As you can expect from the title, this how my first experience on the dark web went. I'm writing this as a warning to all of you who have interest going on there. I know this may just encourage more of you on there, but please just know that what I'm telling you has given me nightmares for days now. Just read this and learn from my wisdom. Thinking you can handle what is out there isn't the same as actually handling it. I had always been interested in the dark web. However, I never owned a personal computer growing up, and the college I went to had strict internet monitoring/filtering, so I never risked making an incursion. Well I went home due to the coronavirus outbreak, and decided it was time to figure out what all the fuss was about. So I did some research, and decided to install Tails as a VM and browse from their, hopefully protecting my computer from any malicious attacks. I pull up a tor browser and hop on the hidden-wiki. For the most part, most of the links timed out, most likely they were taken down for one reason or another. Then I found more links to updated "hiden-wikis." These must've been updated more recently as several more of the links worked. Nothing crazy. Some deepweb porn (honestly the clearnet stuff is better), sites selling drugs, IDs, bitcoin, etc. The occasional conspiracy site. "Red Rooms" that looked like a 10 year old taking an HTML course made, most likely scams. It was near the bottom of this hidden-wiki page that I found an interesting cite. I forget the name, but the description said "link paste." If you ever find the wiki page, a quick ctrl-f will find it for you. It was a pretty simple website. Basically it was an online forum, actually similar to reddit. However it appeared it was primarily used for posting newfound links and offering various services - hacking, drugs, prostitution. Some darker stuff too, linking/selling child porn and pay to view webcams of blackmailed teens. I stayed away from those. One of the links caught my eye for some reason. "Get revenge on my girlfriend!" Normally posts like these linked the girlfriends nudes or whatever, but not this one. The OP gave a ton of her info, saying she cheated. Her drivers licence, pictures, email, address. I couldn't read all of it because apparently the girl was chinese. At first the comments were actually quite wholesome and I laughed, people telling him that she wasn't worth it and he could do way better. "Don't worry about her, king, you can do so much better" and whatnot. Surprisingly wholesome actually. I guess even on the darkweb we're all still bros. But as I scrolled down, one of the comments posted a link, captioned "got revenge." I, being an idiot, opened it. It redirected me to what looked like a downgraded youtube video. I clicked play. The video started off in what looked like somebody's unfinished basement. The camera panned, around to a hooded woman tied up in a chair, naked. The floor was covered by a tarp. I had a sinking feeling of where this was going. I should've closed the link, deleted the VM, and never looked back. But my curiosity got the better of me. A man walks in from the edge. He's shirtless, revealing a hairy beer gut, but hes wearing what looks like a gimp mask (the footage was kinda grainy so I'm not totally sure). I see he's holding a hacksaw. I should've closed that browser then and their, but I sat, paralyzed by fear of what I knew I was about to see. He took the hood off of the woman, revealing what looked like the woman in the photos above. Her hair was disheveled and her makeup was smeared across her face crying. She looked around frantically, trying to make out her surroundings. The man started with her arm. Still tied to the chair, he began hacking away at her shoulder as she screamed and squirmed. I could hear the sound of the saw, tearing at her bone. It makes me sick just to think about. The tarp pooled with blood. I don't really want to describe in any more detail what happened next. Needless to say, the rest of her limbs were removed, and her corpse was strewn across the floor, matted with blood. The camera came in close to her face, as if to verify it was the girl. No longer paralyzed, I immediately closed the browser, horrified by what I had just seen. However, there was a new window open, like one of those popup boxes. On it was simply a series of numbers. An IP address. And below it, the text, "We know who you are." I quickly opened a terminal, and typed in 'ipconfig,' displaying my IP address. It was a match. I stared for a minute in terror. Did they know who I was? Where I am? I sprung into action. I powered off the Virtual Machine, deleted it from VMware. I then immediately deleted the disk image file it came in and emptied the recycle bin. I restarted my computer. There didn't seem to be any sign of any malware, so I shut it down, and went to bed, falling into a restless dream. I haven't really slept since then. I keep seeing what I saw in my nightmares. I'm still scared that somehow they'll find me. I sleep with a gun now. Every noise at night wakes me up in terror. I'm writing this to all of you would be deep web delvers. This isn't going to stop most of you, but at the least I can warn you. Be careful. Try to stay to the safer sites. Don't just click random links. There's some cool stuff out there. But whatever you see is with you forever. I'm probably not ever going back there. Theres nothing on there worth what I've been through.
Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web. https://i.imgur.com/Elnci0M.png In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real. https://i.imgur.com/121LXqy.png If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today? https://i.imgur.com/jQFVYew.png https://i.imgur.com/ZKMYGJj.png In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media. https://i.imgur.com/IbjDOkI.png https://i.imgur.com/NH86ozU.png The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal. https://i.imgur.com/OAd4vpf.png But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction. https://i.imgur.com/6OEWYFN.png https://i.imgur.com/iG4sdD4.png https://i.imgur.com/e89Rx6B.png https://i.imgur.com/uotm9Cg.png https://i.imgur.com/74wt9tD.png In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc. https://i.imgur.com/zlpBh3c.png https://i.imgur.com/e5ZvFFJ.png Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects. https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors. Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough. Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014. In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal. In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated. https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not." "Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company. https://i.imgur.com/JnGHqOS.png We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips. The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum. https://i.imgur.com/vZC4D29.png https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message. https://i.imgur.com/tU4MD4S.png The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.' Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences. Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company. Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
Guys please this whole deepweb this , how can it be useful ? Like all i see is some drugs ,pornography , and some live killing crap please is there something that we can gain from it like some rare books (hacking or some courses) or some interesting softwares/apps/editors ????? Thanks and have a good day
A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet
First, a bit of introduction before we get into the living drama that is Brian Krebs. Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring. In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him. One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to. And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.
Fly on the Wall
By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards. However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places. So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum. While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site. By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away. Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things. He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances. More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses) While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers. In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama. The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect. Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks. This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years. Now time for a couple quick side stories: Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 18.104.22.168. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 22.214.171.124. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider. Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site. Back to the main tale! So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai". As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement. By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf. While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei. Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
A source and security researcher he was talking to started blabbing about him working with Krebs, and also was selling data to hackers on the side. His example data in his sales post was fucking Brian Krebs'.
IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices. Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article. Given the above, many questions arise related to the security status of IoT devices, namely: What are the current standards and protocols for IoT? What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have? What methods of testing IoT devices exist? Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks. Challenges of testing IoT devices To a request to name essential items, many would answer: food, a roof over your head, clothes … With one caveat: this was the case in the last century. Since then, the species Homo Sapiens has accumulated needs. We need automatic sensors to control the lighting, not just switches, for smart systems to monitor health and car traffic. The list goes on … In general, we can make life easier and better. Let’s try to figure out how all this Internet of things works before moving on to testing. IoT testing Content What is the Internet of Things (IoT)? Examples of IoT devices # 1) Wearable technology: # 2) Infrastructure and development # 3) Health Technologies that are present in IoT IoT Testing # 1) Usability: # 2) IoT Security: # 3) Network features: # 4) Efficiency: # 5) Compatibility testing: # 6) Pilot testing: # 7) Check for compliance: # 8) Testing updates: IoT testing challenges # 1) Hard / soft # 2) Device Interaction Model # 3) Testing data coming in real time # 4) UI # 5) Network Availability IoT Testing Tools # 1) Software: # 2) Hard: Total What is the Internet of Things (IoT)? The Internet of things (or IoT) is a network that combines many objects: vehicles, home automation, medical equipment, microchips, etc. All these constituent elements accumulate and transmit data. Through this technology, the user controls the devices remotely.
Examples of IoT devices
# 1) Wearable technology: Fitbit Fitness Bracelets and Apple Watch smart watches sync seamlessly with other mobile devices.
IoT – watches and bracelets
Itís easier to collect health information: heart rate, body activity during sleep, etc. # 2) Infrastructure and development The CitySense app analyzes lighting data online and turns lights on and off automatically. There are applications that control traffic lights or report on the availability of parking lots. # 3) Health Some health monitoring systems are used in hospitals. The basis of their work is indicative data. These services control the dosage of drugs at different times of the day. For example, the UroSense application monitors the level of fluid in the body and, if necessary, increases this level. And doctors will learn about patient information wirelessly. Technologies that are present in IoT RFID (Radio Frequency Identification), EPC (Electronic Product Code) NFC (ìNear Field Communicationî) provides two-way communication between devices. This technology is present in smartphones and is used for contactless transactions. Bluetooth It is widely used in situations where near-field communication is sufficient. Most often present in wearable devices. Z-Wave. Low frequency RF technology. Most often used for home automation, lighting control, etc. WiFi. The most popular network for IoT (file, data and message transfer). IoT Testing Consider an example : a medical system that monitors health status, heart rate, fluid content, and sends reports to healthcare providers. Data is displayed in the system; archives available. And doctors are already deciding whether to take medication for the patient remotely. IoT architecture There are several approaches for testing the IoT architecture. # 1) Usability: It is necessary to provide usability testing of each device. A medical device that monitors your health should be portable. Sufficiently thought out equipment is needed that would send not only notifications, but also error messages, warnings, etc. The system must have an option that captures events, so that the end user understands. If this is not possible, event information is stored in the database. The ability to process data and exchange tasks between devices is carefully checked. # 2) IoT Security: Data is at the heart of all connected devices. Therefore, unauthorized access during data transfer is not ruled out. From the point of view of software testing, it is necessary to check how secure / encrypted the data is. If there is a UI, you need to check if it is password protected. # 3) Network features: Network connectivity and IoT functionality are critical. After all, we are talking about a system that is used for health purposes. Two main aspects are tested: The presence of a network , the possibility of data transfer (whether jobs are transferred from one device to another without any hitch). The scenario when there is no connection . Regardless of the level of reliability of the system, it is likely that the status of the system will be ìofflineî. If the network is unavailable, employees of the hospital or other organization need to know about it (notifications). Thus, they will be able to monitor the condition of the patient themselves, and not wait for the system to work. On the other hand, in such systems there is usually a mechanism that saves data if the system is offline. That is, data loss is eliminated. # 4) Efficiency: It is necessary to take into account the extent to which the healthcare solution is applicable in specific conditions. In testing, from 2 to 10 patients participate, data is transmitted to 10-20 devices. If the entire hospital is connected to the network, this is already 180-200 patients. That is, there will be more actual data than test data. In addition, it is necessary to test the utility for monitoring the system: current load, power consumption, temperature, etc. # 5) Compatibility testing: This item is always present in the plan for testing the IoT system. The compatibility of different versions of operating systems, browser types and their respective versions, devices of different generations, communication modes [for example, Bluetooth 2.0, 3.0] is extremely important for IoT. # 6) Pilot testing: Pilot testing is a mandatory point of the test plan. Only tests in the laboratory will allow us to conclude that the system is functional. In pilot testing, the number of users is limited. They make manipulations with the application and express their opinion. These comments turn out to be very helpful, they make a reliable application. # 7) Check for compliance: The system, which monitors the state of health, undergoes many compliance checks. It also happens that a software product passes all stages of testing, but fails the final test for compliance [testing is carried out by the regulatory body]. It is more advisable to check for compliance with norms and standards before starting the development cycle. # 8) Testing updates: IoT is a combination of many protocols, devices, operating systems, firmware, hardware, network layers, etc. When an update occurs – be it a system or something else of the above – rigorous regression testing is required. The overall strategy is being amended to avoid the difficulties associated with the upgrade.
IoT testing challengesIoT testing
# 1) Hard / soft IoT is an architecture in which software and hardware components are closely intertwined. Not only software is important, but also hard: sensors, gateways, etc. Functional testing alone will not be enough to certify the system. All components are interdependent. IoT is much more complicated than simpler systems [only software or only hard]. # 2) Device Interaction Model Components of the network must interact in real time or close to real. All this becomes a single whole – hence the additional difficulties associated with IoT (security, backward compatibility and updates). # 3) Testing data coming in real time Obtaining this data is extremely difficult. The matter is complicated by the fact that the system, as in the described case, may relate to the health sector. # 4) UI An IoT network usually consists of different devices that are controlled by different platforms [iOS, Android, Windows, linux]. Testing is possible only on some devices, since testing on all possible devices is almost impossible. # 5) Network Availability Network connectivity plays an important role in IoT. The data rate is increasing. IoT architecture should be tested under various connection conditions, at different speeds. Virtual network emulators in most cases are used to diversify network load, connectivity, stability, and other elements of load testing . But the evidence is always new scenarios, and the testing team does not know where the difficulties will arise in the future.
IoT Testing ToolsIoT and software
There are many tools that are used in testing IoT systems. They are classified depending on the purpose: # 1) Software: Wireshark : An open source tool. Used to monitor traffic in the interface, source / given host address, etc. Tcpdump : This tool does a similar job. The utility does not have a GUI, its interface is the command line. It enables the user to flash TCP / IP and other packets that are transmitted over the network. # 2) Hard: JTAG Dongle: A tool similar to debuggers in PC applications. Allows you to find defects in the code of the target platform and shows the changes step by step. Digital Storage Oscilloscope : checks various events using time stamps, power outages, signal integrity. Software Defined Radio : emulates a transmitter and receiver for various wireless gateways. IoT is an emerging market and many opportunities. In the foreseeable future, the Internet of things will become one of the main areas of work for tester teams. Network devices, smart gadget applications, communication modules – all this plays an important role in the study and evaluation of various services. Total The approach to testing IoT may vary depending on the specific system / architecture. Itís difficult to test IoT, but at the same time itís an interesting job, since testers have a good place to swing – there are many devices, protocols and operating systems. PS You should try out the TAAS format (“tests from the user’s point of view”), and not just fulfill the formal requirements. ————— Smart watches, baby-sitters, wireless gadgets and devices such as, for example, a portable radio station have long been part of everyday life. Hackers have already proven that many of these attacks on IoT are possible. Many people in general first learned about IoT security threats when they heard about the Mirai botnet in September 2016. According to some estimates, Mirai infected about 2.5 million IoT devices, including printers, routers and cameras connected to the Internet. The botnetís creators used it to launch distributed denial of service (DDoS) attacks, including an attack on the KrebsonSecurity cybersecurity blog. In fact, the attackers used all devices infected with Mirai to try to connect to the target site at the same time, in the hope of suppressing the servers and preventing access to the site. Since Mirai was first published on the news, attackers launched other botnet attacks on IoT, including Reaper and Hajime. Experts say that such attacks are most likely in the future. The Internet of Things (IoT) can bring many advantages to modern life, but it also has one huge drawback: security threats. In its 2018 IOT forecasts, Forroter Research notes: ìSecurity threats are a major concern for companies deploying IoT solutions – in fact, this is the main task of organizations looking to deploy IoT solutions. However, most firms do not regularly prevent IoT-specific security threats, and business pressure suppresses technical security issues. î IoT security risks can be even more significant on the consumer side, where people are often unaware of potential threats and what they should do to avoid threats. A 2017 IoT security survey sponsored by Gemalto Security Provider found that only 14 percent of consumers surveyed consider themselves IoT-aware. This number is particularly noteworthy because 54 percent of the respondents owned an average of four IoT devices. And these IoT security threats are not just theoretical. Hackers and cybercriminals have already found ways to compromise many IoT devices and networks, and experts say that successful attacks are likely to increase. Forrester predicted: “In 2018, we will see more attacks related to IoT … except that they will increase in scale and loss.” What types of IoT security threats will enterprises and consumers face in 2018? Based on historical precedent, here are ten of the most likely types of attacks.
Botnets and DDoS attacks
Remote recording The possibility that attackers can hack IoT devices and record owners without their knowledge is not revealed as a result of the work of hackers, but as a result of the work of the Central Intelligence Agency (CIA).
Documents released by WikiLeaks implied that the spy agency knew about dozens of zero-day exploits for IoT devices, but did not disclose errors, because they hoped to use vulnerabilities to secretly record conversations that would reveal the actions of alleged opponents of America. Documents pointed to vulnerabilities in smart TVs, as well as on Android and iOS smartphones. The obvious consequence is that criminals can also exploit these vulnerabilities for their vile purposes.
Spam In January 2014, one of the first known attacks using IoT devices used more than 100,000 Internet-connected devices, including televisions, routers, and at least one smart refrigerator to send 300,000 spam emails per day.
The attackers sent no more than 10 messages from each device, which makes it very difficult to block or determine the location of the incident. This first attack was not far from the last. IoT spam attacks continued in the fall with the Linux.ProxyM IoT botnet.
APTs In recent years, advanced persistent threats (APTs) have become a serious concern for security professionals.
APTs are carried out by funded and widespread attackers such as nation states or corporations that launch complex cyberattacks that are difficult to prevent or mitigate. For example, the Stuxnet worm, which destroyed Iranian nuclear centrifuges and hacking Sony Pictures 2014, was attributed to nation states. Because the critical infrastructure is connected to the Internet, many experts warn that APTs may launch a power-oriented IoT attack, industrial control systems, or other systems connected to the Internet. Some even warn that terrorists could launch an attack on iOT, which could harm the global economy.
Ransomware Ransomware has become too common on home PCs and corporate networks. Now experts say that it is only a matter of time before the attackers begin to block smart devices. Security researchers have already demonstrated the ability to install ransomware on smart thermostats. For example, they can raise the temperature to 95 degrees and refuse to return it to its normal state until the owner agrees to pay a ransom in Bitcoins. They can also launch similar attacks on garage doors, vehicles, or even appliances. How much would you pay to unlock your smart coffee pot first thing in the morning?
Data theft Obtaining important data, such as customer names, credit card numbers, social security numbers, and other personal information, is still one of the main goals of cyber attacks.
IoT devices represent a whole new vector of attack for criminals looking for ways to invade corporate or home networks. For example, if an improperly configured device or IoT sensor is connected to corporate networks, this can give attackers a new way to enter the network and potentially find the valuable data that they need.
Home theft As smart locks and smart garage doors become more commonplace, it is also more likely that cybercriminals can become real thieves.
Home systems that are not properly protected can be vulnerable to criminals with sophisticated tools and software. Security researchers are unlikely to have shown that itís quite easy to break into a house through smart locks from several different manufacturers, and smart garage doors do not seem to be much safer.
Communication with children One of the most disturbing IoT security stories came from children.
One couple discovered that the stranger not only used his monitor for children to spy on their three-year-old son, this stranger also spoke with his child through the device. Mother heard an unknown voice: ìWake up, boy, dad is looking for you,î and the child said that he was scared because at night someone was talking to him on an electronic device. As more and more children’s gadgets and toys connect to the Internet, it seems likely that these frightening scenarios may become more common.
Remote control of a vehicle As vehicles become smarter and more accessible on the Internet, they also become vulnerable to attack.
Hackers have shown that they can take control of a jeep, maximize air conditioning, change the radio station, start the wipers, and ultimately slow down the car. The news led to the recall of 1.4 million cars, but whitehat researchers, following the original exploit, said they discovered additional vulnerabilities that were not fixed by the Chrysler patch applied to the recalled cars. Although experts say the automotive industry is doing a great job of ensuring vehicle safety, it is almost certain that attackers will find new vulnerabilities in such smart cars.
Personal attacks Sometimes IoT covers more than just devices – it can also include people who have connected medical devices implanted in their bodies.
An episode of the television series Homeland attempted a murder aimed at an implanted medical device, and former vice president Dick Cheney was so worried about this scenario that he turned off the wireless capabilities on his implanted defibrillator. This kind of attack has not yet happened in real life, but it remains possible, as many medical devices become part of the IoT.
“Pedophile ring” DEN was founded by an abuser, his former victim, and a well-known child actor Brock Pierce, a frequent Villard subject who appeared in “The Mighty Ducks” films, was introduced to Marc Collins-Rector and Chad Shackley by “The Usual Suspects” director Bryan Singer. Collins-Rector and Shackley met in a chatroom, began dating, and moved in together when Shackley was 15 and Collins-Rector was 31. After starting an internet service provider, they recruited Pierce to form the Digital Entertainment Network, a 1998 precursor to modern streaming platforms. DEN provided original content starring child actors. Prior to the company’s planned $75 million IPO, the trio was hit with sexual abuse allegations and a lawsuit filed by a New Jersey who’d worked for Collins-Rector. With an investigation underway, they fled the U.S.; Interpol arrested them in Spain in 2002. Collins-Rector spent 18 months imprisoned prior to extradition, then plead guilty to nine counts of child sexual abuse. He was soon released, and after registering as a convicted sex offender, he ran away to London. ....DEN’s early investors included a blockbuster director and a DreamWorks SKG co-founder In “An Open Secret,” journalist John Connolly says Singer — who has continued directing for the “X-Men” franchise — and David Geffen were among DEN’s original backers, contributing a respective $50,000 and $250,000. DEN executives threw drug-fueled sleepovers for young boys at their mansion At Collins-Rector and Shackley’s palatial Encino estate, a mandatory skinny-dipping was enforced for anyone who wanted go in the hot tub after dusk. Young actors who attended parties remember troves of prescription drugs and alcohol, plus Collins-Rector’s gun collection. One man recalled when, as a minor, Collins-Rector threatened his career if he did not sleep in his bed. Although the actor refused and camped out on the couch, he nonetheless awoke in Collins-Rector’s bed, convinced that a laced drink had led to abuse. Hollywood’s Underage Sexual Abuse Problem: 5 Shocking Injustices From ‘An Open Secret’
The Encino mansion known as the M&C Estate—owned by a convicted sex offender named in the lawsuit against Bryan Singer—was home to the wild gay sex parties where Hollywood bigwigs allegedly preyed on underage boys. It was also used to film a 1998 pilot for Digital Entertainment Network described as a "gay pedophile version of Silver Spoons," starring an as yet unknown Seann William Scott. Inside the Hollywood Sex Ring Mansion From the Bryan Singer Lawsuit
Brock Pierce is a controversial figure who has received surprisingly little attention despite connections to the Clinton Foundation, digital currency Bitcoin and involvement in a notorious scandal involving a child abuse ring. Pierce’s involvement with a child abuse ring, Digital Entertainment Network and The Clinton Global initiative were first highlighted in the documentary An Open Secret, Directed by Amy Berg. As detailed in Berg’s film, Brock was a member of the Clinton Global Initiative, former child actor who appeared in films such as the 1992 classic Mighty Ducks and Disney’s “First Kid,” and Chairman of the Board at the Bitcoin Foundation. Pierce also co-founded the Digital Entertainment Network (DEN), a forerunner of video sharing site Youtube. In 2010, Pierce also was also a participant at the Mindshift Conference, which was hosted by now disgraced billionaire pedophile and child sex trafficker Jeffrey Epstein. DEN was founded in 1996 amid the rapid growth of the dot-com bubble. It raised $72 million in investment before even opening in 1999, a massive amount of capital considering that, at least on the surface, DEN was not yet providing investors with anything in return. At the time news sources scoffed at the massive salaries top executives were paid when the company was not even creating revenue. An SEC filing obtained by Hollywood periodical Radar Online reveals that DEN’s investors included a shocking number of big name personalities such as media executives Garth Ancier and David Geffen, former Yahoo CEO Terry Semel, film producers Gary Goddard and Bryan Singer, Wall Street czar Mitchell Blutt, A&M Records head Gilbert Friesen (now deceased), former Disney executive David Neuman, manager and label executive Gary Gersh, investor Jeffrey Sachs, former Congressman Michael Huffington, actors Ben and Fred Savage, and tech companies such as Microsoft and Dell. The lack of apparent revenue raises questions about what investors in DEN were expecting in return. Tech Figure In Dot-Com Child Sex Scandal Was A Clinton Global Initiative Member
Among the more frequently mentioned G+ alternatives at the Google+ Mass Migration community, and others, is MeWe with over 250 mentions. The site bills itself as "The Next-Gen Social Network" and the "anti-Facebook": "No Ads, No Political Bias, No Spyware. NO BS. It is headed by professed Libertarian CEO Mark Weinstein. As the site reveals no public user-generated content to non-members, it's necessary to create an account in order to get a full impression. I thought I'd provide an overview based on recent explorations. This report leads of with background on the company, though readers may find the report and analysis of specific groups on the site of interest.
Founder & CEO Mark Weinstein. Co-Founder & Chief Scientist, Jonathan Wolfe (no longer with company). Weinstein previously founded SuperFamily and SuperFriends, "at the turn of the millennium". Weinstein's MeWe biography lists articles published by The Mirror (UK), Huffington Post, USA Today, InfoSecurity Magazine, Dark Reading, and the Nation. His media appearances include MarketWatch, PBS, Fox News, and CNN. He's also the author of several personal-success books. His Crunchbase bio is a repeat of the MeWe content.
Sir Tim Berners-Lee: Inventor of the World Wide Web.
Jack Canfield: Legendary Founder, Chicken Soup For The Soul.
John Friedman: Founding Partner, Easton Capital.
Cullen Hoback: Director, Terms and Conditions May Apply.
Dianne Morrison: Partner, MorrisonMcNabb, LLC.
Colin Sebastian: Director, Equity Research/Internet, RW Baird.
Brett Shevack: CEO, Brand Initiatives; Former Vice Chair, BBDO.
Marci Shimoff: author, Happy for No Reason.
Sherry Turkle: Professor, MIT; author Alone Together.
Ownership & Investment
MeWe is the dba of Sgrouples, a private for-profit early-stage venture company based in Los Angeles, though with a Mountain View HQ and mailing address, 11-50 employees, with $10m in funding over five rounds, and a $20m valuation as of 2016. Sgrouples, Inc., dba MeWe Trust & Safety - Legal Policy c/o Fenwick West 801 California Street Mountain View, CA 94041 Crunchbase Profile. Founded: 2012 (source) Secured $1.2M in seed funding in 2014. 2016 valuation: $20m (source] Backers:
John Friedman, venture capitalist, founder & MD, Easton Capital, New York, NY.
Do you have friends still on Facebook? Share this link with them about Facebook wanting their banking information - tell them to move to MeWe now! No Ads. No Spyware. No Political Agenda. No Bias Algorithms. No Shadow Banning. No Facial Recognition.
MeWe provide several policy-related links on the site:
California Disclosures -- Do Not Track, 3rd-party cookies, and California Privacy Rights.
Your Identity: We protect it to the extent the law allows
Linking to Third-Party Sites: These are your decisions and responsibilities
Security: HTTPS and Encryption
Terms of Service
The ToS addresses:
Allowable Content and Acceptable Use
Who Our Services are For
User Content Ownership
Misuse of Usernames, Page names, Group names
Fake Accounts (pseudonyms allowed, misleading is not)
More on Spam
Our Commitment to Data Security
MeWe Content Data
MeWe Log Data
Your Data Portability
Deleting Your Account -- Right to Erasure
MeWe Secret Chat
MeWe Invitations and "Add Automatically"
Additional Policies for Pages, Groups, and Events Notifications of Requests for Account Information
Guidelines for Law Enforcement Seeking Customer Data (Worldwide)
Ownership In and To the Site and Services
Effective: November 6, 2018.
The FAQ addresses:
What is MeWe (emphasises privacy)
The Politics of MeWe ("absolutely no political agenda")
How can MeWe be free and make money? (additional services/freemium)
Which devices is MeWe available on? (Android, iOS)
What content can I share on MeWe (photos, videos, documents, voice messages, privacy mail, chats, gifs, memes, doodles)
What are some unique features of MeWe?
Who can see the posts I share?
Can I delete my MeWe account and is it easy to do this?
This emphasises that people are social cratures and private people by right. The service offers the power of self expression under an umbrella of safety. It notes that our innermost thoughts require privacy. Under "We aspire...":
MeWe is here to empower and enrich your world. We challenge the status quo by making privacy, respect, and safety the foundations of an innovatively designed, easy-to-use social experience.
Totalling 182 words.
Privacy Bill of Rights
A ten-item statement of principles (possibly inspired by another document, it might appear):
You own your personal information & content. It is explicitly not ours.
You will never receive a targeted advertisement or 3rd party content based on what you do or say online. We think that's creepy.
You see every post in timeline order from your friends, family & groups. We do not manipulate, filter, or change the order of your content or what you see.
Permissions & privacy are your rights. You control them.
You control who can access your content.
You control what, if anything, others can see in member searches.
Your privacy means we do not share your personal information with anyone.
Your emojis are for you and your friends. We do not monitor or mine your data.
Your face is your business. We do not use facial recognition technology.
You have the right to delete your account and take your content with you at any time.
There are a few mentions of MeWe in the press, some listed on the company's website, others via web search.
The following articles are linked directly from MeWe's Press page:
The page also lists a "Privacy Revolution Required Reading" list of 20 articles all addressing Facebook privacy gaffes in the mainstream press (Wired, TechCrunch, Fortune, Gizmodo, The Guardian, etc.). There are further self-reported mentions in several of the company's PR releases over the years.
Facebook Alternative MeWe Raises $5.2M, Los Angeles Business Journal (July 7, 2018) "The latest round, as well as MeWe’s total $10 million in fundraising, was predominantly backed by celebrity investors, such as author Marci Shimoff, Rachel Roy, and Lynda Weinman, founder of Lynda.com, which sold to Linkedin in 2015 for $1.5 billion. Jack Canfield, creator of the “Chicken Soup for the Soul” book series, also invested in MeWe."
Is building a Facebook alternative worth the effort? MeWe thinks soVentureBeat (July 5, 2018) "[T]here are still companies hoping to make their mark in the social networking realm with “Facebook alternatives.” One of those is MeWe, a “next-generation” social network that positions itself as the anti-Facebook: “Your private life is not for sale. No ads. No Spyware. No BS,” its website proclaims." Continues to mention "modest $5.2 million" funding round. Also a "sister product", MeWePRO, a Slack competitor.
Startup MeWe Launches Free, 'No Ads' Social NetworkeWeek (March 16, 2016) "MeWe, a new network engineered with its users' data privacy built in, is betting that a lot of people will say yes to both of those questions. The Mountain View, Calif.-based startup, whose parent company is Sgrouples.com, launched its freely available social network out of beta March 9 with more than 200,000 members already using it.... Sir Tim Berners-Lee, co-architect of the World Wide Web, found out about MeWe on his own and approached the company about getting involved."
Facebook Alternative MeWe closes $5.2M Series A Yahoo/PR Newswire (July 5, 2018). "The investment brings MeWe's total funding to $10 million, to support the engineering of MeWe and the enterprise version MeWePRO.... The company has relied on high net worth individuals for all of its funding including Lynda Weinman, founder of Lynda.com ...; Marci Shimoff, a #1 New York Times bestselling author ...; Rachel Roy...; and Jack Canfield."
Exactis Data Leak 2018: 340 Million Records ExposedInvestorPlace (June 29, 2018) "'Today's cookies can link your mobile phone to your laptop, to your home monitoring devices, and much, much more. Creepy? Scary? Orwellian? Yes, yes, yes,' Mark Weinstein, the privacy expert and founder of social media company MeWe, told MarketWatch. 'So imagine that Exactis, like Facebook, knows everything about you — really.'"
MeWe Raises $3M in FundingFinSMEs (March 9, 2016) "Sgrouples, Inc., the Mountain View, CA-based developer of MeWe, a social network with neither ads nor tracking, raised $3m in funding."
This section is a basic rundown of the user-visible site technology.
The site is not natively accessible from a mobile Web browser as it is overlayed with a promotion for the mobile application instead. Selecting "Desktop View" in most mobile browsers should allow browser-based access.
There are both Android and iOS apps for MeWe. I've used neither of these, though the App store entries note:
MeWe Android 4.4 rating (13.1k ratings). Permissions: Contacts (read), Location (approximate/precise), SMS (receive), Phone (read status & identity), Photos/Media/Files (read, modify, & delete contents), Storage (read, modify, or delete), Camera (take pictures/videos), Microphone (record audio), Device ID & Call Info (read status & identity), and numerous elements under Other.
Crunchbase cites 209,220 mobile downloads over the past 30 days (via Apptopia), an 80.78% monthly growth rate, from Google Play.
Either selecting "View Desktop" or navigating with a Desktop browser to https://www.mewe.com your are presented with a registration screen, with the "About", "Privacy Bill of Rights", "MeWe Challenge", and a language selector across the top of the page. Information requested are first and last name, phone or email, and a password. Pseudonymous identities are permitted, though this isn't noted on the login screen. Returning members can use the "Member Log In" button. The uMatrix Firefox extension reveals no third-party content: all page elements are served from mewe.com, img.mewe.com, cdn.mewe.com, or ws.mewe.com. (In subsequent browsing, you may find third-party plugins from, for example, YouTube, for videos, or Giphy, for animated GIFs.) The web front-end is nginx. The site uses SSL v3, issued by DigiCert Inc. to Sgrouples, Inc.
The onboarding experience is stark. There is no default content presented. A set of unidentified icons spans the top of the screen, these turn out to be Home, Chats, Groups, Pages, and Events. New users have to, somehow, find groups or people to connect with, and there's little guidance as to how to do this.
Generally there is a three panel view, with left- and right-hand sidebars of largely navigational or status information, and a central panel with main content. There are also pop-up elements for chats, an omnipresent feature of the site. Controls display labels on some devices and/or resolutions. Controls do not provide tooltips for navigational aid.
My Cloud - Seamlessly organize all your content in My Cloud; it's your personal cloud. My Cloud offers an interactive dashboard for you to control everything you’ve posted or shared - making it simple to delete or reshare.
Unique profiles - Be yourself, free from any tracking and spying. Customize your profile for every group you create or join.
Voice integration (on any or all content) - Post pictures, videos, or documents and include a voice message. Respond to a shared post or just chat. MeWe’s voice integration works for you and your contacts throughout the entire platform.
Universal tagging - This is a new, convenient way to sort and organize all the content you receive and share, making it easy to find everything, anytime.
Enhanced permission control (patent issued) - Manage permissions on a granular level and decide exactly who sees what. You can also remove yourself from the search directory, make yourself invisible to other members online, and much more.
Much More – join MeWe today and take a look inside! MeWe is the next-gen social networking experience designed for you to have fun, stay in touch, collaborate, organize, and simplify.
A key aspect of any social network is its community. Some of the available or ascertained information on this follows.
Weinstein claims a "million+ following inside MeWe.com" on Twitter. The largest visible groups appear to have a maximum of around 15,000 members , for "Awesome gifs". "Clean Comedy" rates 13,350, and the largest open political groups, 11,000+ members. This compares to Google+ which has a staggering, though Android-registrations-inflated 3.3 billion profiles, and 7.9 million communities, though the largest of these come in at under 10 million members. It's likely that MeWe's membership is on the whole more more active than Google+'s, where generally-visible posting activity was limited to just over 9% of all profiles, and the active user base was well under 1% of the total nominal population.
MeWe do not publish active users (e.g., MUA / monthly active users) statistics.
MeWe is principally a group-oriented discussion site -- interactions take place either between individuals or within group contexts. Virtually all discovery is group-oriented. The selection and dynamics of groups on the site will likely strongly affect user experience, so exploring the available groups and their characteristics is of interest. "MeWe has over 60,000 open groups" according to its FAQ. The Open groups -- visible to any registered MeWe user, though not to the general public Web -- are browsable, though sections and topics must be expanded to view the contents: an overview isn't immediately accessible. We provide a taste here. A selection of ten featured topics spans the top of the browser. As I view these, they are:
Health & Fitness
Cars & Motorcycles
Fashion and Beauty
Specific groups may appear in multiple categories. The top Groups within these topics have, variously, 15,482, 7,738, 15,482 (dupe), 7,745, 8,223, 8,220, 1,713, 9,527, 2,716, and 1,516 members. Listings scroll at length -- the Music topic has 234 Groups, ranging in size from 5 to 5,738 members, with a median of 59, mean of 311.4, and a 90%ile of 743.5. Below this is a grid of topics, 122 in all, ranging from Activism to Wellness, and including among them. A selected sample of these topics, with top groups listed members in (parens), follows:
Activism: QAnon+++ (2,572), PATRIOT PREPPERS USA (2,430), Deplorables Republic (2,48), The War Drummer (1,898), Patriots for a United America. (1894), Anonymous (1,700).
Alternative Energy: Reiki, Crystals, and alternative healing (2,114), 💜Starseeds & Empaths💜 (345), Living in Colour (365).
Alternative Lifestyle: Natural Healing and Home Remedies (3,045), Backyard Farming of All Things (2,696), WeTheSheeple (2,251).
Alumni Connections: Google Plus Refugees (271), Google+ Refugees (186), Frog Pond (156), Carlsbad NM High School alumni (57).
Animals: I Love My Dog (4,421), Pussy Shots (4,619).
Astronomy: Spherical Earth Truth, Flat Earth is Wrong (278), Nibiru, Nemesis, Hercolobus, The Destroyer (187).
Biology: Trees (344), Field of Birds (104), Patriots of Australia (51).
Personal Improvement: For Introverts. (1,214), Anarchy, Philosophy, Psychology, and Spirituality (679), Positive Affirmations (447).
Philosophy: In5d Esoteric Metaphysical and Spiritual Database (1,764), Thought Bouncing (1,137), Obtectivists - Galts Gulch - Ayn Rand fans (561).
Poetry: Dead Poest (1,407), Palacio de Poetry (451), Poets Corner (412).
Politics: Donald J. Trump 2016 - Present (11,486), The Conservative's Hangout (8,345), Qanon Follow The White Rabbit (5,600), Drain The Swamp (4,978), Libertarians (4,528), United We Stand Trump2020 (4,216).
Pop Culture: The Loftus Party (116), The Walking Dead: The Stalking Dead (100), Tyler, Texas (71).
Privacy: Join the Open/Privacy Movement (3974), Kingsport tn gun trader (1,157), Safer Computing (555).
To be clear: whilst I've not included every topic, I've sampled a majority of them above, and listed not an arbitrary selection, but the top few Groups under each topic.
Google Plus expats (1,862)
Google+ Refugees (186)
G+ Refugees (101)
my Google+ expatriates
The Google Plus expats group seems the most active of these by far.
It's curious that MeWe make a specific point in their FAQ that:
At MeWe we have absolutely no political agenda and we have a very straightforward Terms of Service. MeWe is for all law-abiding people everywhere in the world, regardless of political, ethnic, religious, sexual, and other preferences.
There are 403 political groups on MeWe. I won't list them all here, but the first 100 or so give a pretty clear idea of flavour. Again, membership is in (parentheses). Note that half the total political Groups memberships are in the first 21 groups listed here, the first 6 are 25% of the total.
Donald J. Trump 2016 - Present (11486)
The Conservative's Hangout (8345)
Qanon Follow The White Rabbit (5600)
Drain The Swamp (4978)
United We Stand Trump2020 (4216)
The Right To Self Defense (3757)
Alternative Media (3711)
Hardcore Conservative Patriots for Trump (3192)
Bastket Of Deplorables4Trump! (3032)
Return of the Republic (2509)
Infowars Chat Room Unofficial (2159)
Donald Trump Our President 2017-2025 (2033)
Berners for Progress (1963)
Sean Hannity Fans (1901)
The American Conservative (1839)
I Am The NRA (1704)
Tucker Carlson Fox News (1645)
We Love Donald Trump (1611)
MAGA - Make America Great Again (1512)
news from the front (1337)
Basket of Deplorables (1317)
Payton's Park Bench (1283)
Convention of States (1282)
Britons For Brexit (1186)
MoJo 5.0 Radio (1180)
MeWe Free Press (1119)
The Constitutionally Elite (1110)
WOMEN FOR PRESIDENT TRUMP (1032)
AMERICANS AGAINST ISIS and OTHER ENEMIES (943)
#WalkAway Campaign (894)
ALEX JONES (877)
The Lion Is Awake ! (854)
We Support Donald Trump! (810)
The Stratosphere Lounge (789)
TRUMP-USA-HANDS OFF OUR PRESIDENT (767)
Official Tea Party USA (749)
Mojo50 Jackholes (739)
Yes Scotland (697)
"WE THE DEPLORABLE" - MOVE ON SNOWFLAKE! (688)
Judge Jeanine Pirro Fans (671)
Ted Cruz for President (650)
No Lapdog Media (647)
Q Chatter (647)
Daily Brexit (636)
Tucker Carlson Fox News (601)
The Trumps Storm Group (600)
QAnon-Patriots WWG1WGA (598)
100% American (569)
Ladies For Donald Trump (566)
Deep State (560)
In the Name of Liberty (557)
Material Planet (555)
Trump NRA Free Speech Patriots on MeWe Gab.ai etc (546)
Magna Carta Group (520)
Constitutional Conservatives (506)
Question Everything (503)
Conspiracy Research (500)
Bill O'Reilly Fans (481)
Conservative Misfit's (479)
Canadian politics (478)
HARDCORE DEPLORABLES (454)
Tampa Bay Trump Club (445)
UK Politics (430)
Bongino Fan Page (429)
Radical Conservatives (429)
RESIST THE RESISTANCE (419)
The Deplorables (409)
America's Freedom Fighters (401)
Politically Incorrect & Proud (399)
CONSERVATIVES FOR AMERICA ! (385)
Political satire (383)
RISE OF THE RIGHT (371)
UK Sovereignty,Independence,Democracy -Everlasting (366)
The Patriots Voting Coalition (359)
End The Insanity (349)
Coming American Civil War! (345)
Constitutional Conservatives (343)
United Nations Watch (342)
A Revival Of The Critical Thinking Union (337)
The New Libertarian (335)
Libertarian Party (official ) (333)
DDS United (Duterte Die-hard Supporters) (332)
American Conservative Veterans (331)
America Needs Donald Trump (326)
The UKIP Debating Society (321)
Coalition For Trump (310)
FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
2nd Amendment (287)
Never Forget #SethRich (286)
Green Party Supporters 2020 (283)
It seems there is relatively little representation from the left wing, or even the centre, of the political spectrum. A case-insensitive match for "liberal" turns up:
104: Conservatives Against Liberal Beliefs C.A.L.I.B (273)
184: Progressive and Liberal Politics (119)
301: Liberalism is a Mental Disorder (33)
302: Resistance Against Liberal Socialism (33)
358: NOT For Liberals (17)
367: Drinking Liberally Houston (14)
400: Stephanie Miller's Sexy Liberal Army (6)
Mainstream political parties are little represented, though again, the balance seems skewed searching on "(democrat|republic|gop)":
391: Saving The Republic: Video News & Opinion (8)
The terms "left" and "right" provide a few matches, not all strictly political-axis aligned:
7: The Right To Self Defense (3757)
80: RISE OF THE RIGHT (371)
150: POLITICS ON THE LEFT (156)
157: 1st Amendment Rights Protected By The 2nd Amendmen (141)
209: On The Left With Jeremy Corbyn (84)
262: Eyes-Left Labour & PP - Social Media (49)
300: Gather Left (33)
385: Defend Washington State Gun Rights (9)
390: Left Coast Conservatives (8)
Socialism and Communism also warrant a few mentions:
121: Revolutionary Socialists United (204)
216: Socialist Thought (79)
220: Stories Of Communism (76)
262: Eyes-Left Labour & PP - Social Media (49)
288: Snuggly Wuggly Socialists (38)
302: Resistance Against Liberal Socialism (33)
And there are some references to green, laboulabor parties:
97: FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
100: Green Party Supporters 2020 (283)
262: Eyes-Left Labour & PP - Social Media (49)
320: Green Party of Ohio Issues & Discussion Group (29)
Whilst there may not be a political agenda, there does appear to be at least a slight political bias to the site. And a distinctive skew on many other topical subjects. Those seeking new homes online may wish to take this into account.
Various typos and tagging corrections. 2018-11-29 - 30
Added G+MM references count for MeWe to lede paragraph. 2018-12-2
If you are holding a shovel, that doesn't necessarily mean you are digging gold ;)
Ok, you may still call it "mining" but technically it's only hashing (mind the name: NiceHash). (and it may or may not be used to mine Cryptos, but in the end, it's not you who decides).
What the hell am I doing then?!?
You offer your hashing power; e.g. your GPU(s) and/or CPU(s) computing power - you are a Seller
NiceHash is a marketplace where others buy access to your hashing power - these are Buyers
Others aka Buyers are then mining Cryptocurrencies to their wallets, by using your hashing power
Deals are sold and therefore paid in BTC - from the Buyers pockets directly to your pocket
Prices are solely set by best bids from the Buyers - neither you nor NiceHash can directly affect them.
Who makes Profit, and how?
NiceHash collects fees from buyers and sellers to pay their costs and make their income.
Buyers mine Coins... on other pools to hodl (hoping for future profits), solo to win the “block lottery”, to capitalize short-term rate changes, or by applying other, more complex strategies. tl;dr: Buyers spend their BTC on NiceHash to make a profit for themselves.
Sellers (you) earn these BTC, and after covering your costs - investments in hardware, electricity, maintenance (i.e. your precious time to keep rigs running) - you hopefully made some profit also.
How is it possible everyone is making a profit?
The Cryptocurrency ecosystem attracts people; even the average Joe these days; There is lots of hype, and also lots of belief - more or less reasonable - that Cryptos are the Next Big Thing. So they put their so-called Fiat money (USD/EU…) into buying Coins and thus generate new value within them.
As long public interest rises, thus enough fresh (Fiat) money is floating in - to at least cover more than all the running costs are (hardware, electricity, wages, etc.; usually still to be paid in Fiat) - everyone within this ecosystem can make some profit over time.
Why do profits skyrocket, and will it last (and will this happen again)?
When even Fox News tells people to have some Bitcoin, because everyone can double his money within a few months only, a heavy influx of fresh (Fiat) money begins, and shortly after everyone gets completely crazy, the pie that feeds us grows - to the moon, at least ;)
But nothing is going to last forever (or even for long), nor does this; a minor nucular incident with NK, news from China about potentially disruptive regulation, less trust in the future of Crypto investments because of whatever good or bad reasons, or people just need their Fiat money back for medical bills… you name it.
The good news: If you still believe in Cryptos and hodl you can probably make more out of your past earnings - and what you earn today is going to be a past earning anytime soon ;)
The bad news: Yes, the current raw numbers (for payments per work unit) are decreasing and will continue to decrease, unfortunately; unless there is a new hype. But in the long term that is the only trend you will ever see - so better make up your numbers and act wisely.
The bottom line: Even when your profit steadily declines, it's still a profit (given you have done the math right). And there is not much you - or any other individual - can do about that anyway.
But why?!? I’m supposed to make lotsa money out of this!!!
Since Fox News told everyone about Bitcoins, there were many people having the obvious idea to make big money by mining Cryptos; at first this seems to work since it makes more slices, but from a bigger pie also, but as soon the hype train stutters, the pie stops growing or even starts to shrink again - and so do the slices for everyone who still keeps mining:
Interest hype -> Influx of Fiat money -> Coins quotes skyrocket -> Influx of miners -> Difficulty skyrockets -> Most of the price uptrend is choked within weeks, since it’s now harder to mine new blocks.
Interest hype drains out -> Fiat money influx declines -> Coins quotes halt or even fall -> Miners still hold on to their dream -> Difficulty stays up high, even rises -> Earnings decrease, maybe even sharply, as it's still harder to mine new blocks, that may be even paid less.
Earnings are hit by... a) Planned difficulty increases (like for Ethereum) b) Difficulty increase because of an ever-growing number of miners c) Lower prices of Bitcoin (the NiceHash market trade currency in which you are paid) d) Lower prices of Alt Coins (what buyers are acquiring while using your hashing power) e) And last but not least, when using NiceHash, a possibly declining number of Buyers of hashing power
Also NiceHash earnings/trends are additionally complicated by the fact, that these mechanisms affect tons of Alt Coins, in slightly different ways, and since Buyers "trade" Bitcoins against Alt Coins by using your hashing power, it may, at times, look like someone is cheating; but usually it's just convoluted market mechanics - and the plain truth that you only feel cheated on if you lose, but never when you win ;)
Be warned that this process(es) may happen slowly over several months, in just a couple of weeks, and sometimes within a few days only, and ups & downs of 10,20,30 percent (and more) are nothing unusual!
So, how to judge what’s going on with my profits?
Check the crypto economy - and don’t forget (I might now repeat myself): NiceHash is just a marketplace which runs on BTC; read below how this basically works out.
Check the mid/long term hashrate on NiceHash for your favorite algo(s) - the higher it gets, the smaller is the slice of the (payout) pie you will be able to acquire with the same equipment!
Check the news! Cryptocurrencies are a hot topic nowadays, and many people act on what is in the news; and whatever is going on will probably affect prices in either way and thus your profit.
Simple breakdown of the relationship of BTC payouts by NiceHash, BTC/ALT Coins rates, and Fiat value:
BTC quote | ALTs quotes | BTC payout | Fiat value ----------------------------------------------------- UP | UP | stable*) | UP stable | UP | UP | UP UP | stable | DOWN | stable*) stable | stable | stable | stable DOWN | stable | UP | stable*) stable | DOWN | DOWN | DOWN DOWN | DOWN | stable*) | DOWN
*) If the BTC payouts or Fiat values are really going to stay the same in these cases, or drop, or even rise, of course, depends on the exact delta of the changes between BTC and ALT.
Note: Since BTC is by far the leading Cryptocurrency, you will most probably watch ALTs drop when BTC drops quite often, but not necessarily see ALTs rise as soon BTC rises; all the Fiat (money) value they all together represent simply needs to come from somewhere, and it’s much more likely that new investments aka “fresh money” is pulled into BTC first, and trickles down to ALTs.
Some rather obvious remarks:
Many points are intentionally oversimplified - as otherwise this post would need to be at least ten times as long; the best you can do to stay ahead of the pack is to do your own research and learn about what you are doing here - ideally before doing it!
Even if NiceHash is often jokingly (more or less) called NoobHash, because it's that easy to start with, staying a Noob will pull you back, rather sooner than later, in an ultra-fast paced economy like this.
Don’t expect strangers here or elsewhere to hold your hand all the time, no matter how helpful some people still are. In the end, we all (also) compete against each other ;)
Keep yourself well informed to avoid nasty surprises!
Disclaimer: I'm a user - Seller like you - not in any way associated with NiceHash; this is my personal view & conclusion about some more or less obvious basics in Crypto mining and particularly using NiceHash. Comments & critics welcome...
I wrote a 30,000 ft. "executive summary" intro document for cryptos. Not for you, for your non-technical parents or friends.
This document was originally written for my dad, an intelligent guy who was utterly baffled about the cryptocurrency world. The aim was to be extremely concise, giving a broad overview of the industry and some popular coins while staying non-technical. For many of you there will be nothing new here, but recognize that you are in the 0.001% of the population heavily into crypto technology. I've reproduced it for Reddit below, or you can find the original post here on my website. Download the PDF there or hit the direct link: .PDF version. Donations happily accepted:
This document is purely informational. At the time of writing there are over 1000 cryptocurrencies (“cryptos”) in a highly volatile, high risk market. Many of the smaller “altcoins” require significant technical knowledge to store and transact safely. I advise you to carefully scrutinize each crypto’s flavor of blockchain, potential utility, team of developers, and guiding philosophy, before making any investment  decisions. With that out of the way, what follows are brief, extremely high-level summaries of some cryptos which have my interest, listed in current market cap order. But first, some info: Each crypto is a different implementation of a blockchain network. Originally developed as decentralized digital cash, these technologies have evolved into much broader platforms, powering the future of decentralized applications across every industry in the global economy. Without getting into the weeds,  most cryptos work on similar principles: Distributed Ledgers Each node on a blockchain network has a copy of every transaction, which enables a network of trust that eliminates fraud.  Decentralized “Miners” comprise the infrastructure of a blockchain network.  They are monetarily incentivized to add computing power to the network, simultaneously securing and processing each transaction.  Peer-to-peer Cryptos act like digital cash-- they require no third party to transact and are relatively untraceable. Unlike cash, you can back them up. Global Transactions are processed cheaply and instantly, anywhere on Earth. Using cryptos, an African peasant and a San Francisco engineer have the same access to capital, markets, and network services. Secure Blockchains are predicated on the same cryptographic technology that secures your sensitive data and government secrets. They have passed seven years of real-world penetration testing with no failures. 
The first cryptocurrency. As with first movers in any technology, there are associated pros and cons. Bitcoin has by far the strongest brand recognition and deepest market penetration, and it is the only crypto which can be used directly as a currency at over 100,000 physical and web stores around the world. In Venezuela and Zimbabwe, where geopolitical events have created hyperinflation in the centralized fiat currency, citizens have moved to Bitcoin as a de facto transaction standard.  However, Bitcoin unveiled a number of issues that have been solved by subsequent cryptos. It is experiencing significant scaling issues, resulting in high fees and long confirmation times. The argument over potential solutions created a rift in the Bitcoin developer community, who “forked” the network into two separate blockchains amidst drama and politicking in October 2017. Potential solutions to these issues abound, with some already in place, and others nearing deployment. Bitcoin currently has the highest market cap, and since it is easy to buy with fiat currency, the price of many smaller cryptos (“altcoins”) are loosely pegged to its price. This will change in the coming year(s).
Where Bitcoin is a currency, Ethereum is a platform, designed as a foundational protocol on which to develop decentralized applications (“Dapps”). Anyone can write code and deploy their program on the global network for extremely low fees. Just like Twitter wouldn’t exist without the open platform of the internet, the next world-changing Dapp can’t exist without Ethereum. CurrentDapps include a global market for idle computing power and storage, peer-to-peer real estate transactions (no trusted third party for escrow), identity networks for governments and corporations (think digital Social Security card), and monetization strategies for the internet which replace advertising. Think back 10 years to the advent of smartphones, and then to our culture today-- Ethereum could have a similar network effect on humanity. Ethereum is currently the #2 market cap crypto below Bitcoin, and many believe it will surpass it in 2018. It has a large, active group of developers working to solve scaling issues,  maintain security, and create entirely new programming conventions. If successful, platforms like Ethereum may well be the foundation of the decentralized internet of the future.
Ripple is significantly more centralized than most crypto networks, designed as a backbone for the global banking and financial technology (“fintech”) industries. It is a network for exchanging between fiat currencies and other asset classes instantly and cheaply, especially when transacting cross-border and between separate institutions. It uses large banks and remittance companies as “anchors” to allow trading between any asset on the network, and big names like Bank of America, American Express, RBC, and UBS are partners. The utility of this network is global and massive in scale. It is extremely important to note that not all cryptos have the same number of tokens. Ripple has 100 Billion tokens compared to Bitcoin’s 21 Million. Do not directly compare price between cryptos. XRP will likely never reach $1k,  but the price will rise commensurate with its utility as a financial tool. In some sense, Ripple is anathema to the original philosophical vision of this technology space. And while I agree with the cyberpunk notion of decentralized currencies, separation of money and state, this is the natural progression of the crypto world. The internet was an incredible decentralized wild west of Usenet groups and listservs before Eternal September and the dot-com boom, but its maturation affected every part of global society.
Cardano’s main claim to fame: it is the only crypto developed using academic methodologies by a global collective of engineers and researchers, built on a foundation of industry-leading, peer-reviewed cryptographic research. The network was designed from first-principles to allow scalability, system upgrades, and to balance the privacy of its users with the security needs of regulators. One part of this ecosystem is the Cardano Foundation, a Swiss non-profit founded to work proactively with governments and regulatory bodies to institute legal frameworks around the crypto industry. Detractors of Cardano claim that it doesn’t do anything innovative, but supporters see the academic backing and focus on regulation development as uniquely valuable.
Stellar Lumens (XLM)
Stellar Lumens and Ripple were founded by the same person. They initially shared the same code, but today the two are distinct in their technical back-end as well as their guiding philosophy and development goals. Ripple is closed-source, for-profit, deflationary, and intended for use by large financial institutions. Stellar is open-source, non-profit, inflationary, and intended to promote international wealth distribution. As such, they are not direct competitors. IBM is a major partner to Stellar. Their network is already processing live transactions in 12 currency corridors across the South Pacific, with plans to process 60% of all cross-border payments in the South Pacific’s retail foreign exchange corridor by Q2 2018. Beyond its utility as a financial tool, the Stellar network may become a competitor to Ethereum as a platform for application development and Initial Coin Offerings (“ICOs”). The theoretical maximum throughput for the network is higher, and it takes less computational power to run. The Stellar development team is highly active, has written extensive documentation for third-party developers, and has an impressive list of advisors, including Patrick Collison (Stripe), Sam Altman (Y Combinator), and other giants in the software development community.
Iota was developed as the infrastructure backbone for the Internet of Things (IoT), sometimes called the machine economy. As the world of inanimate objects is networked together, their need to communicate grows exponentially. Fridges, thermostats, self-driving cars, printers, planes, and industrial sensors all need a secure protocol with which to transact information. Iota uses a “Tangle” instead of a traditional blockchain, and this is the main innovation driving the crypto’s value. Each device that sends a transaction confirms two other transactions in the Tanlge. This removes the need for miners, and enables unique features like zero fees and infinite scalability. The supply of tokens is fixed forever at 2.8*1015, a staggeringly large number (almost three thousand trillion), and the price you see reported is technically “MIOT”, or the price for a million tokens.
The most successful privacy-focused cryptocurrency. In Bitcoin and most other cryptos, anyone can examine the public ledger and trace specific coins through the network. If your identity can be attached to a public address on that network, an accurate picture of your transaction history can be built-- who, what, and when. Monero builds anonymity into the system using strong cryptographic principles, which makes it functionally impossible to trace coins,  attach names to wallets, or extract metadata from transactions. The development team actively publishes in the cryptography research community. Anonymous transactions are not new-- we call it cash. Only in the past two decades has anonymity grown scarce in the first-world with the rise of credit cards and ubiquitous digital records. Personal data is becoming the most valuable resource on Earth, and there are many legitimate reasons for law-abiding citizens to want digital privacy, but it is true that with anonymity comes bad actors-- Monero is the currency of choice for the majority of black market (“darknet”) transactions. Similarly, US Dollars are the main vehicle for the $320B annual drug trade. An investment here should be based on the underlying cryptographic research and technology behind this coin, as well as competitors like Zcash. 
Zero fees and instantaneous transfer make RaiBlocks extremely attractive for exchange of value, in many senses outperforming Bitcoin at its original intended purpose. This crypto has seen an explosion in price and exposure over the past month, and it may become the network of choice for transferring value within and between crypto exchanges. Just in the first week of 2018: the CEO of Ledger (makers of the most popular hardware wallet on the market) waived the $50k code review fee to get RaiBlocks on his product, and XRB got listed on Binance and Kucoin, two of the largest altcoin exchanges globally. This is one to watch for 2018. 
Developed as a single answer to the problem of supply-chain logistics, VeChain is knocking on the door of a fast-growing $8 trillion industry. Every shipping container and packaged product in the world requires constant tracking and verification. A smart economy for logistics built on the blockchain promises greater efficiency and lower cost through the entire process flow. Don’t take my word for it-- VeChain has investment from PwC (5th largest US corporation), Groupe Renault, Kuehne & Nagel (world’s largest freight company), and DIG (China’s largest wine importer). The Chinese government has mandated VeChain to serve as blockchain technology partner to the city of Gui’an, a special economic zone and testbed for China’s smart city of the future. This crypto has some of the strongest commercial partnerships in the industry, and a large active development team.
“Investment” is a misnomer. Cryptos are traded like securities, but grant you no equity (like trading currency).
It is impossible to double-spend or create a fake transaction, as each ledger is confirmed against every other ledger.
Some utility token blockchains use DAG networks or similar non-linear networks which don’t require mining.
In practice, these are giant warehouses full of specialized computers constantly processing transactions. Miners locate to the cheapest electricity source, and the bulk of mining currently occurs in China.
Centralized second-layer exchange websites have been hacked, but the core technology is untouched.
Deep Web Drugs Sites - Do you want to buy legal or illegal drugs on the deep web without prescription and looking trusted darknet drugs market links then I have good collection of onion links where you can find all categories drugs information, these deep web drugs store only received payment via bitcoins The Chainalysis report reveals that Hydra has created a “complex drug delivery system” inside Russia and various countries in Europe as well. UPDATE: Wir haben jetzt noch eine weitere Liste mit 10 legalen Darknet-Seiten. UPDATE: Hier gibt es vier Darknet-Suchmaschinen im Vergleich. UPDATE: Wenn Ihr wissen wollt, wie Ihr eine eigene Seite ins Darknet stellen könnt, schaut in unsere Anleitung – das kann wirklich jeder! 1. Darknet-Suche im Normalo-Web. Darknet-Seiten haben keine der üblichen Domains wie DE, COM oder ORG, sondern ... Erowid is a non-profit educational & harm-reduction resource with 60 thousand pages of online information about psychoactive drugs, plants, chemicals, and technologies including entheogens, psychedelics, new psychoactive substances, research chemicals, stimulants, depressants and pharmaceuticals. This includes traditional, spiritual, and responsible use, info on health, effects, experiences ... From Bitcoin Wiki. Jump to: navigation, search. Bitcoin currency exchanges work in a manner similar to banks. One first deposits amounts of money in the currencies supported by the exchange, to his own account in the exchange, uses these balances to trade with other users of the exchange and then withdraws that money. Unlike over-the-counter transactions, there is no risk of losing money due ...
Ano ang BITCOIN for Beginners (tagalog) Bitcoin Basics ...
Onecoin promised the world, but only proved to be a trail of destruction. --- About ColdFusion --- ColdFusion is an Australian based online media company ind... This video was only made for an educational purpose, so please do not misuse and take action at own risk and responsibility! Thank You* ONION LINK : cash365ndbtwp7zn .onion Don't forget to add ... ano ang Bitcoin ...Mga kelangan malaman kung bakit kelangan natin pasukin ang cryptocurrency.sa susunod na gagawin ko na mga video ay magtuturo ako ng mga techn... DOM is a psychedelic that also has strong stimulant qualities. It has a fairly short history of use, though it was used for a little while in California decades ago. It's an amphetamine and it was ... https://shiftdelete.net/bitcoin-nasil-alinir-altcoin-satin-alma Bitcoin nasıl alınır diye merak ediyorsanız, hem BTC hem de altcoinlerin nasıl alınabildiğini...