Erowid

The Market Place - An Anonymous Market Built To Enable Trustless Transactions.

The Marketplace, the secure anonymous marketplace built to enable safe trustless transactions.
[link]

___

Welcome to "the Omni-Market!" We strive to bring you the most reliable source of news, updates, and discussion of the Darknet scene.
[link]

My darkweb experience

As you can expect from the title, this how my first experience on the dark web went. I'm writing this as a warning to all of you who have interest going on there. I know this may just encourage more of you on there, but please just know that what I'm telling you has given me nightmares for days now. Just read this and learn from my wisdom. Thinking you can handle what is out there isn't the same as actually handling it.
I had always been interested in the dark web. However, I never owned a personal computer growing up, and the college I went to had strict internet monitoring/filtering, so I never risked making an incursion. Well I went home due to the coronavirus outbreak, and decided it was time to figure out what all the fuss was about.
So I did some research, and decided to install Tails as a VM and browse from their, hopefully protecting my computer from any malicious attacks. I pull up a tor browser and hop on the hidden-wiki. For the most part, most of the links timed out, most likely they were taken down for one reason or another. Then I found more links to updated "hiden-wikis."
These must've been updated more recently as several more of the links worked. Nothing crazy. Some deepweb porn (honestly the clearnet stuff is better), sites selling drugs, IDs, bitcoin, etc. The occasional conspiracy site. "Red Rooms" that looked like a 10 year old taking an HTML course made, most likely scams.
It was near the bottom of this hidden-wiki page that I found an interesting cite. I forget the name, but the description said "link paste." If you ever find the wiki page, a quick ctrl-f will find it for you. It was a pretty simple website. Basically it was an online forum, actually similar to reddit. However it appeared it was primarily used for posting newfound links and offering various services - hacking, drugs, prostitution. Some darker stuff too, linking/selling child porn and pay to view webcams of blackmailed teens. I stayed away from those.
One of the links caught my eye for some reason. "Get revenge on my girlfriend!" Normally posts like these linked the girlfriends nudes or whatever, but not this one. The OP gave a ton of her info, saying she cheated. Her drivers licence, pictures, email, address. I couldn't read all of it because apparently the girl was chinese.
At first the comments were actually quite wholesome and I laughed, people telling him that she wasn't worth it and he could do way better. "Don't worry about her, king, you can do so much better" and whatnot. Surprisingly wholesome actually. I guess even on the darkweb we're all still bros. But as I scrolled down, one of the comments posted a link, captioned "got revenge."
I, being an idiot, opened it. It redirected me to what looked like a downgraded youtube video. I clicked play. The video started off in what looked like somebody's unfinished basement. The camera panned, around to a hooded woman tied up in a chair, naked. The floor was covered by a tarp. I had a sinking feeling of where this was going. I should've closed the link, deleted the VM, and never looked back. But my curiosity got the better of me. A man walks in from the edge. He's shirtless, revealing a hairy beer gut, but hes wearing what looks like a gimp mask (the footage was kinda grainy so I'm not totally sure). I see he's holding a hacksaw. I should've closed that browser then and their, but I sat, paralyzed by fear of what I knew I was about to see. He took the hood off of the woman, revealing what looked like the woman in the photos above. Her hair was disheveled and her makeup was smeared across her face crying. She looked around frantically, trying to make out her surroundings.
The man started with her arm. Still tied to the chair, he began hacking away at her shoulder as she screamed and squirmed. I could hear the sound of the saw, tearing at her bone. It makes me sick just to think about. The tarp pooled with blood.
I don't really want to describe in any more detail what happened next. Needless to say, the rest of her limbs were removed, and her corpse was strewn across the floor, matted with blood. The camera came in close to her face, as if to verify it was the girl.
No longer paralyzed, I immediately closed the browser, horrified by what I had just seen. However, there was a new window open, like one of those popup boxes. On it was simply a series of numbers. An IP address. And below it, the text, "We know who you are."
I quickly opened a terminal, and typed in 'ipconfig,' displaying my IP address. It was a match.
I stared for a minute in terror. Did they know who I was? Where I am? I sprung into action. I powered off the Virtual Machine, deleted it from VMware. I then immediately deleted the disk image file it came in and emptied the recycle bin. I restarted my computer. There didn't seem to be any sign of any malware, so I shut it down, and went to bed, falling into a restless dream.
I haven't really slept since then. I keep seeing what I saw in my nightmares. I'm still scared that somehow they'll find me. I sleep with a gun now. Every noise at night wakes me up in terror. I'm writing this to all of you would be deep web delvers. This isn't going to stop most of you, but at the least I can warn you. Be careful. Try to stay to the safer sites. Don't just click random links. There's some cool stuff out there. But whatever you see is with you forever. I'm probably not ever going back there. Theres nothing on there worth what I've been through.
submitted by Nordic_Shadow to Scary [link] [comments]

Mockingbird X.0

Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web.
https://i.imgur.com/Elnci0M.png
In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real.
https://i.imgur.com/121LXqy.png
If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today?
https://i.imgur.com/jQFVYew.png
https://i.imgur.com/ZKMYGJj.png
In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media.
https://i.imgur.com/IbjDOkI.png
https://i.imgur.com/NH86ozU.png
The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal.
https://i.imgur.com/OAd4vpf.png
But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction.
https://i.imgur.com/6OEWYFN.png
https://i.imgur.com/iG4sdD4.png
https://i.imgur.com/e89Rx6B.png
https://i.imgur.com/uotm9Cg.png
https://i.imgur.com/74wt9tD.png
In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc.
https://i.imgur.com/zlpBh3c.png
https://i.imgur.com/e5ZvFFJ.png
Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects.
https://i.imgur.com/3OlrX7G.png
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors.
Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough.
Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014.
In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal.
In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of Jet.com, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to Chewy.com in PetSmart’s $3.35 billion purchase of the online retailer.
Allen & Co throws the Sun Valley Conference every year where you get a glimpse of who sows up. Harvey Weinstein, though a past visitor, was not invited last year.
https://en.wikipedia.org/wiki/Allen_%26_Company_Sun_Valley_Conference
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
https://i.imgur.com/VZ0OtFa.png
George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated.
https://i.imgur.com/mA3MzTB.png
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not."
"Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
https://i.imgur.com/YHMJnnP.png
Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company.
https://i.imgur.com/JnGHqOS.png
We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips.
The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum.
https://i.imgur.com/vZC4D29.png
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol36no3/html/v36i3a05p_0001.htm
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
http://www.nbcnews.com/id/3340677/t/cia-operatives-shadowy-war-force/
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
Scientology as a CIA Political Action Group – “It is a continuing arrangement…”: https://mikemcclaughry.wordpress.com/2015/08/25/scientology-as-a-cia-political-action-group-it-is-a-continuing-arrangement/
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology: https://i.imgur.com/acu2Eti.png
When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message.
https://i.imgur.com/tU4MD4S.png
The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.'
Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences.
Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
With cash from Jeffrey Katzenberg, The Young Turks looks to grow paid subscribers:
https://digiday.com/media/with-cash-from-katzenberg-the-young-turks-look-to-grow-paid-subscribers/
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, E.ventures and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
How Hollywood's Political Donors Are Changing Strategies for the Trump Era:
https://www.hollywoodreporter.com/features/hollywood-political-donors-are-changing-strategy-post-trump-1150545
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Soros Group Buys Viacom's DreamWorks Film Library:
https://www.forbes.com/2006/03/17/soros-viacom-dreamworks-cx_gl_0317autofacescan11.html#541a895f1f22
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company.
Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
The money you spend on media and junk food and in taxes goes to these groups who then decide how best to market at you so that they decide how you vote by creating a fake consensus to trick into thinking that you want something other than what is best for you; but will inevitably result in more money being funneled to the top, creating further separation between the super rich and the average person. The goal will be to assert creeping authoritarianism by generating outrage against policies and issues they hate. Part of manipulating your basic assumptions is also to use schadenfreude (think canned laughter on TV) against characters who support the cause that might actually do you the most good (which reaffirms and strengthens your confirmation biased along predetermined political lines).
https://i.imgur.com/PW1cRtj.png
We have a population being taught to hate socialism and love capitalism when the truth is no country is practicing either. These terms are merely disguises for political oligarchies where the collection of wealth is less about getting themselves rich and more about keeping everyone else poor.
What can you guess about the world around you if it turned out that every consensus that was forced on you was fake?
How much money would it take to make it look like 51% of the Internet believed in completely idiotic ideas? Combine shill operations with automation and AI’s, and the cost becomes a good investment relative to the return when measured in political power.
Even the people who are well intentioned and very vocal do not have to consciously be aware that they are working for a political action group. A covert political group will always prefer an unwitting tool to help push their agenda, so that they can remain in the shadows.
FDA Admonishes Drug Maker Over Kim Kardashian Instagram Endorsement https://www.forbes.com/sites/davidkroll/2015/08/11/fda-spanks-drug-maker-over-kim-kardashian-instagram-endorsement/#25174a29587b
The OSS files offer details about other agents than famous chef, Julia Child; including Supreme Court Justice Arthur Goldberg, major league catcher Moe Berg, historian Arthur Schlesinger Jr., and actor Sterling Hayden. http://www.nbcnews.com/id/26186498/ns/us_news-security/t/julia-child-cooked-double-life-spy/
USA Today: Businesses and organizations may refer to it as a tool for competitive advantage and marketing; but make no mistake http://archive.is/37tK3
Shareblue accounts caught in /politics posting links to Shareblue without disclosing their affiliation http://archive.is/7HAkr
Psy Group developed elaborate information operations for commercial clients and political candidates around the world http://archive.is/BBblQ
Top mod of /Mechanical_Gifs tries to sell subreddit on ebay for 999.00 dollars. http://archive.is/kU1Ly
Shill posts picture of a dog in a hammock with the brand clearly visible without indicating that it's an ad in the title of the post http://archive.is/Mfdk9
Arstechnica: GCHQs menu of tools spreads disinformation across Internet- “Effects capabilities” allow analysts to twist truth subtly or spam relentlessly. http://arstechnica.com/security/2014/07/ghcqs-chinese-menu-of-tools-spread-disinformation-across-internet/
Samsung Electronics Fined for Fake Online Comments http://bits.blogs.nytimes.com/2013/10/24/samsung-electronics-fined-for-fake-online-comments/?_r=0
Discover Magazine: Researchers Uncover Twitter Bot Army That’s 350 http://blogs.discovermagazine.com/d-brief/2017/01/20/twitter-bot-army/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A%20DiscoverTechnology%20%28Discover%20Technology%29#.WIMl-oiLTnA
Times of Israel - The internet: Israel’s new PR battlefield http://blogs.timesofisrael.com/the-rise-of-digital-diplomacy-could-be-changing-israels-media-image/
Time: Social Media Manipulation? When “Indie” Bloggers and Businesses Get Cozy http://business.time.com/2013/04/22/social-media-manipulation-when-indie-bloggers-and-businesses-get-cozy/
Content-Driven Detection of Campaigns in Social Media [PDF] http://faculty.cs.tamu.edu/caverlee/pubs/lee11cikm.pdf
the law preventing them from using this in America was repealed http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/
Redditor who works for a potato mailing company admits to being a shill. He shows off his 27 thousand dollars he made in /pics
http://i.imgur.com/CcTHwdS.png
Screenshot of post since it was removed. http://i.imgur.com/k9g0WF8.png
Just thought I'd contribute to this thread http://imgur.com/OpSos4u
CNN: A PR firm has revealed that it is behind two blogs that previously appeared to be created by independent supporters of Wal-Mart. The blogs Working Families for Wal-mart and subsidiary site Paid Critics are written by 3 employees of PR firm Edelman http://money.cnn.com/2006/10/20/news/companies/walmart_blogs/index.htm
Vice: Your Government Wants to Militarize Social Media to Influence Your Beliefs http://motherboard.vice.com/read/your-government-wants-to-militarize-social-media-to-influence-your-beliefs
BBC News: China's Internet spin doctors http://news.bbc.co.uk/2/hi/7783640.stm
BBC News: US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
Wall Street Journal: Turkey's Government Forms 6 http://online.wsj.com/news/articles/SB10001424127887323527004579079151479634742?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424127887323527004579079151479634742.html
Fake product reviews may be pervasive http://phys.org/news/2013-07-fake-product-pervasive.html#nRlv
USA Today: The co-owner of a major Pentagon propaganda contractor publicly admitted that he was behind a series of websites used in an attempt to discredit two USA TODAY journalists who had reported on the contractor. http://usatoday30.usatoday.com/news/military/story/2012-05-24/Leonie-usa-today-propaganda-pentagon/55190450/1
ADWEEK: Marketing on Reddit Is Scary http://www.adweek.com/news/technology/marketing-reddit-scary-these-success-stories-show-big-potential-168278
BBC- How online chatbots are already tricking you- Intelligent machines that can pass for humans have long been dreamed of http://www.bbc.com/future/story/20140609-how-online-bots-are-tricking-you
BBC news: Amazon targets 1 http://www.bbc.com/news/technology-34565631
BBC: More than four times as many tweets were made by automated accounts in favour of Donald Trump around the first US presidential debate as by those backing Hillary Clinton http://www.bbc.com/news/technology-37684418
Fake five-star reviews being bought and sold online - Fake online reviews are being openly traded on the internet
http://www.bbc.com/news/technology-43907695
http://www.bbc.com/news/world-asia-20982985
http://www.bbc.com/news/world-asia-20982985
Bloomberg: How to Hack an Election [and influence voters with fake social media accounts] http://www.bloomberg.com/features/2016-how-to-hack-an-election/
"Internet Reputation Management http://www.bloomberg.com/news/articles/2008-04-30/do-reputation-management-services-work-businessweek-business-news-stock-market-and-financial-advice
Buzzfeed: Documents Show How Russia’s Troll Army Hit America http://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america#.ki8Mz97ly
The Rise of Social Bots http://www.cacm.acm.org/magazines/2016/7/204021-the-rise-of-social-bots/fulltext
CBC News- Canadian government monitors online forums http://www.cbc.ca/news/canada/bureaucrats-monitor-online-forums-1.906351
Chicago Tribune: Nutrition for sale: How Kellogg worked with 'independent experts' to tout cereal http://www.chicagotribune.com/business/ct-kellogg-independent-experts-cereal-20161121-story.html
DailyKos: HBGary: Automated social media management http://www.dailykos.com/story/2011/02/16/945768/-UPDATED-The-HB-Gary-Email-That-Should-Concern-Us-All
Meme Warfare Center http://www.dtic.mil/dtic/tfulltext/u2/a507172.pdf
Shilling on Reddit is openly admitted to in this Forbes article http://www.forbes.com/sites/julesschroede2016/03/10/the-magic-formula-behind-going-viral-on-reddit/#1d2485b05271
Forbes: From Tinder Bots To 'Cuban Twitter' http://www.forbes.com/sites/kashmirhill/2014/04/17/from-tinder-bots-to-covert-social-networks-welcome-to-cognitive-hacking/#4b78e2d92a7d
Hivemind http://www.hivemind.cc/rank/shills
Huffington Post- Exposing Cyber Shills and Social Media's Underworld http://www.huffingtonpost.com/sam-fiorella/cyber-shills_b_2803801.html
The Independent: Massive British PR firm caught on video: "We've got all sorts of dark arts...The ambition is to drown that negative content and make sure that you have positive content online." They discuss techniques for managing reputations online and creating/maintaining 3rd-party blogs that seem independent. http://www.independent.co.uk/news/uk/politics/caught-on-camera-top-lobbyists-boasting-how-they-influence-the-pm-6272760.html
New York Times: Lifestyle Lift http://www.nytimes.com/2009/07/15/technology/internet/15lift.html?_r=1&emc=eta1
New York Times: Give Yourself 5 Stars? Online http://www.nytimes.com/2013/09/23/technology/give-yourself-4-stars-online-it-might-cost-you.html?src=me&ref=general
NY Times- From a nondescript office building in St. Petersburg http://www.nytimes.com/2015/06/07/magazine/the-agency.html?_r=1
NY Times: Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation http://www.nytimes.com/2016/05/31/world/europe/russia-finland-nato-trolls.html?_r=1
PBS Frontline Documentary - Generation Like http://www.pbs.org/wgbh/frontline/film/generation-like/
Gamers promote gaming-gambling site on youtube by pretending to hit jackpot without disclosing that they own the site. They tried to retroactively write a disclosure covering their tracks http://www.pcgamer.com/csgo-lotto-investigation-uncovers-colossal-conflict-of-interest/
Raw Story: CENTCOM engages bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
Raw Story: Air Force ordered software to manage army of fake virtual people http://www.rawstory.com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/
Redective http://www.redective.com/?r=e&a=search&s=subreddit&t=redective&q=shills
Salon: Why Reddit moderators are censoring Glenn Greenwald’s latest news story on shills http://www.salon.com/2014/02/28/why_reddit_moderators_are_censoring_glenn_greenwalds_latest_bombshell_partne
The Atlantic: Kim Kardashian was paid to post a selfie on Instagram and Twitter advertising a pharmaceutical product. Sent to 42 million followers on Instagram and 32 million on Twitter http://www.theatlantic.com/health/archive/2015/09/fda-drug-promotion-social-media/404563/
WAR.COM: THE INTERNET AND PSYCHOLOGICAL OPERATIONS http://www.theblackvault.com/documents/ADA389269.pdf
The Guardian: Internet Astroturfing http://www.theguardian.com/commentisfree/libertycentral/2010/dec/13/astroturf-libertarians-internet-democracy
The Guardian: Israel ups the stakes in the propaganda war http://www.theguardian.com/media/2006/nov/20/mondaymediasection.israel
Operation Earnest Voice http://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks
The Guardian: British army creates team of Facebook warriors http://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-77th-brigade
The Guardian: US military studied how to influence Twitter [and Reddit] users in Darpa-funded research [2014] http://www.theguardian.com/world/2014/jul/08/darpa-social-networks-research-twitter-influence-studies
The Guardian: Chinese officials flood the Chinese internet with positive social media posts to distract their population http://www.theguardian.com/world/2016/may/20/chinese-officials-create-488m-social-media-posts-a-year-study-finds
Times of Israel: Israeli government paying bilingual students to spread propaganda online primarily to international communities without having to identify themselves as working for the government. "The [student] union will operate computer rooms for the project...it was decided to establish a permanent structure of activity on the Internet through the students at academic institutions in the country." http://www.timesofisrael.com/pmo-stealthily-recruiting-students-for-online-advocacy/
USA Today: Lord & Taylor settles FTC charges over paid Instagram posts http://www.usatoday.com/story/money/2016/03/15/lord--taylor-settles-ftc-charges-over-paid-instagram-posts/81801972/
Researcher's algorithm weeds out people using multiple online accounts to spread propaganda - Based on word choice http://www.utsa.edu/today/2016/10/astroturfing.html
http://www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html
Wired: Powered by rapid advances in artificial intelligence http://www.wired.co.uk/magazine/archive/2015/06/wired-world-2015/robot-propaganda
Wired: Clinton Staff and Volunteers Busted for Astroturfing [in 2007] http://www.wired.com/2007/12/clinton-staff-a/
Wired: Pro-Government Twitter Bots Try to Hush Mexican Activists http://www.wired.com/2015/08/pro-government-twitter-bots-try-hush-mexican-activists/
Wired: Microsoft http://www.wired.com/2015/09/ftc-machinima-microsoft-youtube/
Wired: Military Report: Secretly ‘Recruit or Hire Bloggers’ http://www.wired.com/dangerroom/2008/03/report-recruit/
Wired: Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/dangerroom/2009/01/usaf-blog-respo/
Reddit Secrets https://archive.fo/NAwBx
Reddit Secrets https://archive.fo/SCWN7
Boostupvotes.com https://archive.fo/WdbYQ
"Once we isolate key people https://archive.is/PoUMo
GCHQ has their own internet shilling program https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group
Russia https://en.wikipedia.org/wiki/State-sponsored_Internet_sockpuppetry
US also operates in conjunction with the UK to collect and share intelligence data https://en.wikipedia.org/wiki/UKUSA_Agreement
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
Glenn Greenwald: Hacking Online Polls and Other Ways British Spies Seek to Control the Internet https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-british-spies-seek-control-internet/
Here is a direct link to your image for the benefit of mobile users https://imgur.com/OpSos4u.jpg
Reddit for iPhone https://itunes.apple.com/us/app/reddit-the-official-app/id1064216828?mt=8
Why Satoshi Nakamoto Has Gone https://medium.com/@ducktatosatoshi-nakamoto-has-gone-4cef923d7acd
What I learned selling my Reddit accounts https://medium.com/@Rob79/what-i-learned-selling-my-reddit-accounts-c5e9f6348005#.u5zt0mti3
Artificial intelligence chatbots will overwhelm human speech online; the rise of MADCOMs https://medium.com/artificial-intelligence-policy-laws-and-ethics/artificial-intelligence-chatbots-will-overwhelm-human-speech-online-the-rise-of-madcoms-e007818f31a1
How Reddit Got Huge: Tons of Fake Accounts - According to Reddit cofounder Steve Huffman https://motherboard.vice.com/en_us/article/how-reddit-got-huge-tons-of-fake-accounts--2
Whistleblower and subsequent investigation: Paid trolls on /Bitcoin https://np.reddit.com/Bitcoin/comments/34m7yn/professional_bitcoin_trolls_exist/cqwjdlw
Confession of Hillary Shill from /SandersForPresident https://np.reddit.com/conspiracy/comments/3rncq9/confession_of_hillary_shill_from/
Why do I exist? https://np.reddit.com/DirectImageLinkerBot/wiki/index
Already a direct link? https://np.reddit.com/DirectImageLinkerBot/wiki/res_links
Here's the thread. https://np.reddit.com/HailCorporate/comments/3gl8zi/that_potato_mailing_company_is_at_it_again/
/netsec talks about gaming reddit via sockpuppets and how online discourse is (easily) manipulated. https://np.reddit.com/netsec/comments/38wl43/we_used_sock_puppets_in_rnetsec_last_year_and_are
Redditor comes clean about being paid to chat on Reddit. They work to promote a politician https://np.reddit.com/offmychest/comments/3gk56y/i_get_paid_to_chat_on_reddit/
Shill whistleblower https://np.reddit.com/politics/comments/rtr6b/a_very_interesting_insight_into_how_certain/
Russian bots were active on Reddit last year https://np.reddit.com/RussiaLago/comments/76cq4d/exclusive_we_can_now_definitively_state_that/?st=j8s7535j&sh=36805d5d
The Bush and Gore campaigns of 2000 used methods similar to the Chinese government for conducting “guided discussions” in chatrooms designed to influence citizens https://np.reddit.com/shills/comments/3xhoq8/til_the_advent_of_social_media_offers_new_routes/?st=j0o5xr9c&sh=3662f0dc
source paper. https://np.reddit.com/shills/comments/4d3l3s/government_agents_and_their_allies_might_ente
or Click Here. https://np.reddit.com/shills/comments/4kdq7n/astroturfing_information_megathread_revision_8/?st=iwlbcoon&sh=9e44591e Alleged paid shill leaks details of organization and actions.
https://np.reddit.com/shills/comments/4wl19alleged_paid_shill_leaks_details_of_organization/?st=irktcssh&sh=8713f4be
Shill Confessions and Additional Information https://np.reddit.com/shills/comments/5pzcnx/shill_confessions_and_additional_information/?st=izz0ga8r&sh=43621acd
Corporate and governmental manipulation of Wikipedia articles https://np.reddit.com/shills/comments/5sb7pi/new_york_times_corporate_editing_of_wikipedia/?st=iyteny9b&sh=b488263f
Ex -MMA fighter and ex-police officer exposes corrupt police practices https://np.reddit.com/shills/comments/6jn27s/ex_mma_fighter_and_expolice_officer_exposes/
User pushes InfoWars links on Reddit https://np.reddit.com/shills/comments/6uau99/chemicals_in_reddit_are_turning_memes_gay_take/?st=j6r0g2om&sh=96f3dbf4
Some websites use shill accounts to spam their competitor's articles https://np.reddit.com/TheoryOfReddit/comments/1ja4nf/lets_talk_about_those_playing_reddit_with/?st=iunay35w&sh=d841095d
User posts video using GoPro https://np.reddit.com/videos/comments/2ejpbb/yes_it_is_true_i_boiled_my_gopro_to_get_you_this/ck0btnb/?context=3&st=j0qt0xnf&sh=ef13ba81
Fracking shill whistleblower spills the beans on Fracking Internet PR https://np.reddit.com/worldnews/comments/31wo57/the_chevron_tapes_video_shows_oil_giant_allegedly/cq5uhse?context=3
https://i.imgur.com/Q3gjFg9.jpg
https://i.imgur.com/q2uFIV0.jpg
TOP SECRET SPECIAL HANDLING NOFORN
CENTRAL INTELLIGENCE AGENCY
Directorate of Operations
October 16, 1964
MEMORANDUM FOR THE DIRECTOR OF THE CIA
Subject: After action report of
Operation CUCKOO (TS)
INTRODUCTION

1) Operation CUCKOO was part of the overall operation CLEANSWEEP, aimed at eliminating domestic opposition to activities undertaken by the Central Intelligence Agency's special activities division, in main regard to operation GUILLOTINE.

2) Operation CUCKOO was approved by the Joint Chiefs of Staff, Department of Defense and the office of The President of the United States as a covert domestic action to be under taken within the limits of Washington D.C as outlined by Secret Executive Order 37.

3) Following the publishing of the Warren Commission, former special agent Mary Pinchot Meyer (Operation MOCKINGBIRD, Operation SIREN) also was married to Cord Meyer (Operation MOCKINGBIRD, Operation GUILLOTINE) threatened to disclose the details of several Special Activities Divisions' operations, including but not limited to, Operation SIREN and GUILLOTENE.
​1
TOP SECRET SPECIAL HANDLING NOFORN
4) It was deemed necessary by senior Directorate of Operations members to initiate Operation CUCKOO as an extension of Operation CLEANSWEEP on November 30th. After Mary Pinchot Meyer threatened to report her knowledge of Operation GUILLOTENE and the details of her work in Operation SIREN from her affair with the former President.

5) Special Activities Division was given the green light after briefing president Johnson on the situation. The situation report was forwarded to the Department of Defense and the Joint Chiefs of staff, who both approved of the parameters of the operation, as outlined under article C of secret executive order 37 (see attached copy of article).
​PLANNING STAGES
6) 8 members of the special activities division handpicked by operation lead William King Harvey began planning for the operation on October 3rd, with planned execution before October 16th.

7) The (?) of the operation was set as the neighborhood of Georgetown along the Potomac river, where the operators would observe, take note on routines, and eventually carry the operation.

8) After nothing Meyer's routines, Edward "Eddy" Reid was picked as the operation point man who would intersect Meyer on her walk on October 12th, with lead William King Harvey providing long range support if necessary from across the Chesapeake and Ohio canal (see illustration A for detailed map).

9) Edward Reid was planned to be dressed in the manner of a homeless black man, due to his resemblances to local trash collector (later found out to be Raymond Crump) who inhabits the AO and the path that Reid was planned to intersect Meyer.
2
TOP SECRET SPECIAL HANDLING NOFORN
submitted by The_Web_Of_Slime to Intelligence [link] [comments]

seriously

Guys please this whole deepweb this , how can it be useful ? Like all i see is some drugs ,pornography , and some live killing crap please is there something that we can gain from it like some rare books (hacking or some courses) or some interesting softwares/apps/editors ????? Thanks and have a good day
submitted by furlongo to deepweb [link] [comments]

A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet

First, a bit of introduction before we get into the living drama that is Brian Krebs.
Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring.
In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him.
One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to.
And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.

Fly on the Wall

By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards.
However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places.
So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum.
While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site.
By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away.
Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things.
He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances.
More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses)
While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Fly ultimately was extradited. He plead guilty and was sentenced to 41 months in jail

vDOS and Mirai Break The Internet

Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers.
In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama.
The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect.
Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks.
This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years.
Now time for a couple quick side stories:
Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn
And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 1.3.3.7. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 1.3.3.7. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider.
Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site.
Back to the main tale!
So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai".
As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement.
By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf.
While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei.
Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
He did, however, correct Krebs on the name of B Gata H Kei.
Epilogue
Needless to say, the Mirai botnet crew was caught, but managed to avoid jailtime thanks to their cooperation with the government. That's not to say they went unpunished. Anna-senpai was sentenced to 6 months confinement, 2500 hours of community service, and they may have to pay up to $8.6 million in restitution for their attacks on Rutgers university.

Other Stories

I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
submitted by HereComesMyDingDong to internetdrama [link] [comments]

IoT Testing !!!

IoT is a whole ecosystem that contains intelligent devices equipped with sensors (sensors) that provide remote control, storage, transmission and security of data. The Internet of Things (IoT) is an innovative solution in various areas such as healthcare, insurance, labor protection, logistics, ecology, etc. To unleash the full potential of using IoT devices, it is necessary to solve many problems related to standards, security, architecture, ecosystem construction, channels and device connection protocols. Today in the world, large organizations such as NIST, IEEE, ISO / IEC, and others make enormous efforts in addressing the issues of standardization, security, and the architecture of developed devices. Analysis of recent scientific research in the field of solving information security issues and data privacy of IoT devices showed positive results, but these methods and approaches are based on traditional methods of network security. The development and application of security mechanisms for IoT devices is a complex and heterogeneous task. In this regard, ensuring information security and the protection of sensitive data, as well as the availability of IoT devices, is the main purpose of writing this article. Given the above, many questions arise related to the security status of IoT devices, namely: What are the current standards and protocols for IoT? What are the requirements for ensuring information security of IoT devices? What security mechanisms do IoT devices have? What methods of testing IoT devices exist? Manufacturers and developers of IoT devices do not pay enough attention to security issues. With the development of cyber-attacks, attack vectors are becoming more sophisticated and aimed at several infrastructure elements at the same time. IoT infrastructure typically includes millions of connected objects and devices that store and share confidential information. Scenarios of theft and fraud, such as hacking and falsifying personal data, pose a serious threat to such IoT devices. Most IoT devices use the public Internet to exchange data, which makes them vulnerable to cyber-attacks. Modern approaches to information security often offer solutions to individual problems, when multi-level approaches offer increased resistance to cyber-attacks.
Challenges of testing IoT devices
To a request to name essential items, many would answer: food, a roof over your head, clothes … With one caveat: this was the case in the last century.
Since then, the species Homo Sapiens has accumulated needs. We need automatic sensors to control the lighting, not just switches, for smart systems to monitor health and car traffic. The list goes on … In general, we can make life easier and better.
Let’s try to figure out how all this Internet of things works before moving on to testing.
IoT testing
Content
What is the Internet of Things (IoT)? Examples of IoT devices # 1) Wearable technology: # 2) Infrastructure and development # 3) Health Technologies that are present in IoT IoT Testing # 1) Usability: # 2) IoT Security: # 3) Network features: # 4) Efficiency: # 5) Compatibility testing: # 6) Pilot testing: # 7) Check for compliance: # 8) Testing updates: IoT testing challenges # 1) Hard / soft # 2) Device Interaction Model # 3) Testing data coming in real time # 4) UI # 5) Network Availability IoT Testing Tools # 1) Software: # 2) Hard: Total What is the Internet of Things (IoT)? The Internet of things (or IoT) is a network that combines many objects: vehicles, home automation, medical equipment, microchips, etc. All these constituent elements accumulate and transmit data. Through this technology, the user controls the devices remotely.

Examples of IoT devices

# 1) Wearable technology: Fitbit Fitness Bracelets and Apple Watch smart watches sync seamlessly with other mobile devices.

IoT – watches and bracelets

Itís easier to collect health information: heart rate, body activity during sleep, etc.
# 2) Infrastructure and development The CitySense app analyzes lighting data online and turns lights on and off automatically. There are applications that control traffic lights or report on the availability of parking lots.
# 3) Health Some health monitoring systems are used in hospitals. The basis of their work is indicative data. These services control the dosage of drugs at different times of the day. For example, the UroSense application monitors the level of fluid in the body and, if necessary, increases this level. And doctors will learn about patient information wirelessly.
Technologies that are present in IoT RFID (Radio Frequency Identification), EPC (Electronic Product Code) NFC (ìNear Field Communicationî) provides two-way communication between devices. This technology is present in smartphones and is used for contactless transactions.
Bluetooth It is widely used in situations where near-field communication is sufficient. Most often present in wearable devices. Z-Wave. Low frequency RF technology. Most often used for home automation, lighting control, etc. WiFi. The most popular network for IoT (file, data and message transfer). IoT Testing Consider an example : a medical system that monitors health status, heart rate, fluid content, and sends reports to healthcare providers. Data is displayed in the system; archives available. And doctors are already deciding whether to take medication for the patient remotely.
IoT architecture
There are several approaches for testing the IoT architecture.
# 1) Usability: It is necessary to provide usability testing of each device. A medical device that monitors your health should be portable.
Sufficiently thought out equipment is needed that would send not only notifications, but also error messages, warnings, etc. The system must have an option that captures events, so that the end user understands. If this is not possible, event information is stored in the database. The ability to process data and exchange tasks between devices is carefully checked. # 2) IoT Security: Data is at the heart of all connected devices. Therefore, unauthorized access during data transfer is not ruled out. From the point of view of software testing, it is necessary to check how secure / encrypted the data is. If there is a UI, you need to check if it is password protected. # 3) Network features: Network connectivity and IoT functionality are critical. After all, we are talking about a system that is used for health purposes. Two main aspects are tested: The presence of a network , the possibility of data transfer (whether jobs are transferred from one device to another without any hitch). The scenario when there is no connection . Regardless of the level of reliability of the system, it is likely that the status of the system will be ìofflineî. If the network is unavailable, employees of the hospital or other organization need to know about it (notifications). Thus, they will be able to monitor the condition of the patient themselves, and not wait for the system to work. On the other hand, in such systems there is usually a mechanism that saves data if the system is offline. That is, data loss is eliminated. # 4) Efficiency: It is necessary to take into account the extent to which the healthcare solution is applicable in specific conditions. In testing, from 2 to 10 patients participate, data is transmitted to 10-20 devices. If the entire hospital is connected to the network, this is already 180-200 patients. That is, there will be more actual data than test data. In addition, it is necessary to test the utility for monitoring the system: current load, power consumption, temperature, etc. # 5) Compatibility testing: This item is always present in the plan for testing the IoT system. The compatibility of different versions of operating systems, browser types and their respective versions, devices of different generations, communication modes [for example, Bluetooth 2.0, 3.0] is extremely important for IoT. # 6) Pilot testing: Pilot testing is a mandatory point of the test plan. Only tests in the laboratory will allow us to conclude that the system is functional. In pilot testing, the number of users is limited. They make manipulations with the application and express their opinion. These comments turn out to be very helpful, they make a reliable application. # 7) Check for compliance: The system, which monitors the state of health, undergoes many compliance checks. It also happens that a software product passes all stages of testing, but fails the final test for compliance [testing is carried out by the regulatory body]. It is more advisable to check for compliance with norms and standards before starting the development cycle. # 8) Testing updates: IoT is a combination of many protocols, devices, operating systems, firmware, hardware, network layers, etc. When an update occurs – be it a system or something else of the above – rigorous regression testing is required. The overall strategy is being amended to avoid the difficulties associated with the upgrade.

IoT testing challengesIoT testing

# 1) Hard / soft IoT is an architecture in which software and hardware components are closely intertwined. Not only software is important, but also hard: sensors, gateways, etc.
Functional testing alone will not be enough to certify the system. All components are interdependent. IoT is much more complicated than simpler systems [only software or only hard].
# 2) Device Interaction Model Components of the network must interact in real time or close to real. All this becomes a single whole – hence the additional difficulties associated with IoT (security, backward compatibility and updates).
# 3) Testing data coming in real time Obtaining this data is extremely difficult. The matter is complicated by the fact that the system, as in the described case, may relate to the health sector.
# 4) UI An IoT network usually consists of different devices that are controlled by different platforms [iOS, Android, Windows, linux]. Testing is possible only on some devices, since testing on all possible devices is almost impossible.
# 5) Network Availability Network connectivity plays an important role in IoT. The data rate is increasing. IoT architecture should be tested under various connection conditions, at different speeds. Virtual network emulators in most cases are used to diversify network load, connectivity, stability, and other elements of load testing . But the evidence is always new scenarios, and the testing team does not know where the difficulties will arise in the future.

IoT Testing ToolsIoT and software

There are many tools that are used in testing IoT systems.
They are classified depending on the purpose:
# 1) Software: Wireshark : An open source tool. Used to monitor traffic in the interface, source / given host address, etc. Tcpdump : This tool does a similar job. The utility does not have a GUI, its interface is the command line. It enables the user to flash TCP / IP and other packets that are transmitted over the network. # 2) Hard: JTAG Dongle: A tool similar to debuggers in PC applications. Allows you to find defects in the code of the target platform and shows the changes step by step. Digital Storage Oscilloscope : checks various events using time stamps, power outages, signal integrity. Software Defined Radio : emulates a transmitter and receiver for various wireless gateways. IoT is an emerging market and many opportunities. In the foreseeable future, the Internet of things will become one of the main areas of work for tester teams. Network devices, smart gadget applications, communication modules – all this plays an important role in the study and evaluation of various services.
Total The approach to testing IoT may vary depending on the specific system / architecture.
Itís difficult to test IoT, but at the same time itís an interesting job, since testers have a good place to swing – there are many devices, protocols and operating systems.
PS You should try out the TAAS format (“tests from the user’s point of view”), and not just fulfill the formal requirements.
—————
Smart watches, baby-sitters, wireless gadgets and devices such as, for example, a portable radio station have long been part of everyday life.
Hackers have already proven that many of these attacks on IoT are possible.
Many people in general first learned about IoT security threats when they heard about the Mirai botnet in September 2016.
According to some estimates, Mirai infected about 2.5 million IoT devices, including printers, routers and cameras connected to the Internet.
The botnetís creators used it to launch distributed denial of service (DDoS) attacks, including an attack on the KrebsonSecurity cybersecurity blog.
In fact, the attackers used all devices infected with Mirai to try to connect to the target site at the same time, in the hope of suppressing the servers and preventing access to the site.
Since Mirai was first published on the news, attackers launched other botnet attacks on IoT, including Reaper and Hajime.
Experts say that such attacks are most likely in the future.
The Internet of Things (IoT) can bring many advantages to modern life, but it also has one huge drawback: security threats.
In its 2018 IOT forecasts, Forroter Research notes: ìSecurity threats are a major concern for companies deploying IoT solutions – in fact, this is the main task of organizations looking to deploy IoT solutions.
However, most firms do not regularly prevent IoT-specific security threats, and business pressure suppresses technical security issues. î
IoT security risks can be even more significant on the consumer side, where people are often unaware of potential threats and what they should do to avoid threats.
A 2017 IoT security survey sponsored by Gemalto Security Provider found that only 14 percent of consumers surveyed consider themselves IoT-aware.
This number is particularly noteworthy because 54 percent of the respondents owned an average of four IoT devices.
And these IoT security threats are not just theoretical.
Hackers and cybercriminals have already found ways to compromise many IoT devices and networks, and experts say that successful attacks are likely to increase.
Forrester predicted: “In 2018, we will see more attacks related to IoT … except that they will increase in scale and loss.”
What types of IoT security threats will enterprises and consumers face in 2018?
Based on historical precedent, here are ten of the most likely types of attacks.
  1. Botnets and DDoS attacks
  2. Remote recording The possibility that attackers can hack IoT devices and record owners without their knowledge is not revealed as a result of the work of hackers, but as a result of the work of the Central Intelligence Agency (CIA).
Documents released by WikiLeaks implied that the spy agency knew about dozens of zero-day exploits for IoT devices, but did not disclose errors, because they hoped to use vulnerabilities to secretly record conversations that would reveal the actions of alleged opponents of America.
Documents pointed to vulnerabilities in smart TVs, as well as on Android and iOS smartphones.
The obvious consequence is that criminals can also exploit these vulnerabilities for their vile purposes.
  1. Spam In January 2014, one of the first known attacks using IoT devices used more than 100,000 Internet-connected devices, including televisions, routers, and at least one smart refrigerator to send 300,000 spam emails per day.
The attackers sent no more than 10 messages from each device, which makes it very difficult to block or determine the location of the incident.
This first attack was not far from the last.
IoT spam attacks continued in the fall with the Linux.ProxyM IoT botnet.
  1. APTs In recent years, advanced persistent threats (APTs) have become a serious concern for security professionals.
APTs are carried out by funded and widespread attackers such as nation states or corporations that launch complex cyberattacks that are difficult to prevent or mitigate.
For example, the Stuxnet worm, which destroyed Iranian nuclear centrifuges and hacking Sony Pictures 2014, was attributed to nation states.
Because the critical infrastructure is connected to the Internet, many experts warn that APTs may launch a power-oriented IoT attack, industrial control systems, or other systems connected to the Internet.
Some even warn that terrorists could launch an attack on iOT, which could harm the global economy.
  1. Ransomware Ransomware has become too common on home PCs and corporate networks. Now experts say that it is only a matter of time before the attackers begin to block smart devices. Security researchers have already demonstrated the ability to install ransomware on smart thermostats. For example, they can raise the temperature to 95 degrees and refuse to return it to its normal state until the owner agrees to pay a ransom in Bitcoins. They can also launch similar attacks on garage doors, vehicles, or even appliances. How much would you pay to unlock your smart coffee pot first thing in the morning?
  2. Data theft Obtaining important data, such as customer names, credit card numbers, social security numbers, and other personal information, is still one of the main goals of cyber attacks.
IoT devices represent a whole new vector of attack for criminals looking for ways to invade corporate or home networks.
For example, if an improperly configured device or IoT sensor is connected to corporate networks, this can give attackers a new way to enter the network and potentially find the valuable data that they need.
  1. Home theft As smart locks and smart garage doors become more commonplace, it is also more likely that cybercriminals can become real thieves.
Home systems that are not properly protected can be vulnerable to criminals with sophisticated tools and software.
Security researchers are unlikely to have shown that itís quite easy to break into a house through smart locks from several different manufacturers, and smart garage doors do not seem to be much safer.
  1. Communication with children One of the most disturbing IoT security stories came from children.
One couple discovered that the stranger not only used his monitor for children to spy on their three-year-old son, this stranger also spoke with his child through the device.
Mother heard an unknown voice: ìWake up, boy, dad is looking for you,î and the child said that he was scared because at night someone was talking to him on an electronic device.
As more and more children’s gadgets and toys connect to the Internet, it seems likely that these frightening scenarios may become more common.
  1. Remote control of a vehicle As vehicles become smarter and more accessible on the Internet, they also become vulnerable to attack.
Hackers have shown that they can take control of a jeep, maximize air conditioning, change the radio station, start the wipers, and ultimately slow down the car.
The news led to the recall of 1.4 million cars, but whitehat researchers, following the original exploit, said they discovered additional vulnerabilities that were not fixed by the Chrysler patch applied to the recalled cars.
Although experts say the automotive industry is doing a great job of ensuring vehicle safety, it is almost certain that attackers will find new vulnerabilities in such smart cars.
  1. Personal attacks Sometimes IoT covers more than just devices – it can also include people who have connected medical devices implanted in their bodies.
An episode of the television series Homeland attempted a murder aimed at an implanted medical device, and former vice president Dick Cheney was so worried about this scenario that he turned off the wireless capabilities on his implanted defibrillator.
This kind of attack has not yet happened in real life, but it remains possible, as many medical devices become part of the IoT.
submitted by farabijfa to u/farabijfa [link] [comments]

Digital Entertainment Network (DEN) - Confirmed Hollywood Pedophile Ring?

By 1999, the company was reportedly valued at $58,500,000 USD and included former Walt Disney Television President David Neuman, Garth Ancier, David Geffen, Gary Goddard, and Bryan Singer as investors.[8][9][10]
DEN was slated for a $75 million USD IPO in October 1999 but the IPO was withdrawn[11] in the wake of allegations of sexual assault against Collins-Rector, Shackley, and fellow executive Brock Pierce. All three executives subsequently resigned.
https://en.wikipedia.org/wiki/Digital_Entertainment_Network


“Pedophile ring” DEN was founded by an abuser, his former victim, and a well-known child actor
Brock Pierce, a frequent Villard subject who appeared in “The Mighty Ducks” films, was introduced to Marc Collins-Rector and Chad Shackley by “The Usual Suspects” director Bryan Singer. Collins-Rector and Shackley met in a chatroom, began dating, and moved in together when Shackley was 15 and Collins-Rector was 31. After starting an internet service provider, they recruited Pierce to form the Digital Entertainment Network, a 1998 precursor to modern streaming platforms. DEN provided original content starring child actors. Prior to the company’s planned $75 million IPO, the trio was hit with sexual abuse allegations and a lawsuit filed by a New Jersey who’d worked for Collins-Rector. With an investigation underway, they fled the U.S.; Interpol arrested them in Spain in 2002. Collins-Rector spent 18 months imprisoned prior to extradition, then plead guilty to nine counts of child sexual abuse. He was soon released, and after registering as a convicted sex offender, he ran away to London.
....DEN’s early investors included a blockbuster director and a DreamWorks SKG co-founder
In “An Open Secret,” journalist John Connolly says Singer — who has continued directing for the “X-Men” franchise — and David Geffen were among DEN’s original backers, contributing a respective $50,000 and $250,000.
DEN executives threw drug-fueled sleepovers for young boys at their mansion
At Collins-Rector and Shackley’s palatial Encino estate, a mandatory skinny-dipping was enforced for anyone who wanted go in the hot tub after dusk. Young actors who attended parties remember troves of prescription drugs and alcohol, plus Collins-Rector’s gun collection. One man recalled when, as a minor, Collins-Rector threatened his career if he did not sleep in his bed. Although the actor refused and camped out on the couch, he nonetheless awoke in Collins-Rector’s bed, convinced that a laced drink had led to abuse.
Hollywood’s Underage Sexual Abuse Problem: 5 Shocking Injustices From ‘An Open Secret’


The Encino mansion known as the M&C Estate—owned by a convicted sex offender named in the lawsuit against Bryan Singer—was home to the wild gay sex parties where Hollywood bigwigs allegedly preyed on underage boys. It was also used to film a 1998 pilot for Digital Entertainment Network described as a "gay pedophile version of Silver Spoons," starring an as yet unknown Seann William Scott.
Inside the Hollywood Sex Ring Mansion From the Bryan Singer Lawsuit

Brock Pierce is a controversial figure who has received surprisingly little attention despite connections to the Clinton Foundation, digital currency Bitcoin and involvement in a notorious scandal involving a child abuse ring. Pierce’s involvement with a child abuse ring, Digital Entertainment Network and The Clinton Global initiative were first highlighted in the documentary An Open Secret, Directed by Amy Berg.
As detailed in Berg’s film, Brock was a member of the Clinton Global Initiative, former child actor who appeared in films such as the 1992 classic Mighty Ducks and Disney’s “First Kid,” and Chairman of the Board at the Bitcoin Foundation. Pierce also co-founded the Digital Entertainment Network (DEN), a forerunner of video sharing site Youtube. In 2010, Pierce also was also a participant at the Mindshift Conference, which was hosted by now disgraced billionaire pedophile and child sex trafficker Jeffrey Epstein.
DEN was founded in 1996 amid the rapid growth of the dot-com bubble. It raised $72 million in investment before even opening in 1999, a massive amount of capital considering that, at least on the surface, DEN was not yet providing investors with anything in return. At the time news sources scoffed at the massive salaries top executives were paid when the company was not even creating revenue.
An SEC filing obtained by Hollywood periodical Radar Online reveals that DEN’s investors included a shocking number of big name personalities such as media executives Garth Ancier and David Geffen, former Yahoo CEO Terry Semel, film producers Gary Goddard and Bryan Singer, Wall Street czar Mitchell Blutt, A&M Records head Gilbert Friesen (now deceased), former Disney executive David Neuman, manager and label executive Gary Gersh, investor Jeffrey Sachs, former Congressman Michael Huffington, actors Ben and Fred Savage, and tech companies such as Microsoft and Dell. The lack of apparent revenue raises questions about what investors in DEN were expecting in return.
Tech Figure In Dot-Com Child Sex Scandal Was A Clinton Global Initiative Member

submitted by TheTruthHurts420 to conspiracy [link] [comments]

MeWe: A trip report

Among the more frequently mentioned G+ alternatives at the Google+ Mass Migration community, and others, is MeWe with over 250 mentions. The site bills itself as "The Next-Gen Social Network" and the "anti-Facebook": "No Ads, No Political Bias, No Spyware. NO BS. It is headed by professed Libertarian CEO Mark Weinstein.
As the site reveals no public user-generated content to non-members, it's necessary to create an account in order to get a full impression. I thought I'd provide an overview based on recent explorations.
This report leads of with background on the company, though readers may find the report and analysis of specific groups on the site of interest.

Leadership

Founder & CEO Mark Weinstein.
Co-Founder & Chief Scientist, Jonathan Wolfe (no longer with company).
Weinstein previously founded SuperFamily and SuperFriends, "at the turn of the millennium". Weinstein's MeWe biography lists articles published by The Mirror (UK), Huffington Post, USA Today, InfoSecurity Magazine, Dark Reading, and the Nation. His media appearances include MarketWatch, PBS, Fox News, and CNN. He's also the author of several personal-success books.
His Crunchbase bio is a repeat of the MeWe content.

Advisory Board

Ownership & Investment

MeWe is the dba of Sgrouples, a private for-profit early-stage venture company based in Los Angeles, though with a Mountain View HQ and mailing address, 11-50 employees, with $10m in funding over five rounds, and a $20m valuation as of 2016.
Sgrouples, Inc., dba MeWe Trust & Safety - Legal Policy c/o Fenwick West 801 California Street Mountain View, CA 94041
Crunchbase Profile.
Founded: 2012 (source)
Secured $1.2M in seed funding in 2014.
2016 valuation: $20m (source]
Backers:
Despite the business address, the company claims to be based in Los Angeles County, California and is described by the Los Angeles Business Journal as a Culver City, CA, company.

Business

Policy

In an August 6, 2018 Twitter post, Weinstein promotes MeWe writing:
Do you have friends still on Facebook? Share this link with them about Facebook wanting their banking information - tell them to move to MeWe now! No Ads. No Spyware. No Political Agenda. No Bias Algorithms. No Shadow Banning. No Facial Recognition.
MeWe provide several policy-related links on the site:
Highlights of these follow.

Privacy

The privacy policy addresses:

Terms of Service

The ToS addresses:
Effective: November 6, 2018.

FAQ

The FAQ addresses:

Values

This emphasises that people are social cratures and private people by right. The service offers the power of self expression under an umbrella of safety. It notes that our innermost thoughts require privacy.
Under "We aspire...":
MeWe is here to empower and enrich your world. We challenge the status quo by making privacy, respect, and safety the foundations of an innovatively designed, easy-to-use social experience.
Totalling 182 words.

Privacy Bill of Rights

A ten-item statement of principles (possibly inspired by another document, it might appear):
  1. You own your personal information & content. It is explicitly not ours.
  2. You will never receive a targeted advertisement or 3rd party content based on what you do or say online. We think that's creepy.
  3. You see every post in timeline order from your friends, family & groups. We do not manipulate, filter, or change the order of your content or what you see.
  4. Permissions & privacy are your rights. You control them.
  5. You control who can access your content.
  6. You control what, if anything, others can see in member searches.
  7. Your privacy means we do not share your personal information with anyone.
  8. Your emojis are for you and your friends. We do not monitor or mine your data.
  9. Your face is your business. We do not use facial recognition technology.
  10. You have the right to delete your account and take your content with you at any time.

Press

There are a few mentions of MeWe in the press, some listed on the company's website, others via web search.

Self-reported articles

The following articles are linked directly from MeWe's Press page:
The page also lists a "Privacy Revolution Required Reading" list of 20 articles all addressing Facebook privacy gaffes in the mainstream press (Wired, TechCrunch, Fortune, Gizmodo, The Guardian, etc.).
There are further self-reported mentions in several of the company's PR releases over the years.

Other mentions

A DuckDuckGo search produces several other press mentions, including:

Technology

This section is a basic rundown of the user-visible site technology.

Mobile Web

The site is not natively accessible from a mobile Web browser as it is overlayed with a promotion for the mobile application instead. Selecting "Desktop View" in most mobile browsers should allow browser-based access.

Mobile App

There are both Android and iOS apps for MeWe. I've used neither of these, though the App store entries note:
Crunchbase cites 209,220 mobile downloads over the past 30 days (via Apptopia), an 80.78% monthly growth rate, from Google Play.

Desktop Web

Either selecting "View Desktop" or navigating with a Desktop browser to https://www.mewe.com your are presented with a registration screen, with the "About", "Privacy Bill of Rights", "MeWe Challenge", and a language selector across the top of the page. Information requested are first and last name, phone or email, and a password. Pseudonymous identities are permitted, though this isn't noted on the login screen. Returning members can use the "Member Log In" button.
The uMatrix Firefox extension reveals no third-party content: all page elements are served from mewe.com, img.mewe.com, cdn.mewe.com, or ws.mewe.com. (In subsequent browsing, you may find third-party plugins from, for example, YouTube, for videos, or Giphy, for animated GIFs.)
The web front-end is nginx. The site uses SSL v3, issued by DigiCert Inc. to Sgrouples, Inc.

Onboarding

The onboarding experience is stark. There is no default content presented. A set of unidentified icons spans the top of the screen, these turn out to be Home, Chats, Groups, Pages, and Events. New users have to, somehow, find groups or people to connect with, and there's little guidance as to how to do this.

Interface

Generally there is a three panel view, with left- and right-hand sidebars of largely navigational or status information, and a central panel with main content. There are also pop-up elements for chats, an omnipresent feature of the site.
Controls display labels on some devices and/or resolutions. Controls do not provide tooltips for navigational aid.

Features

Among the touted features of MeWe are:

Community

A key aspect of any social network is its community. Some of the available or ascertained information on this follows.

Size

Weinstein claims a "million+ following inside MeWe.com" on Twitter.
The largest visible groups appear to have a maximum of around 15,000 members , for "Awesome gifs". "Clean Comedy" rates 13,350, and the largest open political groups, 11,000+ members.
This compares to Google+ which has a staggering, though Android-registrations-inflated 3.3 billion profiles, and 7.9 million communities, though the largest of these come in at under 10 million members. It's likely that MeWe's membership is on the whole more more active than Google+'s, where generally-visible posting activity was limited to just over 9% of all profiles, and the active user base was well under 1% of the total nominal population.

Active Users

MeWe do not publish active users (e.g., MUA / monthly active users) statistics.

Groups

MeWe is principally a group-oriented discussion site -- interactions take place either between individuals or within group contexts. Virtually all discovery is group-oriented. The selection and dynamics of groups on the site will likely strongly affect user experience, so exploring the available groups and their characteristics is of interest.
"MeWe has over 60,000 open groups" according to its FAQ.
The Open groups -- visible to any registered MeWe user, though not to the general public Web -- are browsable, though sections and topics must be expanded to view the contents: an overview isn't immediately accessible. We provide a taste here.
A selection of ten featured topics spans the top of the browser. As I view these, they are:
Specific groups may appear in multiple categories.
The top Groups within these topics have, variously, 15,482, 7,738, 15,482 (dupe), 7,745, 8,223, 8,220, 1,713, 9,527, 2,716, and 1,516 members. Listings scroll at length -- the Music topic has 234 Groups, ranging in size from 5 to 5,738 members, with a median of 59, mean of 311.4, and a 90%ile of 743.5.
Below this is a grid of topics, 122 in all, ranging from Activism to Wellness, and including among them. A selected sample of these topics, with top groups listed members in (parens), follows:
To be clear: whilst I've not included every topic, I've sampled a majority of them above, and listed not an arbitrary selection, but the top few Groups under each topic.

Google+ Groups

The Google Plus expats group seems the most active of these by far.

Political Groups

It's curious that MeWe make a specific point in their FAQ that:
At MeWe we have absolutely no political agenda and we have a very straightforward Terms of Service. MeWe is for all law-abiding people everywhere in the world, regardless of political, ethnic, religious, sexual, and other preferences.
There are 403 political groups on MeWe. I won't list them all here, but the first 100 or so give a pretty clear idea of flavour. Again, membership is in (parentheses). Note that half the total political Groups memberships are in the first 21 groups listed here, the first 6 are 25% of the total.
  1. Donald J. Trump 2016 - Present (11486)
  2. The Conservative's Hangout (8345)
  3. Qanon Follow The White Rabbit (5600)
  4. Drain The Swamp (4978)
  5. Libertarians (4528)
  6. United We Stand Trump2020 (4216)
  7. The Right To Self Defense (3757)
  8. Alternative Media (3711)
  9. Hardcore Conservative Patriots for Trump (3192)
  10. Bastket Of Deplorables4Trump! (3032)
  11. Return of the Republic (2509)
  12. Infowars Chat Room Unofficial (2159)
  13. Donald Trump Our President 2017-2025 (2033)
  14. Berners for Progress (1963)
  15. Sean Hannity Fans (1901)
  16. The American Conservative (1839)
  17. I Am The NRA (1704)
  18. Tucker Carlson Fox News (1645)
  19. We Love Donald Trump (1611)
  20. MAGA - Make America Great Again (1512)
  21. Q (1396)
  22. ClashDaily.com (1384)
  23. news from the front (1337)
  24. Basket of Deplorables (1317)
  25. Payton's Park Bench (1283)
  26. Convention of States (1282)
  27. Britons For Brexit (1186)
  28. MoJo 5.0 Radio (1180)
  29. MeWe Free Press (1119)
  30. The Constitutionally Elite (1110)
  31. Libertarian (1097)
  32. WOMEN FOR PRESIDENT TRUMP (1032)
  33. AMERICANS AGAINST ISIS and OTHER ENEMIES (943)
  34. #WalkAway Campaign (894)
  35. ALEX JONES (877)
  36. The Lion Is Awake ! (854)
  37. We Support Donald Trump! (810)
  38. The Stratosphere Lounge (789)
  39. TRUMP-USA-HANDS OFF OUR PRESIDENT (767)
  40. Official Tea Party USA (749)
  41. Mojo50 Jackholes (739)
  42. Yes Scotland (697)
  43. "WE THE DEPLORABLE" - MOVE ON SNOWFLAKE! (688)
  44. Judge Jeanine Pirro Fans (671)
  45. Anarcho-Capitalism (658)
  46. Ted Cruz for President (650)
  47. No Lapdog Media (647)
  48. Q Chatter (647)
  49. Daily Brexit (636)
  50. Tucker Carlson Fox News (601)
  51. The Trumps Storm Group (600)
  52. QAnon-Patriots WWG1WGA (598)
  53. 100% American (569)
  54. Ladies For Donald Trump (566)
  55. Deep State (560)
  56. In the Name of Liberty (557)
  57. Material Planet (555)
  58. WikiUnderground (555)
  59. Trump NRA Free Speech Patriots on MeWe Gab.ai etc (546)
  60. Magna Carta Group (520)
  61. Constitutional Conservatives (506)
  62. Question Everything (503)
  63. Conspiracy Research (500)
  64. Bill O'Reilly Fans (481)
  65. Conservative Misfit's (479)
  66. Canadian politics (478)
  67. Anarchism (464)
  68. HARDCORE DEPLORABLES (454)
  69. Deplorable (450)
  70. Tampa Bay Trump Club (445)
  71. UK Politics (430)
  72. Bongino Fan Page (429)
  73. Radical Conservatives (429)
  74. RESIST THE RESISTANCE (419)
  75. The Deplorables (409)
  76. America's Freedom Fighters (401)
  77. Politically Incorrect & Proud (399)
  78. CONSERVATIVES FOR AMERICA ! (385)
  79. Political satire (383)
  80. RISE OF THE RIGHT (371)
  81. UK Sovereignty,Independence,Democracy -Everlasting (366)
  82. The Patriots Voting Coalition (359)
  83. End The Insanity (349)
  84. Coming American Civil War! (345)
  85. Constitutional Conservatives (343)
  86. United Nations Watch (342)
  87. A Revival Of The Critical Thinking Union (337)
  88. The New Libertarian (335)
  89. Libertarian Party (official ) (333)
  90. DDS United (Duterte Die-hard Supporters) (332)
  91. American Conservative Veterans (331)
  92. Anarchism/Agorism/Voluntaryism (328)
  93. America Needs Donald Trump (326)
  94. The UKIP Debating Society (321)
  95. Coalition For Trump (310)
  96. Egalitarianism (306)
  97. FRIENDS THAT LIKE JILL STEIN AND THE GREEN PARTY (292)
  98. 2nd Amendment (287)
  99. Never Forget #SethRich (286)
  100. Green Party Supporters 2020 (283)
It seems there is relatively little representation from the left wing, or even the centre, of the political spectrum. A case-insensitive match for "liberal" turns up:
Mainstream political parties are little represented, though again, the balance seems skewed searching on "(democrat|republic|gop)":
The terms "left" and "right" provide a few matches, not all strictly political-axis aligned:
Socialism and Communism also warrant a few mentions:
And there are some references to green, laboulabor parties:

Conclusion

Whilst there may not be a political agenda, there does appear to be at least a slight political bias to the site. And a distinctive skew on many other topical subjects.
Those seeking new homes online may wish to take this into account.

Updates

submitted by dredmorbius to plexodus [link] [comments]

The Great NiceHash Profit Explanation - for Sellers (the guys with the GPUs & CPUs)

Let's make a couple of things crystal clear about what you are not doing here:
But hey, I'm running MINING software!
What the hell am I doing then?!?
Who makes Profit, and how?
How is it possible everyone is making a profit?
Why do profits skyrocket, and will it last (and will this happen again)?
But my profits are decreasing all the time >:[
But why?!? I’m supposed to make lotsa money out of this!!!
But WHY!!!
  1. Interest hype -> Influx of Fiat money -> Coins quotes skyrocket -> Influx of miners -> Difficulty skyrockets -> Most of the price uptrend is choked within weeks, since it’s now harder to mine new blocks.
  2. Interest hype drains out -> Fiat money influx declines -> Coins quotes halt or even fall -> Miners still hold on to their dream -> Difficulty stays up high, even rises -> Earnings decrease, maybe even sharply, as it's still harder to mine new blocks, that may be even paid less.
So, how to judge what’s going on with my profits?
Simple breakdown of the relationship of BTC payouts by NiceHash, BTC/ALT Coins rates, and Fiat value:
BTC quote | ALTs quotes | BTC payout | Fiat value ----------------------------------------------------- UP | UP | stable*) | UP stable | UP | UP | UP UP | stable | DOWN | stable*) stable | stable | stable | stable DOWN | stable | UP | stable*) stable | DOWN | DOWN | DOWN DOWN | DOWN | stable*) | DOWN 
Some rather obvious remarks:
More help:
Disclaimer: I'm a user - Seller like you - not in any way associated with NiceHash; this is my personal view & conclusion about some more or less obvious basics in Crypto mining and particularly using NiceHash.
Comments & critics welcome...
submitted by t_3 to NiceHash [link] [comments]

I wrote a 30,000 ft. "executive summary" intro document for cryptos. Not for you, for your non-technical parents or friends.

This document was originally written for my dad, an intelligent guy who was utterly baffled about the cryptocurrency world. The aim was to be extremely concise, giving a broad overview of the industry and some popular coins while staying non-technical. For many of you there will be nothing new here, but recognize that you are in the 0.001% of the population heavily into crypto technology.
I've reproduced it for Reddit below, or you can find the original post here on my website. Download the PDF there or hit the direct link: .PDF version.
Donations happily accepted:
ETH: 0x4e03Bf5CCE3eec4Ddae4d3d6aAD46ca4f198AeD6 BTC: 1GqWMZRRygRJJWYYTWHkAVoRcgyQHjgBMZ XMR: 42Y1S1KBoPk381kc7hA68zaiC78BxMoCADjLrFcTdWiE7ejhZc49s1t9i7P2EmTnHsLDiKoSUiogCbLVHXRJxjrCT4WG8ic XRB: xrb_1bpzh745s9kzk8ymfnks3jtdi65ayumdstokzd4yw4ohu3fopxmiocjcntcu 

Background

This document is purely informational. At the time of writing there are over 1000 cryptocurrencies (“cryptos”) in a highly volatile, high risk market. Many of the smaller “altcoins” require significant technical knowledge to store and transact safely. I advise you to carefully scrutinize each crypto’s flavor of blockchain, potential utility, team of developers, and guiding philosophy, before making any investment [1] decisions. With that out of the way, what follows are brief, extremely high-level summaries of some cryptos which have my interest, listed in current market cap order. But first, some info:
Each crypto is a different implementation of a blockchain network. Originally developed as decentralized digital cash, these technologies have evolved into much broader platforms, powering the future of decentralized applications across every industry in the global economy. Without getting into the weeds, [2] most cryptos work on similar principles:
Distributed Ledgers Each node on a blockchain network has a copy of every transaction, which enables a network of trust that eliminates fraud. [3]
Decentralized “Miners” comprise the infrastructure of a blockchain network. [4] They are monetarily incentivized to add computing power to the network, simultaneously securing and processing each transaction. [5]
Peer-to-peer Cryptos act like digital cash-- they require no third party to transact and are relatively untraceable. Unlike cash, you can back them up.
Global Transactions are processed cheaply and instantly, anywhere on Earth. Using cryptos, an African peasant and a San Francisco engineer have the same access to capital, markets, and network services.
Secure Blockchains are predicated on the same cryptographic technology that secures your sensitive data and government secrets. They have passed seven years of real-world penetration testing with no failures. [6]

Bitcoin (BTC)

The first cryptocurrency. As with first movers in any technology, there are associated pros and cons. Bitcoin has by far the strongest brand recognition and deepest market penetration, and it is the only crypto which can be used directly as a currency at over 100,000 physical and web stores around the world. In Venezuela and Zimbabwe, where geopolitical events have created hyperinflation in the centralized fiat currency, citizens have moved to Bitcoin as a de facto transaction standard. [7]
However, Bitcoin unveiled a number of issues that have been solved by subsequent cryptos. It is experiencing significant scaling issues, resulting in high fees and long confirmation times. The argument over potential solutions created a rift in the Bitcoin developer community, who “forked” the network into two separate blockchains amidst drama and politicking in October 2017. Potential solutions to these issues abound, with some already in place, and others nearing deployment.
Bitcoin currently has the highest market cap, and since it is easy to buy with fiat currency, the price of many smaller cryptos (“altcoins”) are loosely pegged to its price. This will change in the coming year(s).

Ethereum (ETH)

Where Bitcoin is a currency, Ethereum is a platform, designed as a foundational protocol on which to develop decentralized applications (“Dapps”). Anyone can write code and deploy their program on the global network for extremely low fees. Just like Twitter wouldn’t exist without the open platform of the internet, the next world-changing Dapp can’t exist without Ethereum.
Current Dapps include a global market for idle computing power and storage, peer-to-peer real estate transactions (no trusted third party for escrow), identity networks for governments and corporations (think digital Social Security card), and monetization strategies for the internet which replace advertising. Think back 10 years to the advent of smartphones, and then to our culture today-- Ethereum could have a similar network effect on humanity.
Ethereum is currently the #2 market cap crypto below Bitcoin, and many believe it will surpass it in 2018. It has a large, active group of developers working to solve scaling issues, [8] maintain security, and create entirely new programming conventions. If successful, platforms like Ethereum may well be the foundation of the decentralized internet of the future.

Ripple (XRP)

Ripple is significantly more centralized than most crypto networks, designed as a backbone for the global banking and financial technology (“fintech”) industries. It is a network for exchanging between fiat currencies and other asset classes instantly and cheaply, especially when transacting cross-border and between separate institutions. It uses large banks and remittance companies as “anchors” to allow trading between any asset on the network, and big names like Bank of America, American Express, RBC, and UBS are partners. The utility of this network is global and massive in scale.
It is extremely important to note that not all cryptos have the same number of tokens. Ripple has 100 Billion tokens compared to Bitcoin’s 21 Million. Do not directly compare price between cryptos. XRP will likely never reach $1k, [9] but the price will rise commensurate with its utility as a financial tool.
In some sense, Ripple is anathema to the original philosophical vision of this technology space. And while I agree with the cyberpunk notion of decentralized currencies, separation of money and state, this is the natural progression of the crypto world. The internet was an incredible decentralized wild west of Usenet groups and listservs before Eternal September and the dot-com boom, but its maturation affected every part of global society.

Cardano (ADA)

Cardano’s main claim to fame: it is the only crypto developed using academic methodologies by a global collective of engineers and researchers, built on a foundation of industry-leading, peer-reviewed cryptographic research. The network was designed from first-principles to allow scalability, system upgrades, and to balance the privacy of its users with the security needs of regulators.
One part of this ecosystem is the Cardano Foundation, a Swiss non-profit founded to work proactively with governments and regulatory bodies to institute legal frameworks around the crypto industry. Detractors of Cardano claim that it doesn’t do anything innovative, but supporters see the academic backing and focus on regulation development as uniquely valuable.

Stellar Lumens (XLM)

Stellar Lumens and Ripple were founded by the same person. They initially shared the same code, but today the two are distinct in their technical back-end as well as their guiding philosophy and development goals. Ripple is closed-source, for-profit, deflationary, and intended for use by large financial institutions. Stellar is open-source, non-profit, inflationary, and intended to promote international wealth distribution. As such, they are not direct competitors.
IBM is a major partner to Stellar. Their network is already processing live transactions in 12 currency corridors across the South Pacific, with plans to process 60% of all cross-border payments in the South Pacific’s retail foreign exchange corridor by Q2 2018.
Beyond its utility as a financial tool, the Stellar network may become a competitor to Ethereum as a platform for application development and Initial Coin Offerings (“ICOs”). The theoretical maximum throughput for the network is higher, and it takes less computational power to run. The Stellar development team is highly active, has written extensive documentation for third-party developers, and has an impressive list of advisors, including Patrick Collison (Stripe), Sam Altman (Y Combinator), and other giants in the software development community.

Iota (IOT)

Iota was developed as the infrastructure backbone for the Internet of Things (IoT), sometimes called the machine economy. As the world of inanimate objects is networked together, their need to communicate grows exponentially. Fridges, thermostats, self-driving cars, printers, planes, and industrial sensors all need a secure protocol with which to transact information.
Iota uses a “Tangle” instead of a traditional blockchain, and this is the main innovation driving the crypto’s value. Each device that sends a transaction confirms two other transactions in the Tanlge. This removes the need for miners, and enables unique features like zero fees and infinite scalability. The supply of tokens is fixed forever at 2.8*1015, a staggeringly large number (almost three thousand trillion), and the price you see reported is technically “MIOT”, or the price for a million tokens.

Monero (XMR)

The most successful privacy-focused cryptocurrency. In Bitcoin and most other cryptos, anyone can examine the public ledger and trace specific coins through the network. If your identity can be attached to a public address on that network, an accurate picture of your transaction history can be built-- who, what, and when. Monero builds anonymity into the system using strong cryptographic principles, which makes it functionally impossible to trace coins, [10] attach names to wallets, or extract metadata from transactions. The development team actively publishes in the cryptography research community.
Anonymous transactions are not new-- we call it cash. Only in the past two decades has anonymity grown scarce in the first-world with the rise of credit cards and ubiquitous digital records. Personal data is becoming the most valuable resource on Earth, and there are many legitimate reasons for law-abiding citizens to want digital privacy, but it is true that with anonymity comes bad actors-- Monero is the currency of choice for the majority of black market (“darknet”) transactions. Similarly, US Dollars are the main vehicle for the $320B annual drug trade. An investment here should be based on the underlying cryptographic research and technology behind this coin, as well as competitors like Zcash. [11]

RaiBlocks (XRB)

Zero fees and instantaneous transfer make RaiBlocks extremely attractive for exchange of value, in many senses outperforming Bitcoin at its original intended purpose. This crypto has seen an explosion in price and exposure over the past month, and it may become the network of choice for transferring value within and between crypto exchanges.
Just in the first week of 2018: the CEO of Ledger (makers of the most popular hardware wallet on the market) waived the $50k code review fee to get RaiBlocks on his product, and XRB got listed on Binance and Kucoin, two of the largest altcoin exchanges globally. This is one to watch for 2018. [12]

VeChain (VEN)

Developed as a single answer to the problem of supply-chain logistics, VeChain is knocking on the door of a fast-growing $8 trillion industry. Every shipping container and packaged product in the world requires constant tracking and verification. A smart economy for logistics built on the blockchain promises greater efficiency and lower cost through the entire process flow.
Don’t take my word for it-- VeChain has investment from PwC (5th largest US corporation), Groupe Renault, Kuehne & Nagel (world’s largest freight company), and DIG (China’s largest wine importer). The Chinese government has mandated VeChain to serve as blockchain technology partner to the city of Gui’an, a special economic zone and testbed for China’s smart city of the future. This crypto has some of the strongest commercial partnerships in the industry, and a large active development team.
  1. “Investment” is a misnomer. Cryptos are traded like securities, but grant you no equity (like trading currency).
  2. The weeds for Bitcoin: basic intro (1:36), non-technical explanation (5:24), Bitcoin 101 – Andreas Antonopoulos (23:51).
  3. It is impossible to double-spend or create a fake transaction, as each ledger is confirmed against every other ledger.
  4. Some utility token blockchains use DAG networks or similar non-linear networks which don’t require mining.
  5. In practice, these are giant warehouses full of specialized computers constantly processing transactions. Miners locate to the cheapest electricity source, and the bulk of mining currently occurs in China.
  6. Centralized second-layer exchange websites have been hacked, but the core technology is untouched.
  7. This effect has been termed "bitcoinization".
  8. The Ethereum roadmap shows moving from a Proof of Work (PoW) to Proof of Stake (PoS) consensus model.
  9. At $2.62 per XRP token, Ripple already commands a $100B market cap.
  10. After a January 2017 update.
  11. Monero uses ring signatures while Zcash uses ZK-SNARKs to create anonymity. Both have pros and cons.
  12. Note: all signs point to this crypto being renamed “Nano” in the coming weeks: nano.co.
submitted by jhchawk to CryptoCurrency [link] [comments]

Ano ang BITCOIN for Beginners (tagalog) Bitcoin Basics ... Legit and scam sites on dark web  THE BIGGEST DEEP WEB GIFT CARD SITE! DOM: What You Need To Know What is Bitcoin? Bitcoin Explained Simply for Dummies ... Top Deep Web Sites 2019  Deep Web/Dark Net Exploration ...

Deep Web Drugs Sites - Do you want to buy legal or illegal drugs on the deep web without prescription and looking trusted darknet drugs market links then I have good collection of onion links where you can find all categories drugs information, these deep web drugs store only received payment via bitcoins The Chainalysis report reveals that Hydra has created a “complex drug delivery system” inside Russia and various countries in Europe as well. UPDATE: Wir haben jetzt noch eine weitere Liste mit 10 legalen Darknet-Seiten. UPDATE: Hier gibt es vier Darknet-Suchmaschinen im Vergleich. UPDATE: Wenn Ihr wissen wollt, wie Ihr eine eigene Seite ins Darknet stellen könnt, schaut in unsere Anleitung – das kann wirklich jeder! 1. Darknet-Suche im Normalo-Web. Darknet-Seiten haben keine der üblichen Domains wie DE, COM oder ORG, sondern ... Erowid is a non-profit educational & harm-reduction resource with 60 thousand pages of online information about psychoactive drugs, plants, chemicals, and technologies including entheogens, psychedelics, new psychoactive substances, research chemicals, stimulants, depressants and pharmaceuticals. This includes traditional, spiritual, and responsible use, info on health, effects, experiences ... From Bitcoin Wiki. Jump to: navigation, search. Bitcoin currency exchanges work in a manner similar to banks. One first deposits amounts of money in the currencies supported by the exchange, to his own account in the exchange, uses these balances to trade with other users of the exchange and then withdraws that money. Unlike over-the-counter transactions, there is no risk of losing money due ...

[index] [5005] [43313] [42547] [49688] [11069] [35791] [7328] [19723] [11956] [44492]

Ano ang BITCOIN for Beginners (tagalog) Bitcoin Basics ...

Onecoin promised the world, but only proved to be a trail of destruction. --- About ColdFusion --- ColdFusion is an Australian based online media company ind... This video was only made for an educational purpose, so please do not misuse and take action at own risk and responsibility! Thank You* ONION LINK : cash365ndbtwp7zn .onion Don't forget to add ... ano ang Bitcoin ...Mga kelangan malaman kung bakit kelangan natin pasukin ang cryptocurrency.sa susunod na gagawin ko na mga video ay magtuturo ako ng mga techn... DOM is a psychedelic that also has strong stimulant qualities. It has a fairly short history of use, though it was used for a little while in California decades ago. It's an amphetamine and it was ... https://shiftdelete.net/bitcoin-nasil-alinir-altcoin-satin-alma Bitcoin nasıl alınır diye merak ediyorsanız, hem BTC hem de altcoinlerin nasıl alınabildiğini...

#