Same with the monero-gui wallet, which actually I've only got half-way working. In fact, I've tried installing the monero-gui by two different ways. In the process I've inadvertently got the monerod daemon running, but not the gui. Actually, the monerod daemon starts with the computer and I haven't even started trying to figure out how to turn that off, since what's the point of having it run if I can't use the gui?
In Windows I had all of this up and running in a couple of hours. And in saying that I'm prepared for the "if you like Windows so much then use that!" or "you're just too thick to figure it out!", but I don't like Windows, and I don't think it's a matter of not figuring it out. It seems to me that the reason I've spent dozens of hours just trying to get things to work in Linux is that nearly every time I've tried to do something, there is inevatably some error along the way where following the directions isn't good enough, and sorting out the issue is a feat in and of itself.
I just want to know if this is unusual, or if this is how it's going to go forever if I keep using Linux. Is my experience typical?
TL;DR: I've had a litany of issues and spent countless hours trying to fix them using Linux. Is this rare, and I've just had an unusual experience, or actually pretty common, and I should just accept it as the cost of using an open source OS?
submitted by rtfioeti to Ubuntu [link] [comments]

I'm an Undercover FBI agent on the Deep Web (Part One)

My name is Special Agent “Barry Allen” .(not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize the name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an UnderCover FBI Agent on The Deep Web. (Part one)

My name is Special Agent “Barry Allen” . It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to nosleep [link] [comments]

A Guide to Keeping Keys Offline Using Armory +rPi

Hi Redditors.
I am going to post in this thread my experiences in getting my Desktop (Debian) machine running Armory in watch-only mode, and coupling that with an offline Raspberry Pi (which holds my private keys) for signing the transactions previously made in watch-only mode.
I actually compiled Armory from source directly on my Pi. This guide is probably more for the bitcoin 'power user', as to run Armory online, and broadcast the signed transactions, you need to have a bitcoin full node running (bitcoind).
Basic requirements:
Aimed-for Setup:
I'll post the guide in digestible sections...

Section 1

I should begin by saying I installed source code from git, and got Armory to build the DB on my desktop initially, WITHOUT creating a wallet.. (This allowed me to debug what was going on a little!)
Go to Bitcoin.org, select Armory..
It leads to a Download from Git:
https://github.com/goatpig/BitcoinArmory/releases
Followed the procedure for Linux Debian verify code, compile, install, all straight-forward..
Began by running bitcoind, and telling Armory where to find it. This is the command I used, obviously it was all on one line and didn't include the arrows/explanations!:
python ArmoryQt.py \ --satoshi-datadir=/BlockChain/chain20180414/blocks \ # <-----(where my bitcoind blocks live) --datadir=/ArmoryDataDi \ # <-----(this is instead of ~/.armory) --dbdir=/ArmoryDataDidatabases # <-------(again, non std. place used for Armory's databases.. my choice.) 
So, on the Desktop, after the initial "build databases"
(NB the initial "Build Databases" took about 1.5h and my two CPUs were maxed the whole time, Temps up to 62C. Not ideal; Im not in a rush!)
I then wanted to import a watch-only wallet.
Before I did this, I took a full backup of the Armory data dir:
/ArmoryDataDi
(or ~/.armory in a default installation).
I'd hate to have to make Armory do another full sync with the bitcoind node!

Section 2

Next step: offline wallet (with Private Keys) is on a Raspberry Pi.
I downloaded the source and managed to compile it on the pi itself! :)
Though there were some gymnastics needed to setup the Pi.
My Pi is running Raspbian based on Wheezy.. quite old!
I did the following on the Pi:
apt-get update apt-get upgrade (<---took about an hour!) apt-get install autotools-dev apt-get install autoconf 
Then I followed the instructions exactly as I had done for my Debian Desktop machine, EXCEPT:
I had to increase the Pi's swap space. I upped it from 100Mb to 400Mb.
The compilation took 7 hours, and my poor SD card got a thrashing.
But after compilation, I put the Swap back to 100Mb and Armory runs ok with about 150Mb of memory (no swap needed).
Swap increase on the Pi:
use your favourite editor, and open the file /etc/dphys-swapfile
add/change the following line:
CONF_SWAPSIZE=400 
Then, REBOOT the Pi:
sudo shutdown -h -P now 
Once the compilation was done on the Pi, put the swap back, rebooted and created an Armory wallet.
I added manual entropy and upped the encryption 'time' from 250ms to 2500ms - since the Pi is slow, but I'll be happy to wait for more iterations in the Key Derivation Function.
Once the wallet was created, it obviously prompts you for backup.
I want to add a private key of my own (i.e. import), so don't do the backup until this is over.
I import my Private Key, and Armory checks that this corresponds to a Public Key, which I check is correct.
This is the point now where the Pi storage medium (e.g an SD card) has to be properly destroyed if you ever get rid of it.
I had thought that now would be a good time to decide if your new wallet will generate Segwit receiving addresses, and also addresses used to receive 'change' after a transaction..
But it seems Armory WON'T let you switch to P2SH-P2WPKH unless your Armory is connected to a node offering "WITNESS" service.
Obviously, my Pi is offline and will never connect to a node, so the following will not work on the Pi:
NB: I thought about setting this on the Debian "watch-only" wallet, but that would surely mean doom, as the Pi would not know about those addresses and backups might not keep them.. who knows...
So, end result:- no segwit for me just yet in my offline funds.

--If anyone can offer a solution to this, I'd be very grateful--

Section 3

Ok, now this is a good point to back up your wallet on the Pi. It has your imported keys. I choose a Digital Backup - and put it on a USB key, which will never touch the internet and will be stored off-site. I also chose to encrypt it, because I'm good with passwords..
NB: The Armory paper backup will NOT back up your imported private keys, so keep those somewhere if you're not sweeping them. It would be prudent to have an Armory paper backup anyway, but remember it will likely NOT help you with that imported key.
Now for the watch-only copy of the wallet. I want to get the "watch-only" version onto my Desktop Debian machine.
On the Pi, I created (exported to a USB key) a "watching-only" copy of my wallet.
I would use the RECOMMENDED approach, export the "Entire Wallet File".
As you will see below, I initially exported only the ROOT data, which will NOT capture the watching-only part of the Private Key I entered manually above (i.e. the public Key!).
Now, back on the Debian Desktop machine...
I stopped all my crontab jobs; just give Armory uninterrupted CPU/memory/disk...
I also stopped bitcoind and made a backup prior to any watch-only wallet being imported.
I already made a backup of Armory on my Desktop, before any wallet import.
(this was needed, as I made a mistake.. see below)
So on the Debian Desktop machine, I begin by firing up bitcoind.
my command for this is:
./bitcoind -daemon -datadir=/BlockChain/chain20180414 -dbcache=400 -maxmempool=400 

Section 4

I try running Armory like this:
(I'm actually starting Armory from a script - StartArm.sh)
Inside the script StartArm.sh, it has the line:
python ArmoryQt.py --ram-usage=4 --satoshi-datadir=/BlockChain/chain20180414/blocks --datadir=/ArmoryDataDi --dbdir=/ArmoryDataDidatabases 
I know from bitter experience that doing a scan over the blockchain for a new wallet takes a looong time and a lot of CPU, and I'd like it to play nicely; not gobble all the memory and swap and run my 2xCPUs both at 100% for four hours...
So... I aim to run with --ram-usage=X and --thread-count=X
(For me in the end, X=1 but I began with X=4)
I began with --ram-usage=4 (<--- = 4x128Mb)
The result is below...
TypeError: cannot concatenate 'str' and 'int' objects 
It didn't recognise the ram-usage and carried on, crippling my Debian desktop PC.
This is where it gets dangerous; Armory can gobble so much memory and CPU that the windowing environment can cease up, and it can take over 30 minutes just to exit nicely from bitcoind and ArmoryDB.
So, I ssh to the machine from another computer, and keep an eye on it with the command
"free -h" 
I'd also be able to do a "sudo reboot now" if needed from here.

Section 5

So, trying to get my --ram-usage command recognised, I tried this line (added quotes):
python ArmoryQt.py --ram-usage="4" --satoshi-datadir=/BlockChain/chain20180414/blocks --datadir=/ArmoryDataDi --dbdir=/ArmoryDataDidatabases 
But no, same error...
Loading Armory Engine: Armory Version: 0.96.4 Armory Build: None PyBtcWallet Version: 1.35 Detected Operating system: Linux OS Variant : ('debian', '9.4', '') User home-directory : /home/ Satoshi BTC directory : /BlockChain/chain20180414 Armory home dir : /ArmoryDataDi ArmoryDB directory : /ArmoryDataDidatabases Armory settings file : /ArmoryDataDiArmorySettings.txt Armory log file : /ArmoryDataDiarmorylog.txt Do wallet checking : True (ERROR) ArmoryUtils.py:3723 - Unsupported language specified. Defaulting to English (en) (ERROR) ArmoryQt.py:1833 - Failed to start Armory database: cannot concatenate 'str' and 'int' objects Traceback (most recent call last): File "ArmoryQt.py", line 1808, in startArmoryDBIfNecessary TheSDM.spawnDB(str(ARMORY_HOME_DIR), TheBDM.armoryDBDir) File "/BitcoinArmory/SDM.py", line 387, in spawnDB pargs.append('--ram-usage=' + ARMORY_RAM_USAGE) TypeError: cannot concatenate 'str' and 'int' objects 

Section 6

So, I edit the Armory python file SDM.py:
if ARMORY_RAM_USAGE != -1: pargs.append('--ram-usage=4') #COMMENTED THIS, SO I CAN HARDCODE =4 # ' + ARMORY_RAM_USAGE) 
Running it, I now have acknowledgement of the --ram-usage=4:
(WARNING) SDM.py:400 - Spawning DB with command: /BitcoinArmory/ArmoryDB --db-type="DB_FULL" --cookie --satoshi-datadir="/BlockChain/chain20180414/blocks" --datadir="/ArmoryDataDi" --dbdir="/ArmoryDataDidatabases" --ram-usage=4 
Also, even with ram-usage=4, it used too much memory, so I told it to quit.
It took over 30 minutes to stop semi-nicely. The last thing it reported was:
ERROR - 00:25:21: (StringSockets.cpp:351) FcgiSocket::writeAndRead FcgiError: unexpected fcgi header version 
But that didn't seem to matter or corrupt the Armory Database, so I think it's ok.
So, I get brave and change SDM.py as below, and I make sure my script has a command line for --ram-usage="ABCDE" and --thread-count="FGHIJ"; the logic being that these strings "ABCDE" will pass the IF criteria below, and my hardcoded values will be used...
if ARMORY_RAM_USAGE != -1: pargs.append('--ram-usage=1') #COMMENTED THIS, SO I CAN HARDCODE =1 # ' + ARMORY_RAM_USAGE) if ARMORY_THREAD_COUNT != -1 pargs.append('--thread-count=1') #COMMENTED THIS, SO I CAN HARDCODE =1 #' + ARMORY_THREAD_COUNT) 
So, as usual, I use my script and start this with: ./StartArm.sh
(which uses command line:)
python ArmoryQt.py --ram-usage="ABCDE" --thread-count="FGHIJ" --satoshi-datadir=/BlockChain/chain20180414/blocks --datadir=/ArmoryDataDi --dbdir=/ArmoryDataDidatabases 
(this forces it to use my hard-coded values in SDM.py...)
So, this is the command which it reports that it starts with:
(WARNING) SDM.py:400 - Spawning DB with command: /BitcoinArmory/ArmoryDB --db-type="DB_FULL" --cookie --satoshi-datadir="/BlockChain/chain20180414/blocks" --datadir="/ArmoryDataDi" --dbdir="/ArmoryDataDidatabases" --ram-usage=1 --thread-count=1 
Again, this is where it gets dangerous; Armory can gobble so much memory and CPU that the windowing environment can cease up. So I ssh to the machine and keep an eye on it with:
"free -h" 

Section 7

So, on the Debian Desktop PC, I inserted the USB stick with the watch-only wallet I exported from the Pi.
Start Armory...
Import "Entire Wallet File" watch-only copy.
Wait 4 hours..
YAY!!!
After running Armory for about 30m, the memory usage dropped by 400m... wierd...
It took ~2 hours to get 40% completion.
After 3.5 hours it's almost there...
The memory went up to about 1.7Gb in use and 900Mb of Swap, but the machine remained fairly responsive throughout, apart from a few (10?) periods at the start, where it appeared to freeze for 10-30s at a time.
(That's where my ssh session came in handy - I could check the machine was still ok with a "free -h" command)
Now, I can:
Create an unsigned transaction on my Desktop,
Save the tx to USB stick,
Move to the Pi,
Sign the tx,
Move back to the Desktop,
Broadcast the signed tx.

Section 8

My initial Mistake:
This caused me to have to roll-back my Armory database, using the backup. so you should try to avoid doing this..
On the Pi, I exported only the ROOT data, which will NOT capture the watching-only part of the Private Key
It is RECOMMENDED to use the Digital Export of Entire Wallet File from the Pi when making a watch-only copy. If you just export just the "ROOT data", not the "Entire Wallet File", you'll have problems if you used an imported Private Key in the offline wallet, like I did.
Using the ROOT data text import, after it finished... my balance was zero. So,. I tried a Help->Rescan Balance (Restart Armory, takes 1minute to get back up and running) No Luck. Still zero balance.
So, I try Rescan Databases.. This will take longer. Nah.. no luck.
So, I tried again, thinking it might be to do with the fact that I imported the text "root data" stuff, instead of following the (Recommended) export of watching-wallet file.
So, I used my Armory backup, and wound back the ArmoryDataDi to the point before the install of the (zero balance) wallet. (you should not need to do this, as you will hopefully use the RECOMMENDED approach of exporting the "Entire Wallet File"!)
submitted by fartinator to Bitcoin [link] [comments]

Cryptocurrency: Is It Still Alive or Dying? Part 2.

Cryptocurrency: Is It Still Alive or Dying? Part 2.
Part 2. Political and Economic Trends in Favor of the Cryptocurrency Market Development

In the first part of the story we showed that the cryptocurrency market crash in 2018 and the beginning of its recovery in 2019 fit well into the general patterns of the financial bubbles’ development, and also repeat pretty well the Bitcoin dynamics of 2014-2016. But besides the analogies with other bubbles, there are a lot of other arguments in favor of the global growth of the market, among which are the political and economic trends of the recent years.

Relaxation of the Political Climate around the Cryptoassets

The entire year of 2017 has witnessed heated discussions as to the legal status of the digital assets. One of the central events of the year was their legalization in Japan in April. Precisely this legalization, according to many, spurred a dramatic growth of the cryptocurrency market in May (especially, altcoins). But the majority of other countries during this period held more skeptical positions.

The U.S. government on several occasions refused to register bitcoin-ETF - exchange-traded funds, the price of shares in which would repeat the price of BTC. The U.S. government also extremely tightened the conditions of the ICO procedure, while some countries, such as China and South Korea - have banned it completely. Certain countries, such as Indonesia and Salvador, have banned cryptocurrencies to the extent of criminal responsibility.

A number of countries, including Russia, have adopted a cautious wait-and-see attitude, regularly promising to impose restrictions of varying severity, but not hurrying to sign it into law.

A turning point on the way to the global recognition of the cryptocurrency was the beginning of trading the Bitcoin futures at the Chicago exchanges (CME) (the world’s largest stock exchange in terms of turnover) and CBOE in December of 2017. That is when the American government admitted openly that cryptocurrencies are now to be reckoned with. With the beginning of this trade, the powerful financial circles of the USA, whose opinion cannot be ignored by the political leadership, became interested in the development of the cryptocurrency market.

Chicago Mercantile Exchange, CME – the world leader in terms of trade volume

In 2018, the following paradox became obvious: even if over the longer term cryptocurrencies are dangerous for the modern political system (tied up in the central banks and the currency exchange regulation), the countries that will be the first to prohibit them will be most affected along with those countries that will simply overdo stirring up negative attitude. Those countries that will settle on legalization will benefit. The drain of brains and capitals will be directed to these countries from the more repressive or unpredictable countries. A typical example of that - Crypto Project GRAM of the Russian businessman Pavel Durov, whose ICO in 2018 reached a record amount, but it was carried out in USA, and not in the legislatively uncertain Russian Federation.

The experience of the countries that have legalized the cryptocurrencies, proved successful both from the financial standpoint, and from the perspective of the international prestige. They proved themselves to be open to the progress and new freedoms. In addition to Japan, Switzerland is especially noteworthy here, because it legalized cryptocurrencies as early as in 2016, but the most brilliantly announced about itself in 2018, when its banks began to introduce cryptocurrency services one after another. Among the innovator banks there was even a Swiss subsidiary of the Russian Savings Bank (Sberbank). The very expression “Swiss bank” became a synonym of not only high reliability, but also innovation.
A milestone event of 2018 was legalization of cryptocurrencies in Germany – the leading economy of the European Union. Rather liberal measures relative to the cryptocurrencies are being applied today in Czechia, Sweden, Canada, Denmark, Australia, Estonia, Norway, Finland, and a number of other countries.

“Legalization parade” has shown: the politicians with repressive attitudes cannot count on the global ban of the cryptocurrencies (which seemed theoretically possible in 2016-2017). Economically developed countries made an obvious choice: “if you cannot stop the process – become its leader”. And precisely in these countries the maximum capitals are being circulated, and the market situation depends precisely on their business activity.

Explosive Growth of the Retail Use of Cryptocurrencies
Despite obvious popularization of cryptocurrencies, there is still a myth that they are purely investment and speculative instrument, which, even if used as a payment method – only in the dark net, and as a means of payment for illegal commodities. But this is not the case today. As far back as 2013-2015, legal services accepting bitcoin emerged, and in 2016-2018 their market has undergone explosive growth.

The pioneers of the cryptocurrency market of goods and services in 2013, were, for example, Virgin Galactic – space tourism company, Victoria’s Secret lingerie company, Shopify - a supplier of software for the online stores. In 2014, the cryptocurrency was adopted by the Overstock online store, Expedia tourism service, Zynga – operator of the online games, the software monster Microsoft and many others. Some of these companies considerably went up due to the innovations: for example, the shares of Shopify and Overstock have increased in price several-fold since then.

As of today, the cryptocurrency is accepted by hundreds of large companies and thousands of small ones, while the range of their products is approaching the one in a traditional economy. The most popular categories of the goods for the cryptocurrency in the large famous companies are tourism and air tickets (Expedia), software and games (Microsoft, Shopify, Zynga, Steam), clothing and other consumer goods (Victoria’s Secret, Overstock.com, Rakuten), as well as food products (Subway, KFC, Burger King – in Russia). As an example, Playboy erotic products, premium accounts of the 4chan.org and reddit.com forums, Bloomberg.com business news, automobiles in the Czech show room Alza and many other goods can be also purchased for cryptocurrency.

A number of well-known companies, although they prefer traditional payments, nevertheless allow crypto payments through the intermediary services, such as gyft.com (trading with the card Gyft for BTC). For example, Ebay online store, Wallmart supermarket chain, Starbucks restaurants, Uber taxi service, etc. The turnover of gyft.com is evaluated in the amount of 25 million dollars with only 38 employees.
Small start-up companies often use ready-made multicurrency gateways such as coinpayments.net. It supports dozens of currencies, and hosts about 400 companies. In addition to mainstream, it contains a lot of specialized commodities. For example, crypto-armory.com sells cartridges, francvila.com – Swiss watches, directvoltage.com - 3D-printers, electric motors, CNC machines, etc. Some new stores not only accept cryptocurrencies, but also purposely give up fiat currency. For example, crypto-armory.com, explaining their refusal from fiat currency, state both ideological, and narrow pragmatic reasons. In the opinion of the owners of the store, it is easier to accept cryptocurrency payments both technically and legally.

Cartridges from the cryptocurrency store crypto-armory.com
An important trend of 2017-2018, in addition to the general growth of the commodity market - re-orientation of the stores to the multi-currency payments. Whereas previously most of them accepted only BTC, now a sign of good manners is to accept also LTC, ETH, XMR and at least several more currencies.

Thus, while the politicians were solving the problem in the manner “not possible to allow - disallow”, a vast market of commodities for cryptocurrency spontaneously emerged on the Internet. Some of its participants have multibillion capitalizations. This market is very international. The majority of commodities and services can be bought even from Russia and other countries, where cryptocurrency is not legal as an internal payment instrument, but is not prohibited as such. Today, it is hard to imagine a consumer good, which cannot be bought for cryptocurrency.

The Latest Trend – Support of Cryptocurrencies by Smartphones

The first smartphone with a cryptocurrency wallet was HYPERLINK "https://bitcryptonews.ru/blogs/sravnenie-blokchejn-smartfonov-exodus-1-i-finney"HTC Exodus 1, released in the autumn of 2018. Then, a crypto smartphone HYPERLINK emerged "https://bitcryptonews.ru/blogs/obzor-kriptosmartfona-finney"Finney. And in March of 2019, the baton was unexpectedly picked up by the smartphone from the major South Korean company, Samsung - Galaxy S10. And although Samsung refrained from the direct embedding of the cryptocurrency wallet into the standard supply set, a brand wallet of Samsung can be installed from the Galaxy Store.

Galaxy S10 – the first smartphone from Samsung with cryptocurrency support

On the part of crypto enthusiasts, there are a number of claims to Samsung initiative, among which – the lack of bitcoin support (BTC). At the moment, Samsung Blockchain Wallet supports only Ethereum (ETH) and ERC-20 standard currencies and tokens created on its basis:
Basic Attention Token (BAT), Chainlink (LINK), BinanceCoin (BNB), True USD (TUSD), USD Coin (USDC), Paxos Standard (PAX) and others.

Anyway, from a political and PR perspective, the emergence of Galaxy S10 is a great event.

First of all, smartphone can attract to the cryptocurrency market new people who have greater confidence in the famous brand, than in the traditional bulky cryptocurrency wallets. Now, many people are frightened away from the cryptocurrencies only by technical difficulties, whereas smartphones on many occasions have proved their ability to promote to the masses those things, which previously seemed to be very complex.
Secondly, this step of Samsung is a clear signal both to the domestic and foreign governments: big business is on the side of the new technologies. South Korea has a reputation of a country not very friendly to cryptocurrencies, however, its business giant publicly demonstrated another attitude.
Thirdly, the initiative of Samsung with a high degree of probability will be emulated by other leading producers of communication devices. Thus, shortly after the release of Galaxy S10, there appeared a news that a cryptocurrency wallet will soon be available in iOS Opera Touch, which means that cryptocurrencies can be also stored in iPhone of Apple.
All this creates excellent prerequisites both for the world legalization of the cryptocurrencies, and for the growth of the market due to the increase of the number of users.

Conclusion
Thus, despite the “roller coaster” of the cryptocurrency exchange rates, some fundamental processes have developed steadily in the same direction in the recent years: expansion of the commodity market for cryptocurrency, increase in the number of countries with a liberal attitude to cryptocurrencies, adoption of cryptocurrencies as a strategic technology by more and more industrial giants. The total number of individuals who tried to work with the cryptocurrencies grows steadily, while the new technological trends (in particular, crypto smartphones), can additionally accelerate this growth.

The only thing that can seriously damage a cryptocurrency market is its global ban, but it seems to be unlikely. Right now there are about 40 million bitcoin wallets on earth. It is believed that on average their number is doubled annually, which means that within 5 years it can reach a billion. And if now a global ban on cryptocurrencies is unrealistic due to their profitability for the developed countries, by that time their prohibition will become impossible almost physically.

In the first part of the story we had put forward the arguments as to why the investors need not fear the bubble of 2017-2018: in the end, the bubble showed not so much the riskiness of the crypto investments, but rather their long-term prospects. Today we described political and economic events, which have occurred in parallel “behind the scenes”, and in which there were no “drops” – only progressive development toward the construction of the crypto economy. And in the next, third part, we will try to describe in detail specific financial reasons of the collapse and recovery of the market in 2018-2019.

Analytical department, Trident company, Victor Argonov, Candidate of Physical and Mathematical Sciences.
Source:http://trident-germes.com/
https://www.facebook.com/Germes.mining.robot/
submitted by TridentGermes to u/TridentGermes [link] [comments]

Cryptocurrency: Is It Still Alive or Dying? Part 2

Cryptocurrency: Is It Still Alive or Dying? Part 2
Cryptocurrency: Is It Still Alive or Dying?
Part 2. Political and Economic Trends in Favor of the Cryptocurrency Market Development

In the first part of the story we showed that the cryptocurrency market crash in 2018 and the beginning of its recovery in 2019 fit well into the general patterns of the financial bubbles’ development, and also repeat pretty well the Bitcoin dynamics of 2014-2016. But besides the analogies with other bubbles, there are a lot of other arguments in favor of the global growth of the market, among which are the political and economic trends of the recent years.

Relaxation of the Political Climate around the Cryptoassets

The entire year of 2017 has witnessed heated discussions as to the legal status of the digital assets. One of the central events of the year was their legalization in Japan in April. Precisely this legalization, according to many, spurred a dramatic growth of the cryptocurrency market in May (especially, altcoins). But the majority of other countries during this period held more skeptical positions.

The U.S. government on several occasions refused to register bitcoin-ETF - exchange-traded funds, the price of shares in which would repeat the price of BTC. The U.S. government also extremely tightened the conditions of the ICO procedure, while some countries, such as China and South Korea - have banned it completely. Certain countries, such as Indonesia and Salvador, have banned cryptocurrencies to the extent of criminal responsibility.

A number of countries, including Russia, have adopted a cautious wait-and-see attitude, regularly promising to impose restrictions of varying severity, but not hurrying to sign it into law.

A turning point on the way to the global recognition of the cryptocurrency was the beginning of trading the Bitcoin futures at the Chicago exchanges (CME) (the world’s largest stock exchange in terms of turnover) and CBOE in December of 2017. That is when the American government admitted openly that cryptocurrencies are now to be reckoned with. With the beginning of this trade, the powerful financial circles of the USA, whose opinion cannot be ignored by the political leadership, became interested in the development of the cryptocurrency market.
Chicago Mercantile Exchange, CME – the world leader in terms of trade volume

In 2018, the following paradox became obvious: even if over the longer term cryptocurrencies are dangerous for the modern political system (tied up in the central banks and the currency exchange regulation), the countries that will be the first to prohibit them will be most affected along with those countries that will simply overdo stirring up negative attitude. Those countries that will settle on legalization will benefit. The drain of brains and capitals will be directed to these countries from the more repressive or unpredictable countries. A typical example of that - Crypto Project GRAM of the Russian businessman Pavel Durov, whose ICO in 2018 reached a record amount, but it was carried out in USA, and not in the legislatively uncertain Russian Federation.

The experience of the countries that have legalized the cryptocurrencies, proved successful both from the financial standpoint, and from the perspective of the international prestige. They proved themselves to be open to the progress and new freedoms. In addition to Japan, Switzerland is especially noteworthy here, because it legalized cryptocurrencies as early as in 2016, but the most brilliantly announced about itself in 2018, when its banks began to introduce cryptocurrency services one after another. Among the innovator banks there was even a Swiss subsidiary of the Russian Savings Bank (Sberbank). The very expression “Swiss bank” became a synonym of not only high reliability, but also innovation.

A milestone event of 2018 was legalization of cryptocurrencies in Germany – the leading economy of the European Union. Rather liberal measures relative to the cryptocurrencies are being applied today in Czechia, Sweden, Canada, Denmark, Australia, Estonia, Norway, Finland, and a number of other countries.

“Legalization parade” has shown: the politicians with repressive attitudes cannot count on the global ban of the cryptocurrencies (which seemed theoretically possible in 2016-2017). Economically developed countries made an obvious choice: “if you cannot stop the process – become its leader”. And precisely in these countries the maximum capitals are being circulated, and the market situation depends precisely on their business activity.

Explosive Growth of the Retail Use of Cryptocurrencies

Despite obvious popularization of cryptocurrencies, there is still a myth that they are purely investment and speculative instrument, which, even if used as a payment method – only in the dark net, and as a means of payment for illegal commodities. But this is not the case today. As far back as 2013-2015, legal services accepting bitcoin emerged, and in 2016-2018 their market has undergone explosive growth.

The pioneers of the cryptocurrency market of goods and services in 2013, were, for example, Virgin Galactic – space tourism company, Victoria’s Secret lingerie company, Shopify - a supplier of software for the online stores. In 2014, the cryptocurrency was adopted by the Overstock online store, Expedia tourism service, Zynga – operator of the online games, the software monster Microsoft and many others. Some of these companies considerably went up due to the innovations: for example, the shares of Shopify and Overstock have increased in price several-fold since then.

As of today, the cryptocurrency is accepted by hundreds of large companies and thousands of small ones, while the range of their products is approaching the one in a traditional economy. The most popular categories of the goods for the cryptocurrency in the large famous companies are tourism and air tickets (Expedia), software and games (Microsoft, Shopify, Zynga, Steam), clothing and other consumer goods (Victoria’s Secret, Overstock.com, Rakuten), as well as food products (Subway, KFC, Burger King – in Russia). As an example, Playboy erotic products, premium accounts of the 4chan.org and reddit.com forums, Bloomberg.com business news, automobiles in the Czech show room Alza and many other goods can be also purchased for cryptocurrency.

A number of well-known companies, although they prefer traditional payments, nevertheless allow crypto payments through the intermediary services, such as gyft.com (trading with the card Gyft for BTC). For example, Ebay online store, Wallmart supermarket chain, Starbucks restaurants, Uber taxi service, etc. The turnover of gyft.com is evaluated in the amount of 25 million dollars with only 38 employees.
Small start-up companies often use ready-made multicurrency gateways such as coinpayments.net. It supports dozens of currencies, and hosts about 400 companies. In addition to mainstream, it contains a lot of specialized commodities. For example, crypto-armory.com sells cartridges, francvila.com – Swiss watches, directvoltage.com - 3D-printers, electric motors, CNC machines, etc. Some new stores not only accept cryptocurrencies, but also purposely give up fiat currency. For example, crypto-armory.com, explaining their refusal from fiat currency, state both ideological, and narrow pragmatic reasons. In the opinion of the owners of the store, it is easier to accept cryptocurrency payments both technically and legally.

Cartridges from the cryptocurrency store crypto-armory.com
An important trend of 2017-2018, in addition to the general growth of the commodity market - re-orientation of the stores to the multi-currency payments. Whereas previously most of them accepted only BTC, now a sign of good manners is to accept also LTC, ETH, XMR and at least several more currencies.

Thus, while the politicians were solving the problem in the manner “not possible to allow - disallow”, a vast market of commodities for cryptocurrency spontaneously emerged on the Internet. Some of its participants have multibillion capitalizations. This market is very international. The majority of commodities and services can be bought even from Russia and other countries, where cryptocurrency is not legal as an internal payment instrument, but is not prohibited as such. Today, it is hard to imagine a consumer good, which cannot be bought for cryptocurrency.

The Latest Trend – Support of Cryptocurrencies by Smartphones

The first smartphone with a cryptocurrency wallet was HYPERLINK "https://bitcryptonews.ru/blogs/sravnenie-blokchejn-smartfonov-exodus-1-i-finney"HTC Exodus 1, released in the autumn of 2018. Then, a crypto smartphone HYPERLINK emerged "https://bitcryptonews.ru/blogs/obzor-kriptosmartfona-finney"Finney. And in March of 2019, the baton was unexpectedly picked up by the smartphone from the major South Korean company, Samsung - Galaxy S10. And although Samsung refrained from the direct embedding of the cryptocurrency wallet into the standard supply set, a brand wallet of Samsung can be installed from the Galaxy Store.

https://preview.redd.it/p8zc6dat0ay21.jpg?width=1280&format=pjpg&auto=webp&s=d7f173f7470107c2f4cc5868ed882089499b2a09
Galaxy S10 – the first smartphone from Samsung with cryptocurrency support
On the part of crypto enthusiasts, there are a number of claims to Samsung initiative, among which – the lack of bitcoin support (BTC). At the moment, Samsung Blockchain Wallet supports only Ethereum (ETH) and ERC-20 standard currencies and tokens created on its basis:
Basic Attention Token (BAT), Chainlink (LINK), BinanceCoin (BNB), True USD (TUSD), USD Coin (USDC), Paxos Standard (PAX) and others.

Anyway, from a political and PR perspective, the emergence of Galaxy S10 is a great event.

First of all, smartphone can attract to the cryptocurrency market new people who have greater confidence in the famous brand, than in the traditional bulky cryptocurrency wallets. Now, many people are frightened away from the cryptocurrencies only by technical difficulties, whereas smartphones on many occasions have proved their ability to promote to the masses those things, which previously seemed to be very complex.

Secondly, this step of Samsung is a clear signal both to the domestic and foreign governments: big business is on the side of the new technologies. South Korea has a reputation of a country not very friendly to cryptocurrencies, however, its business giant publicly demonstrated another attitude.

Thirdly, the initiative of Samsung with a high degree of probability will be emulated by other leading producers of communication devices. Thus, shortly after the release of Galaxy S10, there appeared a news that a cryptocurrency wallet will soon be available in iOS Opera Touch, which means that cryptocurrencies can be also stored in iPhone of Apple.

All this creates excellent prerequisites both for the world legalization of the cryptocurrencies, and for the growth of the market due to the increase of the number of users.

Conclusion

Thus, despite the “roller coaster” of the cryptocurrency exchange rates, some fundamental processes have developed steadily in the same direction in the recent years: expansion of the commodity market for cryptocurrency, increase in the number of countries with a liberal attitude to cryptocurrencies, adoption of cryptocurrencies as a strategic technology by more and more industrial giants. The total number of individuals who tried to work with the cryptocurrencies grows steadily, while the new technological trends (in particular, crypto smartphones), can additionally accelerate this growth.

The only thing that can seriously damage a cryptocurrency market is its global ban, but it seems to be unlikely. Right now there are about 40 million bitcoin wallets on earth. It is believed that on average their number is doubled annually, which means that within 5 years it can reach a billion. And if now a global ban on cryptocurrencies is unrealistic due to their profitability for the developed countries, by that time their prohibition will become impossible almost physically.

In the first part of the story we had put forward the arguments as to why the investors need not fear the bubble of 2017-2018: in the end, the bubble showed not so much the riskiness of the crypto investments, but rather their long-term prospects. Today we described political and economic events, which have occurred in parallel “behind the scenes”, and in which there were no “drops” – only progressive development toward the construction of the crypto economy. And in the next, third part, we will try to describe in detail specific financial reasons of the collapse and recovery of the market in 2018-2019.

Analytical department, Trident company, Victor Argonov, Candidate of Physical and Mathematical Sciences.
Source:http://trident-germes.com/
https://www.facebook.com/Germes.mining.robot/
submitted by TridentGermes to ENG [link] [comments]

One cash free btc direct to coins.ph auto claim via termux How to install Bitcoin Armory in Ubuntu 14.04 Install Bitcoin Armory on an Offline Computer: Part 1 Pi Wallet - Secure hardware wallet DIY Bitcoin Mining: Hardware (part1) - YouTube

Armory is used by some of the most heavily-invested, and most paranoid Bitcoin enthusiasts and cloud miners for maximum privacy and security. If you are in this category, it is recommended you verify that your Armory installers have not been altered in any way. Armory Ubuntu/Debian packages (*.deb files) are signed directly using our [Offline ... The Bitcoin.com mining pool has the lowest share reject rate (0.15%) we've ever seen. Other pools have over 0.30% rejected shares. Furthermore, the Bitcoin.com pool has a super responsive and reliable support team. 1. Install Bitcoin-Qt Since version 0.9, Bitcoin-Qt was renamed to Bitcoin Core t o reduce confusion between Bitcoin-the-network and Bitcoin-the-software. Bitcoin Core is a full Bitcoin client. It is a thick client, meaning it requires the full blockchain (explained below) on local disk to operate and expose blockchain back to the network to help relay and verify transactions. Restart Bitcoin Core. If you plan to run Armory on Mac, skip this step. With no default data directory, Bitcoin Core assumes that this is its first session. Launching Bitcoin Core should yield a welcome screen. This screen gives you to option to store data in the default location or a custom location. Select the second option. Then Click the “…” button to point to the new location of the ... How do I install Bitcoin Armory in Ubuntu 17.04? I am trying desperately to install the latest version of Armory on a fresh install of Ubuntu 17.04. I tried in Debian Jessie first, but something failed and it would not run correctly. Reinstalled my OS because everything online indicated that it would install on Ubuntu. So I downloaded 17.04 because I figured it would be the most up to date ...

[index] [10571] [46391] [1599] [30841] [45607] [23840] [29081] [14747] [35120] [47884]

One cash free btc direct to coins.ph auto claim via termux

The Electrum cryptocurrency wallet is a desktop Bitcoin wallet that’s available for free download for Windows, Mac, and Linux computers. The wallet was created in 2011 and is a lightweight ... Pi-Wallet consists of a Raspberry Pi in a transparent case and 2 SDHC cards with an operating system and Armory (a secure bitcoin wallet). The operating system as well as Armory are open source ... Install Bitcoin Armory on an Offline Computer: Part 1. But the Bitcoin plan calls for the creation of only 21 million bitcoins. In this way, Bitcoin will try to avoid the pitfalls of modern fiat currencies such as inflation, deflation, market ... Get an additional $10 in Bitcoins from Coinbase when purchasing through my referral link http://fredyen.com/get/Bitcoins Raspberry Pi: http://amzn.to/2l6yrW7...

#