How to backup a bitcoin wallet Zipmex

Everyday info sec, hardcore info sec, and DNMs

Edit: Since first post I have updated a few sections with additional information.
I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful.
I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips)
Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful.
I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both.
--------
Everyday Simple Info Sec:
-There could be a hidden administrator user on your PC, make sure to change its password
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted)
-Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password)
-use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good.
-Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question)
-------_
High level crimimal information security:
The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked.
Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible.
-Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown)
-Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities)
-rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password)
-Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade)
-Never use accounts that have been exposed to lower security on higher security machines
-your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak)
-Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
-------_
How to use dark net markets (DNMs)
If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential.
Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money.
-A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist)
-Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature)
-Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen)
-now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct.
-wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in
-test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews.
Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask.
No idea how long this will stay up, I might purge it in 7 days, or never.
submitted by seven_N_A7 to u/seven_N_A7 [link] [comments]

Cheapskates guide to not buying a hardware wallet and staying 100% safe

  1. Download Tails and install to USB drive
  2. verify Tails using OpenPGP
  3. Run Tails and open Electrum, it comes preinstalled
  4. Create wallet. Write down or print out SEED and backup wallet to a USB drive. Keep these in a fire safe.
  5. warning the tails usb drive deletes everything, make sure you saved to a 2nd flashdrive or the special storage option they have.
  6. On a different USB drive copy the MASTER PUBLIC KEY to a .txt file.
  7. Remove flash drives. Restart computer and boot windows. Download Electrum and import the MASTER PUBLIC KEY. This creates a Watch-Only wallet that will allow you view and recieve bitcoin.
  8. If you ever want to send bitcoin, just boot into Tails and send from there.
  9. Use the $60 you saved to buy moar bitcoin

Never use this tails drive for exploring on tor or anything except sending bitcoin. keep it pure and clean.
Never plug in your flashdrive with the wallet while running windows.
submitted by atrueretard to Bitcoin [link] [comments]

ABOUT BITCOIN CUSTODY

ABOUT BITCOIN CUSTODY

How to Securely Store Bitcoin


https://preview.redd.it/nmajb5k9t4p51.jpg?width=897&format=pjpg&auto=webp&s=fddbf2b60270672dbefb7a74c65b468ee764489a
Currently, Bitcoin investors usually store their Bitcoin holdings in cold or hot wallets. Cold wallets are usually hardware flash drives such as Ledger or Trezor wallets. which are not accessible from the Internet. Hot wallets, such as Electrum, are software wallets that are connected to Internet. Those investors who use “Buy and Hold” passive investment approach need to ensure a high level of security of their Bitcoin holdings. However, while holding Bitcoin in a crypto wallet provides certain level of security, it does not help investors to generate a passive income on their Bitcoin holdings.

https://preview.redd.it/r5314ylet4p51.jpg?width=999&format=pjpg&auto=webp&s=652a49546c78c8f202f0a97c7501cbd7272f1971
Alternatively, you can deposit your Bitcoin to a secure Bitcoin interest account and receive up to 6% annually. We partner with BlockFi that offers high-yield Bitcoin savings accounts to customers from all over the world. BlockFi holds its Bitcoin and other digital asset reserves with Gemini. Gemini is a New York trust company regulated by the New York State Department of Financial Services. It is registered as a Qualified Custodian under New York Banking Law and has excellent reputation in the crypto space. Gemini stores digital assets using the most secure and compliant custody solution on the market.
You can learn more about Bitcoin and its custody here.
Legal Disclosure: The information contained in this article is the property of Digital Finance LLC and cannot be republished without our prior permission.
Digital Finance is a Washington, DC, financial company that specializes exclusively in the Bitcoin market. We provide easy and compliant exposure to digital assets and help our customers from all over the world toinstantly buy Bitcoin and earn up to 6% annually on their Bitcoin holdings.
submitted by MaximNurov to u/MaximNurov [link] [comments]

Bittrex Review: One of the First Crypto Exchanges| Final Part

Bittrex Review: One of the First Crypto Exchanges| Final Part

4. Transaction Fees

Transferring funds across the blockchain and withdrawing them from Bittrex costs a fee for customers, with the rate unique for every coin.
Bittrex Global charges no commission for deposits. Please keep in mind that some tokens or cash may be required to perform a transaction by a crypto coin or token’s community. Bittrex crypto exchange can’t keep away from it.
Every token or coin has a blockchain transaction fee that is built in it, and the Bittrex fee is a small amount to cover this charge. You can view the fee percentage for every coin or token by clicking Withdrawal near to the coin. There you will see a transaction fee you will be charged for withdrawing a specific coin or token.
In the example below, the withdrawal fee amounts to 1 USDT
https://preview.redd.it/209uz2p64zh51.jpg?width=974&format=pjpg&auto=webp&s=9ee9355c4d75d41931a3073b8a230bd1ffddaf08
The transaction fee for Bitcoin came to 0.00050000 BTC
https://preview.redd.it/vh7zbe884zh51.jpg?width=974&format=pjpg&auto=webp&s=e6293650b46a7e0ba661478bd2467471b8b213f9

5. Trading Fees

The fee schedule below provides the applicable rate based on the account's 30-Day Volume and if the order is a maker or taker.
Bittrex Global Fee30 Day Volume (USD)MakerTaker$0k - $50k0.2%0.2%$50k - $1M0.12%0.18%$1M - $10M0.05%0.15%$10M - $60M0.02%0.1%$60M+0%0.08%>$100MContact TAM representative
Trading expenses are incurred when an order is prepared by means of the Bittrex worldwide matching engine. While an order is being executed, the purchaser and the vendor are charged a rate primarily based on the order’s amount. The fee charged by Bittrex exchange is calculated by the formula amount * buy rate * fee. There aren't any charges for placing an order which is not being executed so far. Any portion of an unfinished order will be refunded completely upon order cancelation.
Prices vary depending on the currency pair, monthly trade volume, and whether the order is a maker or taker. Bittrex reserves the right to alternate fee quotes at any time, including offering various discounts and incentive packages.

Monthly Volume

Your buying and selling volume affects the fee you pay for every order. Our expenses are built to encourage customers who ensure liquidity in the Bittrex crypto exchange markets. Your buying and selling charges are reduced according to your trade volume for the last 30 years in dollars.
Bittrex calculates the 30-day value every day, updating every account's volume calculation and buying and selling charge between of 12:30 AM UTC and 01:30 AM UTC every day.
You can check your monthly trade volume by logging in and opening Account > My Activity.
https://preview.redd.it/n1djh2ob4zh51.jpg?width=974&format=pjpg&auto=webp&s=2eebb9c9ac63de207c4dd2e49bc45aeb53a8dec8

6. Withdrawing Funds

Withdrawing any type of funds is likewise simple. You can profit by buying and selling Bitcoin, Ether, or any other cryptocurrency.
You determine the crypto address—to which the amount will be credited—and the transaction amount. The withdrawal fee will be automatically calculated and shown right away.
After confirming the transaction, the finances will be sent to the specified addresses and all that you need to do is to wait for the community to confirm the transaction.
If the 2FA is enabled, then the user receives a special code (via SMS or application) to confirm the withdrawal.

7. How to Trade on Bittrex Global

Currency selling and buying transactions are performed using the Sell and Buy buttons, accordingly.
To begin with, the dealer selects a currency pair and sees a graph of the rate dynamics and different values for the pair.
Below the chart, there is a section with orders where the user can buy or sell a virtual asset.
To create an order, you just need to specify the order type, price, and quantity. And do not forget about the 0.25% trade fee whatever the quantity.
For optimum profit, stay with liquid assets as they can be quickly sold at a near-market rate effective at the time of the transaction. Bittrex offers no referral program; so buying and selling crypto is the easiest way to earn.
https://preview.redd.it/hopm6fih4zh51.jpg?width=1302&format=pjpg&auto=webp&s=68c0aaae86f64c3e6b9d351c3df2a9c331f94038

Order Types

Bittrex helps you alternate Limit and Stop-Limit orders.
A limit order or a simple limit order is performed when the asset fee reaches—or even exceeds—the price the trader seeks. To execute such an order, it is required that there's a counter market order on the platform that has the identical fee as the limit order.

Differences between Limit Order and Stop Limit Order

A stop limit order is a mixture of a stop limit order and a limit order. In such an application, charges are indicated—a stop charge and the limit.

Stop Limit Order Purpose

https://preview.redd.it/hlxvy9ti4zh51.jpg?width=1141&format=pjpg&auto=webp&s=064a77459a4dcb4555a885cbc56629aae10fc38b

Trade Terminal

Let’s discuss how you could trade conveniently with our service.
The key features include a user-friendly interface and precise currency pair statistics (timeframe graphs, network data, trade volumes, and so forth).
The platform’s top-notch advantage is handy, easy-to-analyze, customizable charts. There is also a column for quick switching between currency pairs and an order panel beneath the fee chart. Such an all-encompassing visual solution helps compare orders efficiently and in one place.
You can use the terminal in a day or night mode; when in the night mode, the icon in the upper-right corner changes and notice the Bittrex trading terminal in night mode is displayed. The main menu consists of 4 sections: Markets, Orders, Wallets, Settings.
Markets are the trade section. Bittrex allows handling over 270 currency pairs.
Orders. To see all open orders, go to OrdersOpen.
To see completed orders, go to OrdersCompleted.
Wallets. The Wallets tab displays many wallets for all cryptocurrencies supported by the exchange and the current balance of each of them.
After refilling the balance or creating a buy or sale order, you will see all actions in the section. Bittrex allows creating a separate wallet for every coin. Additionally, you can see how the coin price has changed, in terms of percentage, throughout the day.
Here’s what you can also do with your wallets:
  • Hide zero balances: hide currencies with zero balance
  • Green and red arrows: replenish balance/withdraw funds
  • Find: search for a cryptocurrency
The Settings section helps manage your account, verification, 2FA, password modification, API connection, and many more.

How to Sell

The process of selling crypto assets follows the same algorithm. The only difference is that after choosing the exchange direction, you need to initiate a Sell order. All the rest is similar: you select the order type, specify the quantity and price, and click Sell *Currency Name* (Sell Bitcoin in our case).
If you scroll the screen, the entire history of trades and orders will be displayed below.

LONG and SHORT

You can make a long deal or a short deal. Your choice depends on whether you expect an asset to fall or rise in price.
Long positions are a classic trading method. It concerns purchasing an asset to profit when its value increases. Long positions are carried out through any brokers and do not require a margin account. In this case, the trader’s account must have enough funds to cover the transaction.
Losses in a long position are considered to be limited; no matter when the trade starts, the price will not fall below zero with all possible errors. Short positions, in contrast, are used to profit from a falling market. A trader buys a financial instrument from a broker and sells it. After the price reaches the target level, the trader buys back the assets or buys them to pay off the initial debt to the broker.
A short position yields profit if the price falls, and it is considered unprofitable the price matches the asset value. Performing a short order requires a margin account as a trader borrows valuable assets from a broker to complete a transaction. Long transactions help gain from market growth; short from a market decline.

Trade via API

Bittrex also supports algorithmic trading through extensive APIs (application programming interface), which allows you to automate the trading process using third-party services.
To create an API key, the user must enable the two-factor authentication 2FA, verify their account, and log in to the site within 3 minutes.
If all the requirements of the system are fulfilled, you can proceed to generate the API key. Log in to your Bittrex account, click Settings. Find API Keys. Click Add new key (Create a new key).
Toggle on / off settings for READ INFO, TRADE, or WITHDRAW, depending on what functionality you want to use for our API key.
Click Save and enter the 2FA code from the authenticator → Confirm.
The secret key will be displayed only once and will disappear after the page is refreshed. Make sure you saved it!
To delete an API key, click X in the right corner for the key that you want to delete, then click Save, enter the 2FA code from the authenticator and click Confirm.

Bittrex Bot, a Trader’s Assistant

Robotized programs that appeared sometimes after the appearance of cryptocurrency exchanges save users from monotonous work and allow automating the trading process.
Bots for trading digital money work like all the other bots: they perform mechanical trading according to the preset parameters.
Currently, one of Bittrex’s most popular trading bots is Bittrex Flash Crash Buyer Bot that helps traders profit from altcoin volatility without missing the right moment.
The program monitors all the market changes in the market every second; also, it even can place an order in advance. The Bittrex bot can handle a stop loss—to sell a certain amount of currency when the rate changes in a favorable direction and reaches a certain level.

8. Secure Platform

Bittrex Global employs the most reliable and effective security technologies available. There are many cases of theft, fraud. It is no coincidence that the currency is compared to the Wild West, especially if we compare the 1800s when cowboys rushed to the West Coast of America to earn and start something new in a place that had no rules.
Cryptocurrency is still wild. One can earn and lose money fast. But Bittrex has a substantial security policy thanks to the team’s huge experience in security and development for companies such as Microsoft, Amazon, Qualys, and Blackberry.
The system employs an elastic, multi-stage holding strategy to ensure that the majority of funds are kept in cold storage for extra safety.
Bittrex Global also enables the two-factor authentication for all users and provides a host of additional security features to provide multiple layers of protection.
Bittrex cold wallet: https://bitinfocharts.com/en/bitcoin/address/385cR5DM96n1HvBDMzLHPYcw89fZAXULJP

How to Pass IP Verification

To ensure higher security of your Bittrex Global account, the system requires all users to approve each new IP address through an email confirmation. This IP verification procedure is required every time you attempt to log in from a new IP Address.
Confirming your IP address.
https://preview.redd.it/rnl730z75zh51.jpg?width=971&format=pjpg&auto=webp&s=bd13fba0a844ab01cadc40003f5ea5de7439cbf9
The new IP address must be confirmed from the device that you are using to access Bittrex Global. This means that you must follow the CLICK HERE TO LOGIN link in an email on the device that you want to use to access your account.
https://preview.redd.it/tq9eje795zh51.jpg?width=607&format=pjpg&auto=webp&s=160b2ebfd1b9e0a287d4d2b99017dd45518ef2f7
To ensure even more security, Bittrex Global supports whitelisting of IP addresses and Crypto addresses. These two features can help protect the account in the event of credentials or API key loss.

How to Add IP Address to Whitelist

By setting one or more whitelisted addresses, you are telling Bittrex Global to only authorize trades or withdrawals from those IPs. This concerns both the global.bittrex.com web interface and API-based trades or withdrawals. To do this, click IP Whitelist in Site Settings.
https://preview.redd.it/m2klahja5zh51.jpg?width=971&format=pjpg&auto=webp&s=7cfb941ecb5284973baed1a2b0301459e36a0ab6

How to Add Crypto Address to Whitelist

By setting a withdrawal address, you are telling Bittrex Global to authorize withdrawals only to that address.
This concerns both the global.bittrex.com web interface and API based withdrawals.
Note that when opting into this feature, you need to specify a withdrawal address would like to withdraw funds from for every currency. To do this, click Withdrawal Whitelist in the Site Settings section. The example below shows a BTC address.
https://preview.redd.it/yrror8zd5zh51.jpg?width=974&format=pjpg&auto=webp&s=179dd7da9f6e59d3fca628cbfcd2c3962562f911

Afterword

Bittrex Global is a reliable and advanced platform for trading digital assets with a respected reputation, long history, and active market presence and development nowadays. The exchange is eligible to be used globally, including the US and its territories.
The legal component of Bittrex Global is one of the most legitimate among numerous crypto-asset exchanges.
The Bittrex team has had great ambitions and managed to deliver promises and more. The exchange staff comprises forward-thinking and exceptional individuals whose success is recognized in the traditional business and blockchain sector.
Bittrex's purpose is to be the driving force in the blockchain revolution, expanding the application, importance, and accessibility of this game-changing technology worldwide.
The exchange fosters new and innovative blockchain and related projects that could potentially change the way money and assets are managed globally.
Alongside innovation, safety will always be the main priority of the company. The platform utilizes the most reliable and effective practices and available technologies to protect user accounts. Bittrex customers have always primarily been those who appreciate the highest degree of security.
Because of the way the Bittrex trading platform is designed, it can easily scale to always provide instant order execution for any number of new customers.
Bittrex supports algorithmic trading and empowers its customers with extensive APIs for more automated and profitable trading.
One of the common features which is not available on the exchange is margin trading. No leverage used however adds up to the exchange's stability and prevents fast money seekers and risky traders from entering the exchange.
Bittrex is a force of the blockchain revolution and an important entity of the emerging sector.
The full version
First part
Second part
submitted by mPrestige to revain_org [link] [comments]

Make your own stakebox. Ultimate beginners guide how to compile any wallet on AARCH64 (Raspbery pi and other SBC)

I contemplated to wrote this for a long time, so it's finally time.
As you know a lot of altcoins uses PoS (Proof-of-stake) way of "mining" coins. Which basically means, that you hold coins on your unlocked wallet and you are receiving stakes as a reward. This requires very little power and it can bring you a lot of rewards, at just 10W from the wall.
So first I am using latest Raspbian on RPI4B 4GB in this example.Setting up Raspbian is not part of this process since it's very well documented. I recommend to change user from pi to something else due to security concerns and you can also do other stuff just search "security Raspberry PI" and you find a lot of articles, but this is not the focus of this guide.
I know there are a lot of guides on the internet, but I am using like 5 sources, so it's compiled what other people wrote and some of my research.
I am using AnyDesk insted of SSH or VNC server, because it works it's ligthweit and it just works.
So after you see the gui of Raspbian, just launch terminal (CTRL + ALT + T) and do basic thing:
sudo apt-get update && sudo apt-get upgrade
Than press Y and let it run, after is finished, we need to prepare so dependency packages. Since most of the wallets using Berkeley DB 4.8 we need to obtain it.
So in terminal wrote:
cd cd Downloads wget http://download.oracle.com/berkeley-db/db-4.8.30.NC.tar.gz tar -xzvf db-4.8.30.NC.tar.gz cd db-4.8.30.NC/build_unix ../dist/configure --enable-cxx make sudo make install 
So wait unti it's finished and than you can delete files in Downloads folder in gui or use:
sudo rm -r [folder] 
So next thing we need to install some libraries.
sudo apt-get install git build-essential libtool autotools-dev autoconf pkg-config libssl-dev libcrypto++-dev libevent-dev libminiupnpc-dev libgmp-dev libboost-all-dev devscripts libdb++-dev libsodium-dev 
And pres y and let it run. After that another set of libraries:
sudo apt-get install libqt5gui5 libqt5core5a libqt5dbus5 qttools5-dev qttools5-dev-tools libprotobuf-dev protobuf-compiler libcrypto++- dev libminiupnpc-dev qt5-default 
And then again pres y and let it run. Some wallets need older version of libssl1.0-dev, so for for safe compiling we install that as well:
sudo apt-get install libssl1.0-dev 
Pres y and let it run. Warning don't use sudo-apt get autoremove, since it would wipe this package, since it's old.
Next thing we are going to obtain Bitcoin PPA filest, which can be done like this.
cd /etc/apt/sources.list.d/ sudo nano bitcoin.list 
Paste this in there:
deb-src http://ppa.launchpad.net/bitcoin/bitcoin/ubuntu artful main 
And CTRL+X and than y, then do this:
sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv C70EF1F0305A1ADB9986DBD8D46F45428842CE5E sudo apt-get update 
So now we are ready for compiling. So we are going create folders. CD yourself where this folder should be situated, if you for example have plugged in some external drive. Then:
mkdir Crypto cd Crypto 
And then we have to choose wallet which you want to compile. I am choosing Streamies (STRMS) as an example, since it's pretty good coin for staking. So:
mkdir Streamies cd Streamies 
Then go to the github page and click on the green button on the left and click copy to clipboard, which gives you git link.
git clone https://github.com/Streamies/Streamies.git 
Watch the output folder which it creates, it's stated in the first two lines and copy then by highliting the text and CTRL+SHIFT+C copy it to your clipboard.
cd Streamies (this is that git created folder) ./autogen.sh ./configure CPPFLAGS="-I/uslocal/BerkeleyDB.4.8/include -O2" LDFLAGS="-L/uslocal/BerkeleyDB.4.8/lib" sudo make (this could take hours) sudo make install 
And you are done, files is going to be in folder /uslocal/bin (DO NOT delete git created folder, because you are going to need it for faster compiling, when wallet get's and update.)
cd /uslocal/bin 
Now you can list files by:
ls 
And then you can copy/move them where ever you want by using:
sudo mv * [destination full path] 
Let it run and go back to folder where you move those files.
sudo chmod +x streamies-qt (since we want to run wallet) 
In most cases compiled files are going to in format of "shared library" so we need to create script to run it. Open up a text editor from gui or through nano. And paste this to that file:
#!/bin/bash ./streamies-qt 
And save it as a sh file, for example run.sh. Then we need to make it runnable so:
sudo chmod +x run.sh 
Now to run it, it's just:
./run.sh 
And here we are glorious GUI wallet appears and you are done, you can paste blockchain, wallet.dat from other sources, so this migration is pretty easy and you, if you have it on for exaple flash disk.
So this is basic how to compile QT wallets on AARCH64. I am running 7 wallets, 2 of those are Masternodes and RPI 4B 4GB would handle way more, I am at best on half of my RAM.
Some wallets need more package, but it's not much of and issue, since compiling stops and you just copy paste nape which is missing put it in the google and add "apt-get" after the name of package and you are going to see, what is the name of the packages so it can be retreived from package assinstant aka apt-get. So basically:
sudo apt-get install [package name] 
Then press y and again wrote:
sudo make 
This process is going to continue where it was left off, so nothing is going to run from beginning.
Updating wallets is basically exactly same, just repeat steps from "git clone" and after that proceed as it was written above.
So I hope this helps some of you, to use this at home and not on some VPS, if you are anxious as me, to host my wallets on remote server.
submitted by M1chlCZ to CryptoCurrency [link] [comments]

Choosing The Best Multi-Currency Wallet For Crypto in 2020

Crypto differs from fiat in terms of storage. It is saved not in some kind of virtual bank, but directly in the blockchain. The coins, information on the distribution of digital assets between users, transaction history – all this data is stored by the chain. Such data cannot be changed or erased in any way. And without a crypto wallet, you cannot manage your assets.

Let’s have a look at different types of crypto wallets.

A cryptocurrency wallet stores your “private” and “public” keys used to send and receive various crypto tokens. The interface and design of the programs help users to get all the necessary information about their digital savings.
There are two types of wallets:

How do cryptocurrency wallets work?

Cryptocurrency wallets are not designed to actually store digital assets; instead, they provide the tools necessary to interact with the blockchain network. The wallet includes a public address, which is an identifier in the form of a set of letters and numbers. This address is a kind of location on the blockchain where you can send coins. You can share your public address with another user to receive funds, but you should never show your private key to anyone.
A private key provides access to your cryptocurrencies, regardless of which wallet you use. Thus, even if your computer or smartphone was compromised, you can still access your funds from any other device, provided that you have the appropriate private key (or seed phrase).

Types of wallets

Web wallet

This type of wallet is suitable for beginners, since it does not require the purchase of devices, software installation, or downloading the blockchain. It is enough for the user to register on the site. Web wallets are simple and convenient to use, they do not take up space on the HDD and are constantly synchronized with the blockchain network, even when your computer is offline.
Cryptopay enables customers to transfer money directly between their Cryptopay wallet and SEPA (Single Euro Payments Area) bank account, store their funds safely in a multi-coin portfolio, protected by two-factor authentication to increase security.
Coinbase is a trading service that many retailers use to receive digital currencies from sales. Private keys are stored on the server, and client funds are stored on a cold wallet. You can enable two-factor authentication and install the smartphone app.

Desktop wallet

The local wallet is installed on the hard drive and loaded with the operating system. Such wallets are divided into “thick” (full-node clients) and “thin” (light-node clients). Thick ones can take up to hundreds of gigabytes of hard drive space. Thin local wallet is actually a program that makes requests to the blockchain through a trusted site.
Bitcoin Core is a Bitcoin wallet created by the Bitcoin Foundation. If you want to get a truly secure place for your digital assets, choose this thick desktop wallet.
Exodus is a universal thin crypto wallet. It supports 100+ altcoins and has a built-in exchange service. Also, Exodus can interact with the Trezor Crypto Hardware Wallet.

Mobile phone and browser wallets

Mobile wallets are available through special applications. You can use them for shopping in real stores where crypto is accepted – just like ApplePay.
Benefits of Mobile Wallets:
Disadvantages of mobile wallets:
Coinomi is a multi-currency application with two integrated exchange services (Shapeshift and Changelly). The wallet supports 100+ virtual coins, the keys are stored exclusively in the application.
Browser wallet is an extension for Chrome and Opera browsers. It is very easy to use: you just enter seed phrases and get access to the savings.
The Jaxx extension for Chrome from the team of developers of the browser wallet KryptoKit, supports not only Bitcoin, but Ethereum as well.

Hardware wallet

This is the most reliable option for saving virtual assets. They look like ordinary USB flash drives. The user inserts a USB, logs on a wallet program by entering a password and thus gets access to the funds. All operations are performed not in the system, but directly on the flash drive itself, which eliminates extraneous access to data.
Trezor wallet supports most of the top coins, it can be synchronized with the MyEtherWallet online wallet, as well as Chrome and Firefox browsers to get access to crypto funds.
Ledger Nano S is miniature, safe, and easy to use and has several levels of protection. Asset management is performed through the Ledger Manager utility.

Paper wallet

A paper wallet is a piece of paper that usually has QR codes that can be quickly scanned to get the address to a crypto account. The main advantage of services like BitAddress and Bitcoin Paper Wallet is that the keys are actually stored offline, which makes them immune to hacker attacks. The main drawback, however, is that the paper wallet can be stolen or lost.

Which wallet is the safest?

An offline crypto wallet is the most reliable one. You can install a local wallet on a PC that is not connected to the Internet and store your digital assets on it, but this is not very convenient if you need to quickly complete a transaction.

Conclusion

The choice depends on how you plan to use your tokens. Small amounts of crypto can be stored on thin local or Internet wallets, and for long-term storage of large amounts, it is better to get thick or hardware wallets. In any case, remember to strictly observe all security measures.
submitted by CoinjoyAssistant to u/CoinjoyAssistant [link] [comments]

Tkeycoin — security, that’s what we’re betting on

Tkeycoin — security, that’s what we’re betting on
Today we will talk about the security of using the Tkeycoin platform and the TKEYSPACE mobile blockchain wallet.
Tkeycoin is a peer-to-peer payment system based on p2p principles and the concept of electronic cash. P2P technology is a fairer means of mutual settlements between users and companies around the world. Modern payment systems are imperfect and may depend on the will of high-ranking officials.
We approached the market from an economic and scientific point of view, borrowing the best from Bitcoin, Ethereum, DASH, and other alternative currencies, mixing modern concepts and building on the global experience of IBM, Microsoft and a number of other companies and research.
The Tkeycoin blockchain is protected by various mechanisms that include advanced cryptographic methods and mathematical models of behavior and decision-making. Blockchain technology prevents duplication or destruction of digital assets.

https://i.redd.it/idy42g9rntx41.gif
In addition to providing security and recording transactions in registers, cryptography also plays a role in ensuring the security of wallets used to store Tkeycoin. Paired public and private keys, which respectively allow users to receive and send payments, are created using asymmetric encryption or public-key cryptography. Public keys are used to generate digital signatures for transactions, which allows you to authenticate ownership of the coins being sent.

https://i.redd.it/95yuky0tntx41.gif
The asymmetric cryptography architecture does not allow anyone other than the owner of the private key to access funds stored in the cryptocurrency wallet, so these funds are kept safe until the owner decides to spend them.
In simple words, in the Tkeycoin peer-to-peer system, only you are the real owner of your money and only You have access to it.
Using tools such as a local Tkeycoin Core wallet or TkeySpace provides you with reliable storage, privacy, and security.
TkeySpace, in turn, adds maximum usability by combining the highest level of security and easy intuitive design.

https://i.redd.it/f0de51vuntx41.gif

How does TKEYSPACE provide security?

TKEYSPACE is one of the first applications that support blockchain in a mobile device and is also the first decentralized application of the TKEY platform.
Its serverless architecture provides the highest level of security for storing all assets in the application. unlike centralized applications that are managed by companies, TkeySpace does not have a Central management authority and operates in accordance with all the principles of peer-to-peer networks.

https://preview.redd.it/4bret8hwntx41.png?width=1253&format=png&auto=webp&s=535c5d879a36eac4ca8c807ee7af1b5fe05e12a9
As we said above, the wallets in the blockchain have a public and private key. Centralized applications usually store users ‘private keys on their servers, which makes users’ funds vulnerable to hacker attacks or theft.
TkeySpace-stores the encrypted key only on the user’s device and in encrypted form. The encrypted key is displayed as a mnemonic phrase (backup phrase), which is very convenient for users. Unlike complex cryptographic ciphers, the phrase is easy to save or write. The backup phrase provides the maximum level of security and thanks to its usual appearance, an attacker is unlikely to ever guess what these words are and what they are for.
A mnemonic phrase is 12 or 24 words that are generated using random number entropy. If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation.
And so that you do not get confused in the definitions and concepts, we will briefly describe simple and clear principles of how it all works. Let’s look briefly at the factors.

Lock Screen

The simplest thing that protects your phone from unauthorized access is Pincode, a snake, a fingerprint or a Face Id login. And it would seem that this is related to TKEYSPACE?
https://i.redd.it/sspjjsgyntx41.gif
  • At a minimum, it is almost impossible to open new mobile devices and pick up a pin code, even in the case of theft, most often the factory settings are reset, which leads to the deletion of all data on the phone, respectively-your funds are safe even for this reason.
  • Even if there was some “craftsman” and somehow managed to change the pin code on your device, the TKEYSPACE app will automatically delete all the keys and backup phrases, the wallet will simply be empty, and the attacker will be left with nothing.
As we can see, even a simple screen lock with a pin or fingerprint protects your data. It’s not as simple a screen lock as you and I might think.
Every platform, whether it’s Android or AppStore, uses specialized key stores. Cryptography, symmetric and asymmetric encryption, keys, and certificates are directly related to this task.
Keys and certificates that are used to protect information must also be securely protected. Android uses Keystore, a certificate and a Keystore, for this purpose.
Keystore is a specialized secret data store that is used by Java applications to encrypt, authenticate, and establish HTTPS connections.
For two-way authentication, the client and server exchange certificates, respectively, and the server and client must have a Keystore with a private/public key pair and a certificate. In other words, the Keystore is used to store keys and certificates that are used to identify the key owner (client or server).
Starting with Android 8, the encryption systems have been upgraded, the system is checked for signs of hacking at startup, and the screen lock allows you to restrict access to the device. Data encryption and the use of keys ensure the security of information when it is stored and transmitted.

https://i.redd.it/2c0b9re1otx41.gif
In the new version of the OS — Android 9 (Pie) — the developers also added support for hardware to protect against unauthorized changes.
Android apps run in an isolated software environment that restricts access to your information to other apps. OS components are also protected, which prevents attackers from exploiting system errors for their purposes.
Android uses both hardware and software to protect users and their data. Therefore, even at the operating system level, there are a lot of security factors. Of course, if you “flash” the phone (change the factory firmware) and enable Root access, this will reduce the security of Your device, but this is more an exception than a rule and such changes are usually introduced by very experienced users.
IOS uses Keychain — a specialized database for storing metadata and confidential information. Using a Keychain is the best practice for storing small pieces of data that are critical to your apps, such as secrets and passwords. In addition to the Keychain, Apple provides a full range of maximum protection for Your device.
And so we will continue,

Passcode in the app

Now we understand that to get access to the tools, an attacker needs to hack the hardware security of the Google and Apple giants to somehow get access to the app, which is impossible.
To increase security and eliminate other risk factors, we have included an access code (secret code) in the app.
You set an additional level of security by enabling a pin code to log in to the app. The access code additionally encrypts all data stored in the app.
Just so you understand — it’s not just numbers that you enter on the screen, this combination affects the ciphers inside the app. When creating a key, a user interface element is called. when the user swipes the screen, the application receives a random set of bytes — thus, all information is additionally covered by a new layer of cryptography.
And as we said above, if you try to disable the pin code, the app will delete all the data, and the attacker will be left with nothing.
As we have already realized, only 2 of these factors provide the maximum level of security for the TKEYSPACE application.
And the most important thing is that the application runs on the blockchain, which guarantees its full Autonomous operation, data immutability, and privacy.
Generation of new addresses, absence of accounts, phone numbers, e-mail and other personal data-provides you with a social level of security, which is a huge advantage in our time.
In a world where security is based on the level of cryptography, attackers try to influence You with the human factor using social engineering, so when you use applications with accounts, phone numbers, you have more risks.
Social engineering is a method of obtaining the necessary access to information based on the characteristics of human psychology.
For example, a copy of a SIM-card has become a new tool for fraudsters, but there is no personal information in TKEYSPACE, so even such groups of fraudsters can’t get access to your funds.

You don’t have to worry about security — it’s already built into the TKEYSPACE system.

A mixed encryption system based on the principles of computational complexity, with the deterministic generation of signatures using elliptic curves, provides absolute security and safety of user funds, and reserve phrases will help you restore funds at any moment.
A mnemonic phrase is 12 or 24 words that are generated using the entropy of random numbers.
If the phrase consists of 12 words, then the number of possible combinations is 2048¹² or 211³² — the phrase will have 132 security bits. To restore the wallet, you must enter the mnemonic phrase in the strict order as it was presented after generation.
Only you and no one else has access to the phrase. When you get the key, the app has restrictions on the screenshot, and the clipboard is disabled, which protects against malicious software.
It is you, as a user, who sees the phrases, and everything in the device is encrypted, the blockchain architecture protects against hacker attacks, information forgery, and other hacks.
For those who are a bit obsessed with persecution mania, we offer a small lifehack:
Buy several USB drives, connect them to a device that does not have access to the Internet, preferably on a clean operating system, create a text file, write backup phrases there, and encrypt the USB drives with passwords.

https://i.redd.it/shan90o4otx41.gif
Once again, to ensure security and easy recovery, it is enough to record backup phrases once and make several backups. you do not need to resort to an additional encryption method, because we have already done everything for you :)
https://i.redd.it/ogpu09l6otx41.gif
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Bitcoins - Should You Use Them?

Bitcoin was released as an exclusive effort in 2009. Unlike typical currencies, such as the Euro, Sterling and Dollar, it is not regulated by a central financial authority. Instead, it is underpinned by a peer-to-peer network of its customers' computers. This resembles just how Skype, a video clip conversation service, runs.
nuv mining
The basic device of value is the bitcoin. However each bitcoin can be partitioned into satoshies. One satoshi is equal to one hundred millionth of a bitcoin (ie, a bitcoin divided to 8 decimal places).
nuvmining
Bitcoins and satoshies can be transferred from one web individual to an additional in order to pay for products or services at virtually zero price. This enables you to make international transfers without needing to mess around with currency exchange rate as well as burdensome financial institution fees. Bitcoins can be bought and sold for conventional cash money at unique exchanges.
Bitcoin pocketbooks
In order to make use of Bitcoin, you require a budget, an unique piece of software in which you keep, send out and also get bitcoins. There are three sort of wallets, software program pocketbooks, mobile pocketbooks and also internet purses.
Software program budgets are mounted on your computer system and they give you complete control over your purse Mobile wallets are installed in your smart device or tablet and enable you to make use of Bitcoin for day-to-day deals in stores and supermarkets by checking a fast feedback (QR) code. Internet wallets lie on the Internet, ie they are a form of cloud storage space.
Payments using bitcoins are incredibly simple. They can be made from purses on your computer system or smartphone just by going into the receiver's address, the amount and afterwards pushing send. Smartphones can additionally acquire a receiver's address by checking a QR code or by bringing two phones that contain near-field-communication (NFC) innovation, a kind of radio communication, near to each other.
Obtaining repayments is equally as easy ... all you need to do is give the payer your bitcoin address.
Shielding your wallet.
A bitcoin purse resembles a budget full of cash. To minimize the danger of loss, you ought to maintain just percentages of bitcoins in your computer system or smart device and also maintain the mass of your bitcoins in a more secure atmosphere, such as an offline purse. Given your wallet has actually been secured, an offline back-up will certainly allow you to recoup your purse, ought to your computer system or mobile phone be taken.
Securing your purse enables you to set a password that needs to be input before funds can be withdrawn. Nonetheless, recovering a bitcoin password is impossible if it is shed. That is why you require to be definitely sure you can remember your password. If the value of your bitcoins is considerable, you could store the password in a safe-deposit box or anywhere you save vital papers.
In order to be as protected as feasible, you ought to keep off-line alternatives in a number of locations making use of different media such as USB flash drives and CDs.
Since bitcoin runs on software you download and install to your computer (COMPUTER or laptop computer) or smart device, you require to update this software on a regular basis in order to maintain your purses as well as deals safe.
Benefits of bitcoins
Bitcoins have numerous substantial advantages:
1-you can send and also get unlimited quantities of cash quickly at any moment to and from anywhere in the world.
2-processing does not set you back any kind of charges or only really little costs.
3-bitcoin deals are permanent, which protects vendors from the fraudulent chargebacks that are progressively common with bank card.
4-payments are made without individual information being traded, which provides solid security against identity burglary.
5-the invoice and settlement process is completely neutral, transparent and predictable.
submitted by Nuvmining to u/Nuvmining [link] [comments]

The best Tezos Wallets

The best Tezos Wallets
Tezos is a decentralized blockchain that simplifies formal verification, a method that mathematically proves the accuracy of the code controlling transactions. The Tezos blockchain has its own cryptocurrency called Tezos (XTZ), a cryptocurrency with two main functions – a self-administration system and the ability to form launch contracts using its own programming language – Michelson.
If you decide to convert your fiat savings into Tezos or exchange other cryptocurrencies for XTZ, you may have to make a choice among reliable wallets for this. In this article we will look into the best Tezos Wallets so that can help you understand them better.

Hardware Wallets

Hardware wallets are not liable to spam, viruses, phishing attacks, or malicious of the system. Moreover, they provide a high degree of protection to the private keys. Below is the list of hardware wallets that can be used for XTZ.
https://preview.redd.it/j79t9vbgeth31.jpg?width=800&format=pjpg&auto=webp&s=d828387479fc4a2efed4fc857eb9bdf03f9878e9
  • Ledger Nano S
Nano S is a hard wallet from the product line of Ledger, a French manufacturer company. As all other Ledger products, Nano S traditionally looks like a USB flash drive. But this time, you will need to use the USB cable that comes with the wallet to connect to a computer. Ledger Nano S has a chip that is similar with chips on bank cards or biometric passports. Your private key is stored in an isolated environment and is effectively protected. Ledger Nano S also has a screen on it where you can see each transaction made. In case you lose your Nano S wallet, the account can be easily restored on any other Ledger device. Ledger Nano S supports over 20 cryptocurrencies including Tezos (XTZ).
  • Trezor Model T
Trezor T is the flagship model from the well-known Czech manufacturer SatoshiLabs. Model T has a color Touch-Screen display, an SD port and a quantity of supported coins – XTZ is among those coins. When Trezor T is not connected to the computer, it turns off and disconnects from the Internet. Thus, user funds are stored on the device beyond the reach of attackers. Trezor hardware case is ultrasonically soldered, making it difficult to be restored after being damaged.

Web Wallets

Web wallets can be a simple way to get started investing in cryptocurrency. All web wallets can be used right from a browser without the need of downloading software. Beyond that, many of web wallets offer free mobile apps.
  • TezBox Wallet
TezBox was the first GUI released for Tezos. The wallet was developed by the Tezos community and released during the ICO period. TezBox is available for web, desktop and mobile wallets with its user-friendly interface. Users may be assured that all private keys will be stored on their devices safely due to the secured wallet interface. TexBox is the first wallet integrated with hardware wallets Trezor and Ledger Nano S that gives it the increased security.

https://preview.redd.it/zmnx9fwpeth31.png?width=1696&format=png&auto=webp&s=d926f570fb736dd6fcd338fae270cdcfebad9654
  • Guarda Wallet
Guarda Wallet is available as a Web, Mobile and Desktop Wallet and a Chrome extension. It supports more than 40 coins and 10,000 tokens as well as XTZ. The web wallet enables to access cryptocurrency from any modern browser, the website itself looks presentable and made convenient to use. Using the mobile wallet, you can create a new wallet or import an existing one. Besides the common functions such as storage, deposit/withdrawal of cryptocurrency, users can instantly buy the exact amount of cryptocurrency using a bank card or exchange coins and tokens.
  • Magnum Wallet
While Magnum is a multi-asset wallet, one of the best known assets it supports is Tezos (XTZ). Being a light wallet, you do not need to download the full blockchain of any of the cryptocurrencies it works with. The wallet does not keep users’ personal information. As Magnum is a web wallet, it has the extra benefit of being available for nearly any platform, easy of access from any kind of device with an internet browser. Magnum wallet also supports Ledger devices so those can be easily linked to the app.

Mobile Wallets

Mobile wallets are used on your smartphone via an app. Similar to Apple or Google Pay, you can use mobile wallets when shopping in physical shops as cryptocurrencies become more popular and acceptable. Mobile wallets may be safer compared to online wallets and also be easy to use on the go.
  • Trust Wallet
Trust is a wallet for tokens of ERC20 standard, tooled for mobile devices. It offers simple installation and affordable feature set, that does not require additional user skills and abilities. Trust Wallet and Binance are working on new features, including market monitoring, user networks, test networks, and deep integration with the Binance infrastructure. Trust Wallet already supports Tezos as well as other digital currencies.
https://preview.redd.it/ckrma5aueth31.png?width=1400&format=png&auto=webp&s=f37213bf83c82028b97837545536c353664a8368
  • AirGap Wallet
AirGap is a wallet, that allows you to keep your cryptocurrency securely on your mobile. AirGap is a system with two device access: you can use your old mobile device as a hardware wallet using the AirGap Vault app to keep the private key there; while your working smartphone will have the wallet itself. The connection occurs with QR codes, this ensures a genuine one-way communication between AirGap Wallet and AirGap Vault. This implies that no private information ever leaves the air-gapped old phone. Besides Tezos, AirGap supports diverse amount of cryptocurrencies.
  • Tezos.Blue Wallet
In spite of being a lightweight wallet, Tezos.Blue does not scant on security or its features. It is an original app and that is why it gets strong protection straight from the operating system. Using the Tezos.Blue you will have actual updates from the network for a truly live operational comfort. Tezos.Blue is also available in a desktop version. Tezos.Blue is also available in a desktop version.

Desktop Wallets

Desktop wallet can be downloaded and installed on a computer. Desktop wallets may be safer if your computer is not, or more preferably, has never used the Internet connection. Desktop Wallets are perfect for storing large amounts of crypto that you don’t want to use on an everyday basis.
  • Atomic Wallet
Atomic is a convenient, easy to use and safe cryptocurrency wallet, that receives the preferences of many users around the world. It is a decentralized multicurrency wallet that is known in the crypto community for supporting more than 500 cryptocurrencies including Tezos. The primary goal of Atomic Wallet is not just to store cryptocurrency, but also to create a strong ecosystem with many functions.

https://preview.redd.it/apv4gpe0fth31.png?width=1686&format=png&auto=webp&s=dc5602c0eda220594b427c0b42923b8bacd727ae
  • Atomix HD Tezos Wallet
HD wallets (hierarchical deterministic wallet) are the wallets that use a single 12 or 18-word mnemonic phrase that is used to identify following addresses and private keys in a wallet software. Atomix is HD wallet that supports Tezos, it merges benefits of decentralized and centralized exchanges. With Atomix, all private keys are kept encoded on the computer. No identity verification or registration is required to use the wallet.
  • Simplestaking
Simplestaking is Tezos focused wallet being a web app and desktop app with support for hardware wallet Trezor Model T. The wallet is developed using NgRx state management and Angular framework.
  • Galleon Tezos Wallet (Tezori)
Galleon is a smart open source wallet for XTZ that supports both hardware and software wallets on Windows, Linux and Mac. It was developed by Cryptonomic and funded by the Tezos Foundation.
  • Tezos CLI Wallet
The Tezos CLI wallet can be used by those users who have some coding understanding while it requires the use of command lines. Tezos has mentioned the wallet on its website and has been audited by an independent external security inspector. As the Tezos CLI needs some level of command line knowledge, it can be quite difficult to use.

How to keep your wallet safe

A cryptocurrency wallet can be regarded as a regular wallet with money, but it has advanced features, which increases the level of risk. Simple rules will help prevent the loss of your own savings:
  1. Do not store large amounts for long periods on wallets that do not provide full control. It is better to store large amounts for a long time only in wallets that provide full control over the private key and, accordingly, over digital assets. This will help protect your coins against fraud and cyber attacks.
  2. Encrypt information and back up private keys. In case of reinstalling the PC or the occurrence of force majeure situations, this will help to restore access to the wallet quickly.
  3. Store secret keys on an offline device. It is preferable to use a platform that is not accessible for hacking via the Internet.
  4. Use reliable antivirus software and update it regularly. This will prevent the leakage of personal data that hackers can use to crack passwords.
  5. Register several types of wallets. It will allow you to distribute your funds and use the most suitable wallet depending on the situation.
If you use your Tezos wallet wisely and do not neglect the precautions, the risk of funds loss will be minimized.

Feel free to follow our updates and news on Twitter, Facebook, Telegram and BitcoinTalk. Read what the customers say about SimpleSwap on Trustpilot. Don’t hesitate to contact us with any questions you may have via [[email protected]](mailto:[email protected]).
submitted by SimpleSwapExchange to tezos [link] [comments]

(Updated) [Staking] Reddcoin Core client GUI wallet on a Raspberry Pi Model 3B

Intro

This thread is an update to my first Reddcoin staking tutorial that was written 7 months ago.
 
The reason for the update
My Reddcoin Core software crashed and became unusable. My Raspberry Pi 3B would lag and freeze, I couldn't stake anymore.
 
Instead of just redoing everything the same way, I wanted to see if I could improve on 3 points:
 
The updates
 
If you would like to tip me
Writing a tutorial like this takes time and effort; tips are appreciated. My Reddcoin address: RqvdnNX5MTam855Y2Vudv7yVgtXdcYaQAW.
     

Overview

 

Steps

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
     

Video

https://www.youtube.com/watch?v=Snr5e8bzftI
This video shows how long it takes to start Reddcoin Core.   TL;DR:
     

Extra

Backup
Backup your wallet to prevent losing the RDDs in your wallet! There are two methods to backup, do both. Make new backups if you create a new receiving address!
 
 
   
Boot with only 1 USB drive plugged in:
Make sure only the USB drive (with the swap partition and data partition) is plugged in when you boot up your Raspberry Pi. This to make sure the swap partition (/dev/sda1) is recognized correctly.   If you boot up with multiple USB drives, Lubuntu might see the USB drive with the swap partition as the second drive (instead of the first drive), and ignore the 2 GB swap partition. If this happens, starting Reddcoin can render the Raspberry Pi unresponsive.
   
Connection issues If you have issues syncing the blockchain because you have 0 network connections, please follow the instructions in this thread.
   
Start Reddcoin Core easier
Run a shell script (.sh file), so you can start Reddcoin just by double clicking on an icon on your Desktop.
   
Minimization options
Adjust minimization options, so you can safely press on the X button (the close/exit button on the upper right corner).
   
RealVNC VNC Viewer (client) and VNC Connect (server): To remote connect to the Raspberry Pi, I use VNC Viewer ad VNC Connect from RealVNC.
 
   
Chromium as browser: The updates break Firefox, the browser crashes when you try to run it. Install another browser, Chromium, to solve this issue.
   
Updates / Upgrades
If Software Updater shows up and tells you that there is updated software available, do not install the updates using Software Updater. Use LXTerminal to update Lubuntu.  
     

Credits:

   
Credits in previous tutorial:
submitted by Yavuz_Selim to reddCoin [link] [comments]

HOW TO STORE BITCOIN ON THE FLASH-DRIVE TUTORIAL - YouTube شراء البيتكوين bitcoin  2016 PROTECT Yourself From The Next BITCOIN FLASH CRASH! Crypto Market Analysis Metalworking sketches - YouTube BITCOIN Mining in 2019 - ASIC USB Miner - Does it make ...

You can save your backup in various places such as USB, disk drives, hard drives, among others so that you have multiple sources of backups. Make regular backups. You can backup your wallet regularly to incorporate all the recent Bitcoin change addresses and new Bitcoin addresses that you create. How to Backup your Bitcoin wallet (blockchain.info, Bitcoin QT, MultiBit) Read More » ... Step 3 – Save your backup to a flash drive. Save your exported backup on to a flash drive and keep it in a secure place. Some wallets will allow you to password protect your backup so that if someone gets a hold of the file he won’t be able to use it. Here, find the file wallet.dat, create a copy, cut it and paste on a new folder on your flash drive. Open the Electrum folder on the flash drive and find an .exe file. Create a shortcut and bring it to the desktop. Launch Electrum on the flash drive, locate it in wallet.dat, and enter a password. Here comes a purse! Learn how to store bitcoins on a USB stick. Storing bitcoins on a USB stick is not as straight forward as storing regular data. Bitcoin private keys are secret codes and storing them on a regular USB stick leaves them at risk of theft if someone were to physically discover the USB. Luckily, entrepreneurs have created unique solutions that allow Bitcoin users to store coins on USB sticks or ... If you misplace your cold wallet or if your hard drive crashes, you can recall the seed phrase and private key to set up your wallet again. Back up the Entire Wallet. You can backup an entire wallet with all the hidden internal private keys. The private keys linked with your Bitcoin address are not enough to recover the whole amount.

[index] [20588] [30707] [794] [18632] [21195] [12033] [4073] [8075] [20807] [5524]

HOW TO STORE BITCOIN ON THE FLASH-DRIVE TUTORIAL - YouTube

Website where you can generate your paper wallet - https://www.bitaddress.org/ Coinbase affiliate link - coinbase.com/join/lozyts_7?src=ios-link Blockchain w... Today's video takes a look at how you can help to protect your profits when there is a flash crash in the market. We'll cover easy ways to know when the crash is happening in the beginning and get ... This is main creative projects, you should look them first, to know which videos I make. It metalworking with story, humor and fun. Coronavirus Bitcoin FLASH CRASH - 25-30% Selloff! (FUD) Kubera. ... (wallet) to store your coins? Ledger ... HOW COVID-19 KILLS--I'm a Surgeon--And Why We Can't Save You - Duration: ... Is Bitcoin mining worth it in 2017 ? What about USB miners ? We had a closer look at them: https://www.cryptouniverse.at/shop - Miningconf: https://www.minin...

#