Best Bitcoin Wallet Armory Multi-Signature Cold Storage

Endlessly confused trying to download and launch Bitcoin Armory on macOS 10.15

Discovered Armory probably 7 years ago, couldn't figure it out then either!
I am trying to download and launch bitcoin Armory for the first time on macOS 10.15.6. I have downloaded the entire blockchain on the most recent update of Bitcoin Core, stored on an external HD. I've tried following guides on a few different forums but they are either long outdated, or beyond my technical prowess because I'm not sure what I'm doing wrong. When I launch the Armory application, I get the immediate window that "Armory cannot be opened because of a problem" and the report tells me:
Termination Reason: DYLD, [0x1] Library missing
Has anyone successfully ran Armory on their mac? Is there some trivial mistake that I am making? Thanks for any and all help.
submitted by nelsangue to Bitcoin [link] [comments]

Links for PMC's new and old.

With the .12 patch looming, and new players joining all the time, I thought I would create a post containing all the best and most relevant links to websites to aide new and old players alike. Below you will find a comprehensive list of the most useful pages I have found so far. Hope this is helpful, if you think it is, feel free to save the thread and share it to any new threads that pop up with titles like ‘New player, how do I find this key/exit’ or ‘New player, what mods can I use for this gun’, etc. If it gets enough upvotes and people think it is a good resource, I will keep it updated. Enjoy :D

WEAPON MODDING

This is a really handy resource as far as an ''outdated'' page for creating weapon builds from EFTDB. Select weapon at top, then select a mod for each slot. At the bottom of the page it will show you where you can buy the mods you selected and a rough price [actual price depends on various factors], along with the trader level required.
https://www.eftdb.one/weaponmodding/220001/AK-74N/
Note-1: If you mouse-hover the mods it will show its effect on weapon stats.
Note-2: It seems EFTDB is a bit outdated as some weapons and/or mods are missing, and trader levels may be different to current build. I still find it a really handy resource though, due to the ability to create weapon builds. Would love to see it updated.
---
This site has been mentioned as an alternative to EFTDB for making weapon builds, created by TarkovArmory. This one seems to be up to date, but is lacking pictures. They also seem to have a pretty good ammo chart on their website. Worth checking out.
https://tarkovarmory.com/weapons
---
As EFTDB is slightly out of date, you certainly can find all the up to date information on weapon attachments from the Gamepedia pages [below]. Select a weapon to see which mods will fit on it, or search the mod's name to be taken to its specific page. Or check the weapon mods page for tables of the mods and their +/- on attributes.
https://escapefromtarkov.gamepedia.com/Weapons
https://escapefromtarkov.gamepedia.com/Weapon_mods
---
Below is a spreadsheet that shows the Optimum Weapon Builds for each weapon, created by Virion. So if you are a min/maxer, and don't want to go through the agony of experimenting with every mod for every weapon, this is a handy resource. The ones in BOLD are the current 'best' of their calibre/category.
https://docs.google.com/spreadsheets/d/1yHyVEVB5oN0qL_pR1qTNP1_ICmzJ3SCFJQNb6XDM_DQ/edit#gid=0
Note: As mentioned on the spreadsheet itself, some of the images are outdated.

RIG SLOTS

Another handy page from EFTDB is this one which shows each Tactical Rig, the rough price, if it can be traded for and from whom and what Loyalty Level required; along with the layout of the slots available in handy images.
https://www.eftdb.one/rigs
Note: As mentioned above, EFTDB is slightly outdated, for example, there are a few rigs missing from this page. At the bottom of this article is a link to an infographic created by Veritas, which has a section showing all current rigs.

MAPS

This is a good place to find all the best maps, compiled by GameMaps.co.uk but created by various people. I suggest where possible, when learning any raid, it can be helpful to have a map open on a second monitor if you have one, until you learn your way around. With enough experience you will learn the maps and points of interest better than the back of your hand, so the more you play the less you will need it. There is a selection of high quality maps for each raid, I am sure everyone will prefer one or another, I prefer the 3D maps where available. Some maps show spawns for keys and quest items/locations.
http://www.gamemaps.co.uk/game/tarkov

QUESTS

Next is the best place to find all the quests, and quest-guides. The folks who contribute to the Tarkov Gamepedia page are legit legends. Select the trader to see a table of their quests and rewards. Click on any individual quest and you will be greeted by a detailed guide of how to complete the quest, along with handy pictures and maps where necessary.
https://escapefromtarkov.gamepedia.com/Quests
---
To go along with this, a handy guide to items you should be hoarding to finish quests. So you can be collecting things from your first raid you might use to complete a quest 2 weeks later. This image is updated when the quests are. There used to be a text-based list, which I found really handy, because I copy/pasted into a .txt file and updated it when I found new items from the list, this sadly I can no longer find.
https://escapefromtarkov.gamepedia.com/Quests#/media/File:QuestItemRequirements.png

TRADERS

If you want to know what the traders sell at loyalty level 4, but you are only LL1, these pages will give you an overview of what each trader has at each level. You can also see a table of their quests too if you expand that option, but I find the previous link provided above is handier for that purpose to be honest.
The Rapist - https://escapefromtarkov.gamepedia.com/Therapist
Skier - https://escapefromtarkov.gamepedia.com/Skier
Peacekeeper - https://escapefromtarkov.gamepedia.com/Peacekeeper
Mechanic - https://escapefromtarkov.gamepedia.com/Mechanic
Ragman - https://escapefromtarkov.gamepedia.com/Ragman
Note-1: Fence Trader only sells things that PMC’s have traded to him, can be a handy place to find rare items sometimes [less so since the flea market was launched], but items generally are cheaper to buy directly from the traders if you have the required loyalty levels.
Note-2: The Flea Market is a player driven system where you can buy and sell items. Some items will be up for Roubles/Euros/Dollars and some will be up for trade for other items people might require.
Note-3: A few items, such as melee weapons can only be sold to Fence, or put on the Flea Market. Other items can only be sold to certain traders, for instance Therapist will not buy weapons, but is the only trader that will take meds from you [other than fence].
Note-4: Several items can be sold to several traders, but you will get a different price depending on which trader you sell it to. For instance, Therapist will give you the highest price for rare items like Roosters/Clocks/Rollers/Bitcoins/Gold Chains/Cat Figurines/Lion Statues.
Note-5: Even though certain items have a high price to trade in, it might be worth holding onto them to trade in for other items. For example, you can trade in 1 roller and 5 gold chains to Therapist for a Money Case, which you can then sell back to her for more money than if you just sold her the individual items, or can be put on the Flea Market if you prefer.
---
Below is a site showing a table of Barter Trades created by Sheiddy. It provides information regarding which items can be given to each trader in return for other items. It also displays where the original items can often be found, and the rough price of the items you can receive if you were to pay for them.
http://tarkov.sheiddy.com/

KEYS

Next is the best key guide I have found, compiled by the United We Stand gaming community, specifically The Velvet Gentleman. As far as I am aware, this is the only key guide worth looking at. It informs you of which keys are available on each map, what is behind the door, and where you can find said key if it has a static spawn [most of which have pictures of the spawn]. There is even some colour coding going on so you can quickly pick out the most valuable keys/rooms.
https://forums.uwsgaming.com/topic/3871-map-keys-and-you/
Note-1: Be aware that not all keys have a static spawn, and some will have to be found on scavs. Also keep in mind that just because a key has a static spawn, doesnt mean you won't/can't find it on a Scav. You can literally spawn as a Scav with any of these keys, barring KIBA#2 I believe.
Note-2: Worth considering, KIBA key #2 is gained by completing a quest for Mechanic; and KIBA key #1 has a static spawn, but I personally found one on a scav this wipe [11.7], and it can also be traded from Therapist to the tune of 50x condensed milk.

AMMO

Ammo Chart from Hazmattr, this one is broken down into calibre, so easy to follow imo. It seems to be fully up to date. It also shows the trader you can buy said ammo from, and the level you need to be with said trader, there is also a gamepedia link to any quests required to unlock each ammo. I find this easier to navigate than the official ammo guide sheet due to the layout.
https://docs.google.com/spreadsheets/d/1-q1Yiof1FfGBlIoudl799BFyx_fMYEGt-TP2Itci4z0/edit#gid=0
---
Of course, you can always check the official ammo chart provided by Battle State Games [below].
https://docs.google.com/spreadsheets/d/1l_8zSZg-viVTZ2bavMEIIKhix6mFTXuVHWcNKZgBrjQ/htmlview?sle=true
Note: BSG has a habit of changing the values of ammunition and not releasing an up to date chart until weeks and/or months later. They will undoubtedly be changing things with .12, and will be adding new ammo types; hopefully they release the new chart with the wipe.
---
Also worth mentioning in context of ammo is this chart by NoFoodAfterMidnight, which shows your chance for each ammo to penetrate each armour class, along with fragmentation chance. This is the best way to work out which ammo you should be running with each gun when going against highly geared players.
https://docs.google.com/spreadsheets/d/1jjWcIue0_PCsbLQAiL5VrIulPK8SzM5jjiCMx9zUuvE
Note-1: As mentioned above briefly, some ammunition types are only available after finishing certain trader quests. So don’t expect to be buying the best ammo as soon as you join the game. That being said, you will be able to find all the ammo’s on the flea market, but at the beginning of a wipe period, these will be placed on there by PMC’s with higher levels at inflated prices as and when they are unlocked.
Note-2: Depending on your target, ammo with high flesh damage or high armour penetration is going to be relevant. If you shoot high flesh damage ammo at high end armour, you might as well be shooting a water pistol at a battleship.
Note-3: Legs are never armoured, so feel free to use high flesh damage ammo on even the tankiest players, as long as you can get enough rounds into their legs before they merc you. This playstyle is not always the best idea, as sometimes peoples legs are obscured, and it will take a few rounds, giving the enemy time to turn and spray you down.
Note-4: Firing shotguns at reasonable-to-good armour is like shooting a Nerf gun at the Empire State Building. Firing shotguns at legs is like shooting a flame thrower at an ant!

Honourable Mentions

Perhaps an under-appreciated site, which I have rarely seen mentioned on reddit, is this one by J James. He has a Key guide [with images], Mod Compatibility guide [select or search mod to see what it fits], Weapon Mod Compatibility guide [select weapon to see what will fit on it]. There is also another breakdown of which items the traders possess by level similar to the ones from gamepedia I linked above. This seems to be a solo project by J James and a labour of love, props to him.
http://www.jjames.info/game_page.php?gameName=Escape%20From%20Tarkov
---
Below is a massive infographic created by Veritas providing visual reference guides for things like Ballistics, health items, Firearm attributes [outdated], armour stats, rig slots, bag sizes, and labs keycard locations [some of them, not all]
https://cdn.discordapp.com/attachments/570624452220420115/573619468513706093/info96.jpg
---
This next one, EFT Field Guide, has various resources. A keyguide where you select the key and it will show you a map with spawn point indicated; a sort-able ammo chart; a sort-able list of items showing their values, and more importantly their value-per-slot; a checklist feature where individuals can create a list of items they need/want to collect; and a list of popular youtubers/streamers.
https://eftfg.com/
---
This last one is a new player guide that may be useful to some. Created by Tax (Jonathan Ballard), this guide covers many of the basics a new player might require. Just FYI though, this was created over a year ago and as such some features are missing. I only quickly skimmed through it, but the top half seems pretty sound, and does give some pretty solid advice for newbie Tarkovians. It is displayed in a way that reminds me of the handbooks that used to come with video games when I was a kid, nostalgia.
https://drive.google.com/file/d/0BxcqjnBUL1r7emg3VWJYUlp3dGM/view

I cannot give enough credit to the guys and gals that have made these sites. These people as far as I know have done this for the love of the game, and I think they deserve a pat on the back for their work. Kudos to the creators, whomever they may be. Most of the sites mentioned seem to be regularly updated with new content when BSG releases it, so they will be crucial to keeping people informed when .12 drops. Any that are outdated have been noted as such.
Hope this helps some new players out, and maybe even some experienced Tarkovians. If you think of anything that would fit well on this list, comment below and I will update the main article. See you in the field my Cheekis.
Contributors: Credit to u/Danger597 for link to Virion's Optimum Weapon Builds. Credit to u/Dracborne/ for link to Sheiddy's Barter Guide. Credit to u/ZombieToof/ for link to TarkovArmory weapon build site. Credit to u/betajosh711 for link to EFT Field Guide. Credit to u/mmm3k3/ for link to Tax's Player Guide.
Final Note: I didn't include youtube guides as there are many youtubers out there that create good video based guides. If this article does well though, I may create a separate article showcasing some of the best.
submitted by brokendreamz101 to EscapefromTarkov [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Common Bitcoin Scams And How To Avoid Them

As the popularity of cryptocurrencies is increasing with every year, more and more scammers appear around it. Therefore, it is very important to protect yourself from any kind of fraud in the crypto world. Here are the most popular ways of Bitcoin scams and our tips on how to avoid them. Forewarned is forearmed!
1. Pyramid (or Ponzi) schemes
In this case, users can be lured by promises of incredibly high profits at extremely low investments. Here’s how a classical pyramid scheme works: the first investors attract new people from which receive profiteering. And when the flow of the new investors falls, the pyramid collapses.
How not to fall for a pyramid scam:
2. Scams with fake wallets and exchangers
Here we are talking about fraudulent sites. Some pretend to be Bitcoin wallets, some look like exchanges, some are kind of both at once. Usually, sometime after registration, they work normally to put off your guard and earn trust. You peacefully deposit your crypto, the funds in the account accumulate — and the scammers vanish with your currency.
How not to fall for a scam:
3. Cloud mining
The mining process requires good and expensive computer equipment, so some people offer “mining for rent” on their equipment. There are some legal cloud mining services that let users rent server space to mine coins. On the other hand, there are also plenty of cloud mining scams out there.
How not to fall for a mining scam and be sure that service is legitimate:
4. Malware
This type of fraud has long been a weapon in the armory of online scammers. Malware in a crypto world is created to get access to your wallet and drain your account, monitor the Windows clipboard for crypto addresses and swap your valid address with an address of a scammer.
How not to fall for malware scams:
5. Phishing
The typical phishing scheme is extremely simple. The scammer sends the user an e-mail from the so-called crypto exchange or wallet provider in which the lurcher places a link to the fake website. The main goal is to force the user to go to the fake page and enter personal data (username, password, private key and so on). This confidential information allows theft to access the original website on behalf of the real user and walk away with the user’s currency.
How not to fall for phishing scams:
You should remember that the risks of scam and speculations are everywhere. Make reasonable investments and never take big risks. And finally, guards up by following our pieces of advice.
Like and share this article if you find it useful. Want more interesting articles on the crypto world? Follow us on Medium, Twitter, Facebook, and Reddit to get Stealthex.io updates and the latest news about the crypto world. For all requests message us at [[email protected]](mailto:[email protected]).
submitted by Stealthex_io to Bitcoin [link] [comments]

The First-generation Terminal — MoonBot

The First-generation Terminal — MoonBot

Moonbot
Our team has developed and is supporting the trading terminal MoonBot which was introduced in October 3, 2017. Currently, the performance of MoonBot surpasses that of most existing trading systems as a result of its advanced functionality and the high security features designed to protect your trading activities.
Secure Connection to the Exchange
The connection from MoonBot to an Exchange is carried out using special keys that the user receives from an exchange such as Binance or Bittrex.
MoonBot connects securely to cryptocurrency trading Exchanges through two special keys which are uniquely and only known to their owner. These are the API key, and the Secret key, both of which the users receives directly from the Exchange.
The MoonBot terminal then receives data and information from the exchange’s API collected at several different access levels, including:
Public information (publicly accessible data related to trading in general):
  • charts;
  • quotes;
  • orderbook;
  • real-time executed orders.
  • Authenticated information (unique to the users and which requires authentication access using the special keys): personal account status (wallet balances);
  • user transactions (such as the details of executed trades).
After receiving the various data information from the exchange, the terminal records these data in a local database for further processing and application.
Security Systems
The MoonBot terminal provides completely private storage of all your personal data!
The MoonBot team has absolutely no access to personal data, you are the only one controlling its security and have complete control over access to your details.
The MoonBot team are not able to withdraw, nor to move, any funds from your personal Exchange account or wallet.
You can therefore safely use the terminal for trading, receiving public information from the Exchange, and should you wish to share with others, the trading data on your account.
You therefore are the only person with control and access to your Exchange wallet, and can be completely assured of the absolute security of your private funds.
Lightning-fast Execution of the Orders on the Exchange and Order Status Update
Depending on the distance of the user from the exchange servers, the delay in order execution should not exceed 1 second. Theoretically, the delay can be reduced to a minimum intangible — 10–20 ms. Below is presented a very short extract(4 seconds in total) of the MoonBot log text file with brief explanations and highlights of the key features.

The MoonBot log text file with brief explanations and highlights of the key features.

Tick Chart. Display of All Orders on the Chart
Thanks to the API connection to the exchange, the terminal receives stream data of all filled orders on the exchange as soon as they were processed by the exchange servers and immediately displays them on the chart.
Tick Chart.
Thus, the visualization of the current state of the market is provided in real time with an accuracy of tens of milliseconds and as detailed as displaying each order on the chart.

Auto Trading on Signals
Fully automatic processing and trading off Telegram signals as well as parced TradingView alerts.

https://preview.redd.it/rw6im5wl1m931.png?width=1095&format=png&auto=webp&s=0ce7e7287dae27a0a71970083435fa93e592e5b5
Automatic Detection of Market Conditions and Reaction to its Changes
Thanks to streaming data acquisition, the terminal monitors all available markets simultaneously, and is therefore able to react almost instantaneously as favorable trading possibilities are presented. And due to the minimal delay in the execution of orders, MoonBot responds to abnormal changes almost instantly.

Advanced Orders. Stop Loss, Take Profit, Trailing Stop
OCO orders (one cancels the other) are one of the most sought-after functions from both the Exchanges providing liquidity to the markets, and applications running on top of the exchanges. The modern Trader cannot trade without the basic “smart” functions and addons to traditional exchange orders and considers them to be the minimum necessary set in their armory.

https://preview.redd.it/3gsh12b42m931.png?width=1200&format=png&auto=webp&s=7f21bd7e7505f9bb5a95555cf355bb6f1f5efab4
Stop Loss
One of the most important tools for Traders is to be able to place orders whilst practicing safe money management in order to mitigate against losses. One of the most important safety tools is to use a Stop Loss, which is especially important in volatile, low liquidity markets.
With MoonBot, the user can set a Stop Loss threshold (either as a percentage of the order price, or as a number of price points), which their strategy can accept should the price move in the opposite direction to that expected. When this threshold value has been reached, the order will be closed automatically.
Technically, a Stop Loss can be set up in two ways: either as a stop-limit order placed directly on the exchange at the same time as the initial position is opened; or as a function controlled in real-time by the MoonBot terminal itself. Additional types of conditional Stop Loss functions include:
  1. Additional and conditional Stop Losses – these are activated by a timer, and depend on the price reached. Thus Moonbot can raise the Stop Loss to a break-even point, or can be set to move upward to follow coin growth and to achieve higher profitability.
  2. BV/SV Ratio Stop Loss — this is a measure of buying/selling pressure and depends on the ratio of the volume of coin purchases compared against sales over a given time range. For example, if the number of sales exceeds the number of purchases, then this Stop Loss would be activated
  3. V-STOP — this is a stop which depends on the volume in the orderbook, where a price and volume level is set, which if broken will activate the Stop Loss.
  4. Trailing Stop — Trailing Stop is a General Stop Loss Management Tool. This very important feature allows the Trader to maximize profit in an automatic mode by following upward price movements, until the price reverses by a preset amount. At that stage the Stop Loss is activated.
    Take Profit
The Trader can fix the profit gained as the value of an asset increases in several ways:
  • By closing the position after a predefined profit percentage has been reached.
  • By remaining in the position, and setting the Stop Loss level to break-even, or to higher profit levels.

Algorithmic Trading
At the moment, MoonBot has 13 types of strategies in-built (manual) using specific and well-proven algorithms (algorithmic trading or algo-trading).
Together these have more than 200 adjustable parameters that can be adjusted to optimize their profitability across the wide range of trending and ranging markets that occur.
https://preview.redd.it/rgm2d6z13m931.png?width=1084&format=png&auto=webp&s=521830b9386e2890620ace5d829f53c3a76ceeb3
Trusted Management
MoonBot includes a successful and well-tested Trusted Management feature, in other words — Copy Trading:
  • All trade actions from the Master Terminal are repeated on the Follower’s Terminal (slave terminal).
  • The Follower’s deposit remains securely in their own personal exchange account.
  • The Trusted Management feature does not have direct access to money, or to direct trading on someone else’s account, but manages only its own Exchange orders, simultaneously broadcasting encrypted messages to Followers terminals containing all Master actions.

https://preview.redd.it/h8ak7b4g3m931.png?width=1023&format=png&auto=webp&s=caf33dad55ad6b51ed9f1e44316df9182b875eff
Trust Management is successfully implemented and used by members of our community. The statistics of those TM Traders who share their results can be reviewed on the website — stat.moon-bot.com on the RatingTM tab.
Community
During the two years of development of the MoonBot terminal, more than 30,000 copies have been registered and used by our Community of Traders.
Every day several thousand people trade cryptocurrencies using the MoonBot terminal, making daily approximately one hundred thousand manual and automatic transactions only on the leading crypto-currency exchange — Binance.
The existing community of traders is actively developing. The MoonBot project has its own active pages on popular social networks, in dedicated Telegram channels divided by topics, and also its own Trader’s forum available to subscribers.
Topics on the BitcoinTalk Forum
  • bitcointalk.org/index.php?topic=2234450.0
  • bitcointalk.org/index.php?topic=2234198.0
    Websites
  • moon-bot.com — the official site of the MoonBot.
  • forum.moon-bot.com — MoonBot forum.
  • stat.moon-bot.com — trade statistics of the community members, TOP-50.
    Telegram Groups
  • t.me/moon_bot_crypto — the main RU-chat for communication.
  • t.me/Moon_Bot_Public — main ENG chat for communication and support.
  • t.me/MoonBotSettings — RU technical support chat.
  • t.me/moon_bot_kurilka — general RU chat.
    Telegram Channel
t.me/MoonBotNews — the latest news and updates.
Social Network
www.facebook.com/MoonBotTerminal
The current Support team is actively assisting users and resolving their issues through dedicated Telegram channels.
submitted by MoonTrader_io to Moontrader_official [link] [comments]

Getting frustrated with Ubuntu. Are my experiences the norm for a Linux user?

Let me start off by saying that I'm not a total newb, but still pretty green. I like to believe I'm capable with computers, and know enough to figure out most issues. I also have a pretty solid general understanding of how they function. Been a Windows user most of my life, but decided to make the switch to Linux a few years back.
My experiences thus far are making me reconsider the switch, despite the fact that I've really become opposed to using Windows. I'm curious if I should expect more of the same indefinitely, or if my experiences up to this point are unusual, and I should expect to reach a point where I can just use the OS, instead of spend hours trying to perform every task.
It all started when I downloaded Ubuntu about three years ago. I easily got it installed as a dual boot on a Windows machine. Had to start by allocating disk space in Windows for the new Linux install, prepared a live usb, went through the install, cake. Then I started trying to do stuff, like use a printer. Well HP doesn't make a driver for Linux and, probably, 2-4 hours of research led to me still not having a working printer. I found a driver, but the process to get it installed did not work as it was supposed to. I forget the specifics, but I followed a tutorial to the T, but ran into unforeseen installation issues, and never could figure out how to get the process complete.
After that I started running into issues with the FireFox browser. I've alwasy used FF on Windows with no issues. On Ubuntu it ran slower than dial-up from the mid-90's. Again, 2-4 hours worth of research and several changes to things like FF settings, disabling add-ons, etc., and I still had no fix.
Still I wasn't deterred. Then the dual boot broke. I tried boot repair. No dice. Tried for several hours to get it working. Asked about it on forums, sent in results of boot repair (where I forget) only to get no response, and finally I threw in the towel.
I also struggled to get Bitcoin Armory working, with some very frustrating success, but I didn't count that against Linux, since it was very new software, and I wasn't surprised it was buggy.
Fast forward to today. I've been using Windows for a couple years, with few attempts made to use Linux, except for trying to retrieve a very small amount of BTC from Armory, which consumed about three weekends of my life to finally achieve.
Now I've decided to give it another go. I downloaded UbuntuStudio b/c I'd like to use some of the music production software that comes with it.
Following some tutorials online, I tried to connect my midi keyboard to the computer using QJackCtl. I couldn't remember the issue that I ran into when starting to type this up, so I tried to repeat the process, only to have the program crash during start up, three times. The computer had literally just restarted 20 minutes ago, so I doubt a reboot would work, but maybe. It's almost funny at this point. I'm really disappointed that I can't get the audio software that came with the distro working "fresh out of the box." Maybe with a few hours, or weekends, worth of research?
I've also been getting a system error message every time I login. I posted a query on the Ubuntu forums. That issue has yet to be sorted out.
I hesitate to include this next part, because it involves software that is really still in it's early stages, and I'm trying to be realistic in taking the perspective that any problems I encounter are with the new software, not Ubuntu, but the fact that I had zero problems getting the same stuff to work in Windows just adds to my frustration with Ubuntu.
Everything I'm about to describe is involved with installing monero mining and wallet software. The exception is the AMD drivers needed for the GPU I'm using to mine. Those I expected to work without issue. I followed the directions for installing the AMD drivers for Ubuntu on the AMD website, and the program would not work. After, you guessed it, 2-4 hours of research, I finally, almost by accident, installed an older version of the driver software. Boom, it worked. WTF man?! When I installed the Windows version it took 2 minutes.
Moving on, I tried getting the xmr-stak mining software working. This took me several hours, spread over several days to sort out. Same with the monero-gui wallet, which actually I've only got half-way working. In fact, I've tried installing the monero-gui by two different ways. In the process I've inadvertently got the monerod daemon running, but not the gui. Actually, the monerod daemon starts with the computer and I haven't even started trying to figure out how to turn that off, since what's the point of having it run if I can't use the gui?
In Windows I had all of this up and running in a couple of hours. And in saying that I'm prepared for the "if you like Windows so much then use that!" or "you're just too thick to figure it out!", but I don't like Windows, and I don't think it's a matter of not figuring it out. It seems to me that the reason I've spent dozens of hours just trying to get things to work in Linux is that nearly every time I've tried to do something, there is inevatably some error along the way where following the directions isn't good enough, and sorting out the issue is a feat in and of itself.
I just want to know if this is unusual, or if this is how it's going to go forever if I keep using Linux. Is my experience typical?
TL;DR: I've had a litany of issues and spent countless hours trying to fix them using Linux. Is this rare, and I've just had an unusual experience, or actually pretty common, and I should just accept it as the cost of using an open source OS?
submitted by rtfioeti to Ubuntu [link] [comments]

I'm an Undercover FBI agent on the Deep Web (Part One)

My name is Special Agent “Barry Allen” .(not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize the name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an UnderCover FBI Agent on The Deep Web. (Part one)

My name is Special Agent “Barry Allen” . It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to nosleep [link] [comments]

Common Bitcoin Scams And How To Avoid Them

As the popularity of cryptocurrencies is increasing with every year, more and more scammers appear around it. Therefore, it is very important to protect yourself from any kind of fraud in the crypto world. Here are the most popular ways of Bitcoin scams and our tips on how to avoid them. Forewarned is forearmed!
1. Pyramid (or Ponzi) schemes
In this case, users can be lured by promises of incredibly high profits at extremely low investments. Here’s how a classical pyramid scheme works: the first investors attract new people from which receive profiteering. And when the flow of the new investors falls, the pyramid collapses.
How not to fall for a pyramid scam:
2. Scams with fake wallets and exchangers
Here we are talking about fraudulent sites. Some pretend to be Bitcoin wallets, some look like exchanges, some are kind of both at once. Usually, sometime after registration, they work normally to put off your guard and earn trust. You peacefully deposit your crypto, the funds in the account accumulate — and the scammers vanish with your currency.
How not to fall for a scam:
3. Cloud mining
The mining process requires good and expensive computer equipment, so some people offer “mining for rent” on their equipment. There are some legal cloud mining services that let users rent server space to mine coins. On the other hand, there are also plenty of cloud mining scams out there.
How not to fall for a mining scam and be sure that service is legitimate:
4. Malware
This type of fraud has long been a weapon in the armory of online scammers. Malware in a crypto world is created to get access to your wallet and drain your account, monitor the Windows clipboard for crypto addresses and swap your valid address with an address of a scammer.
How not to fall for malware scams:
5. Phishing
The typical phishing scheme is extremely simple. The scammer sends the user an e-mail from the so-called crypto exchange or wallet provider in which the lurcher places a link to the fake website. The main goal is to force the user to go to the fake page and enter personal data (username, password, private key and so on). This confidential information allows theft to access the original website on behalf of the real user and walk away with the user’s currency.
How not to fall for phishing scams:
You should remember that the risks of scam and speculations are everywhere. Make reasonable investments and never take big risks. And finally, guards up by following our pieces of advice.
Like and share this article if you find it useful. Want more interesting articles on the crypto world? Follow us on Medium, Twitter, Facebook, and Reddit to get Stealthex.io updates and the latest news about the crypto world. For all requests message us at [[email protected]](mailto:[email protected]).
submitted by Stealthex_io to CryptoCurrencies [link] [comments]

Common Bitcoin Scams And How To Avoid Them

As the popularity of cryptocurrencies is increasing with every year, more and more scammers appear around it. Therefore, it is very important to protect yourself from any kind of fraud in the crypto world. Here are the most popular ways of Bitcoin scams and our tips on how to avoid them. Forewarned is forearmed!
1. Pyramid (or Ponzi) schemes
In this case, users can be lured by promises of incredibly high profits at extremely low investments. Here’s how a classical pyramid scheme works: the first investors attract new people from which receive profiteering. And when the flow of the new investors falls, the pyramid collapses.
How not to fall for a pyramid scam:
2. Scams with fake wallets and exchangers
Here we are talking about fraudulent sites. Some pretend to be Bitcoin wallets, some look like exchanges, some are kind of both at once. Usually, sometime after registration, they work normally to put off your guard and earn trust. You peacefully deposit your crypto, the funds in the account accumulate — and the scammers vanish with your currency.
How not to fall for a scam:
3. Cloud mining
The mining process requires good and expensive computer equipment, so some people offer “mining for rent” on their equipment. There are some legal cloud mining services that let users rent server space to mine coins. On the other hand, there are also plenty of cloud mining scams out there.
How not to fall for a mining scam and be sure that service is legitimate:
4. Malware
This type of fraud has long been a weapon in the armory of online scammers. Malware in a crypto world is created to get access to your wallet and drain your account, monitor the Windows clipboard for crypto addresses and swap your valid address with an address of a scammer.
How not to fall for malware scams:
5. Phishing
The typical phishing scheme is extremely simple. The scammer sends the user an e-mail from the so-called crypto exchange or wallet provider in which the lurcher places a link to the fake website. The main goal is to force the user to go to the fake page and enter personal data (username, password, private key and so on). This confidential information allows theft to access the original website on behalf of the real user and walk away with the user’s currency.
How not to fall for phishing scams:
You should remember that the risks of scam and speculations are everywhere. Make reasonable investments and never take big risks. And finally, guards up by following our pieces of advice.
Like and share this article if you find it useful. Want more interesting articles on the crypto world? Follow us on Medium, Twitter, Facebook, and Reddit to get Stealthex.io updates and the latest news about the crypto world. For all requests message us at [[email protected]](mailto:[email protected]).
submitted by Stealthex_io to BitcoinAUS [link] [comments]

[Help Required] Armory Wallet Not Functioning

[Help Required] Armory Wallet Not Functioning
I'm no expert in managing applications and computers in general, so I need help from you guys to fix an issue I have.
I transferred a significant amount of bitcoin to Armory wallet, and I've had trouble setting it up and getting it to go online mode. I have downloaded Bitcoin core and installed the 220gb worth of logs.
The problem is Armory is stuck in "Organizing blockchain". I've even left it there for days on end waiting for it to get completed.
What should I do to get Armory working so I can actually access my bitcoins? Thank you.

UPDATE: I tried contacting Armory at "https://www.bitcoinarmory.com/contact/", however their email address doesn't work . The "Support Portal" doesn't work, and their forum is dead.
I even tried calling them, but nobody's answering. I guess I gotta try again later...

https://preview.redd.it/chck0u6sslj21.png?width=829&format=png&auto=webp&s=4523d0734acdc2409edec7a252bab41d1ed05133
https://preview.redd.it/1qatjywanyj21.png?width=637&format=png&auto=webp&s=575a262660d56ede94b22a74665674154ed64796
submitted by PlayOf5 to Bitcoin [link] [comments]

Common Bitcoin Scams And How To Avoid Them

As the popularity of cryptocurrencies is increasing with every year, more and more scammers appear around it. Therefore, it is very important to protect yourself from any kind of fraud in the crypto world. Here are the most popular ways of Bitcoin scams and our tips on how to avoid them. Forewarned is forearmed!
1. Pyramid (or Ponzi) schemes
In this case, users can be lured by promises of incredibly high profits at extremely low investments. Here’s how a classical pyramid scheme works: the first investors attract new people from which receive profiteering. And when the flow of the new investors falls, the pyramid collapses.
How not to fall for a pyramid scam:
2. Scams with fake wallets and exchangers
Here we are talking about fraudulent sites. Some pretend to be Bitcoin wallets, some look like exchanges, some are kind of both at once. Usually, sometime after registration, they work normally to put off your guard and earn trust. You peacefully deposit your crypto, the funds in the account accumulate — and the scammers vanish with your currency.
How not to fall for a scam:
3. Cloud mining
The mining process requires good and expensive computer equipment, so some people offer “mining for rent” on their equipment. There are some legal cloud mining services that let users rent server space to mine coins. On the other hand, there are also plenty of cloud mining scams out there.
How not to fall for a mining scam and be sure that service is legitimate:
4. Malware
This type of fraud has long been a weapon in the armory of online scammers. Malware in a crypto world is created to get access to your wallet and drain your account, monitor the Windows clipboard for crypto addresses and swap your valid address with an address of a scammer.
How not to fall for malware scams:
5. Phishing
The typical phishing scheme is extremely simple. The scammer sends the user an e-mail from the so-called crypto exchange or wallet provider in which the lurcher places a link to the fake website. The main goal is to force the user to go to the fake page and enter personal data (username, password, private key and so on). This confidential information allows theft to access the original website on behalf of the real user and walk away with the user’s currency.
How not to fall for phishing scams:
You should remember that the risks of scam and speculations are everywhere. Make reasonable investments and never take big risks. And finally, guards up by following our pieces of advice.
Like and share this article if you find it useful. Want more interesting articles on the crypto world? Follow us on Medium, Twitter, Facebook, and Reddit to get Stealthex.io updates and the latest news about the crypto world. For all requests message us at [[email protected]](mailto:[email protected]).
submitted by Stealthex_io to btc [link] [comments]

Greg Maxwell /u/nullc (CTO of Blockstream) has sent me two private messages in response to my other post today (where I said "Chinese miners can only win big by following the market - not by following Core/Blockstream."). In response to his private messages, I am publicly posting my reply, here:

Note:
Greg Maxell nullc sent me 2 short private messages criticizing me today. For whatever reason, he seems to prefer messaging me privately these days, rather than responding publicly on these forums.
Without asking him for permission to publish his private messages, I do think it should be fine for me to respond to them publicly here - only quoting 3 phrases from them, namely: "340GB", "paid off", and "integrity" LOL.
There was nothing particularly new or revealing in his messages - just more of the same stuff we've all heard before. I have no idea why he prefers responding to me privately these days.
Everything below is written by me - I haven't tried to upload his 2 PMs to me, since he didn't give permission (and I didn't ask). The only stuff below from his 2 PMs is the 3 phrases already mentioned: "340GB", "paid off", and "integrity". The rest of this long wall of text is just my "open letter to Greg."
TL;DR: The code that maximally uses the available hardware and infrastructure will win - and there is nothing Core/Blockstream can do to stop that. Also, things like the Berlin Wall or the Soviet Union lasted for a lot longer than people expected - but, conversely, the also got swept away a lot faster than anyone expected. The "vote" for bigger blocks is an ongoing referendum - and Classic is running on 20-25% of the network (and can and will jump up to the needed 75% very fast, when investors demand it due to the inevitable "congestion crisis") - which must be a massive worry for Greg/Adam/Austin and their backers from the Bilderberg Group. The debate will inevitably be decided in favor of bigger blocks - simply because the market demands it, and the hardware / infrastructure supports it.
Hello Greg Maxwell nullc (CTO of Blockstream) -
Thank you for your private messages in response to my post.
I respect (most of) your work on Bitcoin, but I think you were wrong on several major points in your messages, and in your overall economic approach to Bitcoin - as I explain in greater detail below:
Correcting some inappropriate terminology you used
As everybody knows, Classic or Unlimited or Adaptive (all of which I did mention specifically in my post) do not support "340GB" blocks (which I did not mention in my post).
It is therefore a straw-man for you to claim that big-block supporters want "340GB" blocks. Craig Wright may want that - but nobody else supports his crazy posturing and ridiculous ideas.
You should know that what actual users / investors (and Satoshi) actually do want, is to let the market and the infrastructure decide on the size of actual blocks - which could be around 2 MB, or 4 MB, etc. - gradually growing in accordance with market needs and infrastructure capabilities (free from any arbitrary, artificial central planning and obstructionism on the part of Core/Blockstream, and its investors - many of whom have a vested interest in maintaining the current debt-backed fiat system).
You yourself (nullc) once said somewhere that bigger blocks would probably be fine - ie, they would not pose a decentralization risk. (I can't find the link now - maybe I'll have time to look for it later.) I found the link:
https://np.reddit.com/btc/comments/43mond/even_a_year_ago_i_said_i_though_we_could_probably/
I am also surprised that you now seem to be among those making unfounded insinuations that posters such as myself must somehow be "paid off" - as if intelligent observers and participants could not decide on their own, based on the empirical evidence, that bigger blocks are needed, when the network is obviously becoming congested and additional infrastructure is obviously available.
Random posters on Reddit might say and believe such conspiratorial nonsense - but I had always thought that you, given your intellectual abilities, would have been able to determine that people like me are able to arrive at supporting bigger blocks quite entirely on our own, based on two simple empirical facts, ie:
  • the infrastructure supports bigger blocks now;
  • the market needs bigger blocks now.
In the present case, I will simply assume that you might be having a bad day, for you to erroneously and groundlessly insinuate that I must be "paid off" in order to support bigger blocks.
Using Occam's Razor
The much simpler explanation is that bigger-block supporters believe will get "paid off" from bigger gains for their investment in Bitcoin.
Rational investors and users understand that bigger blocks are necessary, based on the apparent correlation (not necessarily causation!) between volume and price (as mentioned in my other post, and backed up with graphs).
And rational network capacity planners (a group which you should be in - but for some mysterious reason, you're not) also understand that bigger blocks are necessary, and quite feasible (and do not pose any undue "centralization risk".)
As I have been on the record for months publicly stating, I understand that bigger blocks are necessary based on the following two objective, rational reasons:
  • because I've seen the graphs; and
  • because I've seen the empirical research in the field (from guys like Gavin and Toomim) showing that the network infrastructure (primarily bandwidth and latency - but also RAM and CPU) would also support bigger blocks now (I believe they showed that 3-4MB blocks would definitely work fine on the network now - possibly even 8 MB - without causing undue centralization).
Bigger-block supporters are being objective; smaller-block supporters are not
I am surprised that you no longer talk about this debate in those kind of objective terms:
  • bandwidth, latency (including Great Firewall of China), RAM, CPU;
  • centralization risk
Those are really the only considerations which we should be discussing in this debate - because those are the only rational considerations which might justify the argument for keeping 1 MB.
And yet you, and Adam Back adam3us, and your company Blockstream (financed by the Bilderberg Group, which has significant overlap with central banks and the legacy, debt-based, violence-backed fiat money system that has been running and slowing destroying our world) never make such objective, technical arguments anymore.
And when you make unfounded conspiratorial, insulting insinuations saying people who disagree with you on the facts must somehow be "paid off", then you are now talking like some "nobody" on Reddit - making wild baseless accusations that people must be "paid off" to support bigger blocks, something I had always thought was "beneath" you.
Instead, Occams's Razor suggests that people who support bigger blocks are merely doing so out of:
  • simple, rational investment policy; and
  • simple, rational capacity planning.
At this point, the burden is on guys like you (nullc) to explain why you support a so-called scaling "roadmap" which is not aligned with:
  • simple, rational investment policy; and
  • simple, rational capacity planning
The burden is also on guys like you to show that you do not have a conflict of interest, due to Blockstream's highly-publicized connections (via insurance giant AXA - whose CED is also the Chairman of the Bilderberg Group; and companies such as the "Big 4" accounting firm PwC) to the global cartel of debt-based central banks with their infinite money-printing.
In a nutshell, the argument of big-block supporters is simple:
If the hardware / network infrastructure supports bigger blocks (and it does), and if the market demands it (and it does), then we certainly should use bigger blocks - now.
You have never provided a counter-argument to this simple, rational proposition - for the past few years.
If you have actual numbers or evidence or facts or even legitimate concerns (regarding "centralization risk" - presumably your only argument) then you should show such evidence.
But you never have. So we can only assume either incompetence or malfeasance on your part.
As I have also publicly and privately stated to you many times, with the utmost of sincerity: We do of course appreciate the wealth of stellar coding skills which you bring to Bitcoin's cryptographic and networking aspects.
But we do not appreciate the obstructionism and centralization which you also bring to Bitcoin's economic and scaling aspects.
Bitcoin is bigger than you.
The simple reality is this: If you can't / won't let Bitcoin grow naturally, then the market is going to eventually route around you, and billions (eventually trillions) of investor capital and user payments will naturally flow elsewhere.
So: You can either be the guy who wrote the software to provide simple and safe Bitcoin scaling (while maintaining "reasonable" decentralization) - or the guy who didn't.
The choice is yours.
The market, and history, don't really care about:
  • which "side" you (nullc) might be on, or
  • whether you yourself might have been "paid off" (or under a non-disclosure agreement written perhaps by some investors associated the Bilderberg Group and the legacy debt-based fiat money system which they support), or
  • whether or not you might be clueless about economics.
Crypto and/or Bitcoin will move on - with or without you and your obstructionism.
Bigger-block supporters, including myself, are impartial
By the way, my two recent posts this past week on the Craig Wright extravaganza...
...should have given you some indication that I am being impartial and objective, and I do have "integrity" (and I am not "paid off" by anybody, as you so insultingly insinuated).
In other words, much like the market and investors, I don't care who provides bigger blocks - whether it would be Core/Blockstream, or Bitcoin Classic, or (the perhaps confusingly-named) "Bitcoin Unlimited" (which isn't necessarily about some kind of "unlimited" blocksize, but rather simply about liberating users and miners from being "limited" by controls imposed by any centralized group of developers, such as Core/Blockstream and the Bilderbergers who fund you).
So, it should be clear by now I don't care one way or the other about Gavin personally - or about you, or about any other coders.
I care about code, and arguments - regardless of who is providing such things - eg:
  • When Gavin didn't demand crypto proof from Craig, and you said you would have: I publicly criticized Gavin - and I supported you.
  • When you continue to impose needless obstactles to bigger blocks, then I continue to criticize you.
In other words, as we all know, it's not about the people.
It's about the code - and what the market wants, and what the infrastructure will bear.
You of all people should know that that's how these things should be decided.
Fortunately, we can take what we need, and throw away the rest.
Your crypto/networking expertise is appreciated; your dictating of economic parameters is not.
As I have also repeatedly stated in the past, I pretty much support everything coming from you, nullc:
  • your crypto and networking and game-theoretical expertise,
  • your extremely important work on Confidential Transactions / homomorphic encryption.
  • your desire to keep Bitcoin decentralized.
And I (and the network, and the market/investors) will always thank you profusely and quite sincerely for these massive contributions which you make.
But open-source code is (fortunately) à la carte. It's mix-and-match. We can use your crypto and networking code (which is great) - and we can reject your cripple-code (artificially small 1 MB blocks), throwing it where it belongs: in the garbage heap of history.
So I hope you see that I am being rational and objective about what I support (the code) - and that I am also always neutral and impartial regarding who may (or may not) provide it.
And by the way: Bitcoin is actually not as complicated as certain people make it out to be.
This is another point which might be lost on certain people, including:
And that point is this:
The crypto code behind Bitcoin actually is very simple.
And the networking code behind Bitcoin is actually also fairly simple as well.
Right now you may be feeling rather important and special, because you're part of the first wave of development of cryptocurrencies.
But if the cryptocurrency which you're coding (Core/Blockstream's version of Bitcoin, as funded by the Bilderberg Group) fails to deliver what investors want, then investors will dump you so fast your head will spin.
Investors care about money, not code.
So bigger blocks will eventually, inevitably come - simply because the market demand is there, and the infrastructure capacity is there.
It might be nice if bigger blocks would come from Core/Blockstream.
But who knows - it might actually be nicer (in terms of anti-fragility and decentralization of development) if bigger blocks were to come from someone other than Core/Blockstream.
So I'm really not begging you - I'm warning you, for your own benefit (your reputation and place in history), that:
Either way, we are going to get bigger blocks.
Simply because the market wants them, and the hardware / infrastructre can provide them.
And there is nothing you can do to stop us.
So the market will inevitably adopt bigger blocks either with or without you guys - given that the crypto and networking tech behind Bitcoin is not all that complex, and it's open-source, and there is massive pent-up investor demand for cryptocurrency - to the tune of multiple billions (or eventually trillions) of dollars.
It ain't over till the fat lady sings.
Regarding the "success" which certain small-block supports are (prematurely) gloating about, during this time when a hard-fork has not happened yet: they should bear in mind that the market has only begun to speak.
And the first thing it did when it spoke was to dump about 20-25% of Core/Blockstream nodes in a matter of weeks. (And the next thing it did was Gemini added Ethereum trading.)
So a sizable percentage of nodes are already using Classic. Despite desperate, irrelevant attempts of certain posters on these forums to "spin" the current situation as a "win" for Core - it is actually a major "fail" for Core.
Because if Core/Blocksteam were not "blocking" Bitcoin's natural, organic growth with that crappy little line of temporary anti-spam kludge-code which you and your minions have refused to delete despite Satoshi explicitly telling you to back in 2010 ("MAX_BLOCKSIZE = 1000000"), then there would be something close to 0% nodes running Classic - not 25% (and many more addable at the drop of a hat).
This vote is ongoing.
This "voting" is not like a normal vote in a national election, which is over in one day.
Unfortunately for Core/Blockstream, the "voting" for Classic and against Core is actually two-year-long referendum.
It is still ongoing, and it can rapidly swing in favor of Classic at any time between now and Classic's install-by date (around January 1, 2018 I believe) - at any point when the market decides that it needs and wants bigger blocks (ie, due to a congestion crisis).
You know this, Adam Back knows this, Austin Hill knows this, and some of your brainwashed supporters on censored forums probably know this too.
This is probably the main reason why you're all so freaked out and feel the need to even respond to us unwashed bigger-block supporters, instead of simply ignoring us.
This is probably the main reason why Adam Back feels the need to keep flying around the world, holding meetings with miners, making PowerPoint presentations in English and Chinese, and possibly also making secret deals behind the scenes.
This is also why Theymos feels the need to censor.
And this is perhaps also why your brainwashed supporters from censored forums feel the need to constantly make their juvenile, content-free, drive-by comments (and perhaps also why you evidently feel the need to privately message me your own comments now).
Because, once again, for the umpteenth time in years, you've seen that we are not going away.
Every day you get another worrisome, painful reminder from us that Classic is still running on 25% of "your" network.
And everyday get another worrisome, painful reminder that Classic could easily jump to 75% in a matter of days - as soon as investors see their $7 billion wealth starting to evaporate when the network goes into a congestion crisis due to your obstructionism and insistence on artificially small 1 MB blocks.
If your code were good enough to stand on its own, then all of Core's globetrotting and campaigning and censorship would be necessary.
But you know, and everyone else knows, that your cripple-code does not include simple and safe scaling - and the competing code (Classic, Unlimited) does.
So your code cannot stand on its own - and that's why you and your supporters feel that it's necessary to keep up the censorship and and the lies and the snark. It's shameful that a smart coder like you would be involved with such tactics.
Oppressive regimes always last longer than everyone expects - but they also also collapse faster than anyone expects.
We already have interesting historical precedents showing how grassroots resistance to centralized oppression and obstructionism tends to work out in the end. The phenomenon is two-fold:
  • The oppression usually drags on much longer than anyone expects; and
  • The liberation usually happens quite abruptly - much faster than anyone expects.
The Berlin Wall stayed up much longer than everyone expected - but it also came tumbling down much faster than everyone expected.
Examples of opporessive regimes that held on surprisingly long, and collapsed surpisingly fast, are rather common - eg, the collapse of the Berlin Wall, or the collapse of the Soviet Union.
(Both examples are actually quite germane to the case of Blockstream/Core/Theymos - as those despotic regimes were also held together by the fragile chewing gum and paper clips of denialism and censorship, and the brainwashed but ultimately complacent and fragile yes-men that inevitably arise in such an environment.)
The Berlin Wall did indeed seem like it would never come down. But the grassroots resistance against it was always there, in the wings, chipping away at the oppression, trying to break free.
And then when it did come down, it happened in a matter of days - much faster than anyone had expected.
That's generally how these things tend to go:
  • oppression and obstructionism drag on forever, and the people oppressing freedom and progress erroneously believe that Core/Blockstream is "winning" (in this case: Blockstream/Core and you and Adam and Austin - and the clueless yes-men on censored forums like r\bitcoin who mindlessly support you, and the obedient Chinese miners who, thus far, have apparently been to polite to oppose you) ;
  • then one fine day, the market (or society) mysteriously and abruptly decides one day that "enough is enough" - and the tsunami comes in and washes the oppressors away in the blink of an eye.
So all these non-entities with their drive-by comments on these threads and their premature gloating and triumphalism are irrelevant in the long term.
The only thing that really matters is investors and users - who are continually applying grassroots pressure on the network, demanding increased capacity to keep the transactions flowing (and the price rising).
And then one day: the Berlin Wall comes tumbling down - or in the case of Bitcoin: a bunch of mining pools have to switch to Classic, and they will do switch so fast it will make your head spin.
Because there will be an emergency congestion crisis where the network is causing the price to crash and threatening to destroy $7 billion in investor wealth.
So it is understandable that your supports might sometimes prematurely gloat, or you might feel the need to try to comment publicly or privately, or Adam might feel the need to jet around the world.
Because a large chunk of people have rejected your code.
And because many more can and will - and they'll do in the blink of an eye.
Classic is still out there, "waiting in the wings", ready to be installed, whenever the investors tell the miners that it is needed.
Fortunately for big-block supporters, in this "election", the polls don't stay open for just one day, like in national elections.
The voting for Classic is on-going - it runs for two years. It is happening now, and it will continue to happen until around January 1, 2018 (which is when Classic-as-an-option has been set to officially "expire").
To make a weird comparison with American presidential politics: It's kinda like if either Hillary or Trump were already in office - but meanwhile there was also an ongoing election (where people could change their votes as often as they want), and the day when people got fed up with the incompetent incumbent, they can throw them out (and install someone like Bernie instead) in the blink of an eye.
So while the inertia does favor the incumbent (because people are lazy: it takes them a while to become informed, or fed up, or panicked), this kind of long-running, basically never-ending election favors the insurgent (because once the incumbent visibly screws up, the insurgent gets adopted - permanently).
Everyone knows that Satoshi explicitly defined Bitcoin to be a voting system, in and of itself. Not only does the network vote on which valid block to append next to the chain - the network also votes on the very definition of what a "valid block" is.
Go ahead and re-read the anonymous PDF that was recently posted on the subject of how you are dangerously centralizing Bitcoin by trying to prevent any votes from taking place:
https://np.reddit.com/btc/comments/4hxlquhoh_a_warning_regarding_the_onset_of_centralised/
The insurgent (Classic, Unlimited) is right (they maximally use available bandwidth) - while the incumbent (Core) is wrong (it needlessly throws bandwidth out the window, choking the network, suppressing volume, and hurting the price).
And you, and Adam, and Austin Hill - and your funders from the Bilderberg Group - must be freaking out that there is no way you can get rid of Classic (due to the open-source nature of cryptocurrency and Bitcoin).
Cripple-code will always be rejected by the network.
Classic is already running on about 20%-25% of nodes, and there is nothing you can do to stop it - except commenting on these threads, or having guys like Adam flying around the world doing PowerPoints, etc.
Everything you do is irrelevant when compared against billions of dollars in current wealth (and possibly trillions more down the road) which needs and wants and will get bigger blocks.
You guys no longer even make technical arguments against bigger blocks - because there are none: Classic's codebase is 99% the same as Core, except with bigger blocks.
So when we do finally get bigger blocks, we will get them very, very fast: because it only takes a few hours to upgrade the software to keep all the good crypto and networking code that Core/Blockstream wrote - while tossing that single line of 1 MB "max blocksize" cripple-code from Core/Blockstream into the dustbin of history - just like people did with the Berlin Wall.
submitted by ydtm to btc [link] [comments]

Armory Companion Demo Sending Bitcoin - Armory Guide Offline Wallet Setting up cold storage in Armory on Ubuntu 14.04 Bitcoin Armory Troubleshooting Offline Node - YouTube

Armory. Best desktop Bitcoin wallets May 13, 2017 orbis 0. This post is dedicated to Desktop Bitcoin wallets, the kind that you manage on your PC computer. First, what are Hot wallets? hot wallets are Bitcoin wallets that run on internet-connected devices. They are very convenient for daily use with small amounts but aren’t considered as secure as Hardware wallets, Search for: Bitcoin ... This pull request is for a post for Armory's website that states Armory's position on BU and how to taint coins should a hard fork occur. The instructions are adapted from https://bitcointa... It has been three months since Armory's removal. This PR relists Armory onto the choose your wallet page. BEST BITCOIN WALLET. Armory is the most secure and full featured solution available for users and institutions to generate and store Bitcoin private keys. This means users never have to trust the Armory team and can use it with the Glacier Protocol. Satoshi would be proud! Users are empowered with multiple encrypted Bitcoin wallets and permanent one-time ‘paper backups’. Armory pioneered ... Python-based fully-featured Bitcoin Wallet Software. There is no official Armory email address. The easiest way to contact the developers is to use Bitcointalk.org or the IRC channel.

[index] [30143] [2053] [9007] [45083] [9569] [10114] [24901] [6422] [46424] [436]

Armory Companion Demo

But the Bitcoin plan calls for the creation of only 21 million bitcoins. In this way, Bitcoin will try to avoid the pitfalls of modern fiat currencies such as inflation, deflation, market ... Bitcoin Armory Walk Through - Duration: 53:51. Andy Ofiesh. 53:51 . Electrum offline transactions tutorial - Duration: 4:00. FasterTutorialsCom 36,889 views. 4:00. Bitcoin 101 - Intro to Paper ... How to Download and Verify the Armory Bitcoin Wallet - Duration: 22:31. Rex Kneisley 4,755 views. 22:31 [HOW TO]- Store Bitcoin On USB Stick - Guide - Duration: 14:01. ... Watch me walk you through getting your Armory and Bitcoin Core working in sync again. Armory Ver 96.2: https://btcarmory.com/0.96.2-release/ Bitcoin Core V 1... How to install Bitcoin Armory in Ubuntu 14.04 - Duration: 7:00. Bitcoin Beginner 8,443 views. 7:00. How To Make A Secure BIP 38 Encrypted Bitcoin Paper Wallet - TUTORIAL - Duration: 13:38. ...

#