There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online. Hey there So I am the hacker who cracked your email address and device a few weeks back. You typed in your pwd on one of the sites you visited, and I intercepted that. Here is your password from (redacted) upon time of compromise: (redacted) Obviously you can can change it, or even already changed it. However it won't really matter, my malware modified it every time. Do not really try to contact me personally or find me. Via your email, I uploaded harmful code to your Operation System. I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources. Also I set up a Virus on your system. You aren't my only target, I generally lock computers and ask for a ransom. But I was hit by the web pages of romantic material that you normally stop by. I am in shock of your own fantasies! I have never ever noticed anything at all like this! Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device. There after, I put together them to the content of the currently viewed site. There will certainly be giggling when I send these pics to your connections! Nevertheless I am certain you do not need this. Therefore, I expect to have payment from you for my silence. I feel $859 is an satisfactory price for this! Pay with Bitcoin. My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy. Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system. My Trojan viruses have auto alert, so I know when this specific e mail is read. I give you 2 days (48 hours) to make a payment. If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days. Do not end up being foolish! Police or buddies won't support you for sure ... P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages. I wish for your wisdom. Bon voyage. Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it Good day, If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you. I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work. Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it. I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF) So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts. P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao Hey there So I am the hacker who cracked your email address and device a few weeks back. You typed in your pwd on one of the sites you visited, and I intercepted that. Here is your password from (redacted) upon time of compromise: (redacted) Obviously you can can change it, or even already changed it. However it won't really matter, my malware modified it every time. Do not really try to contact me personally or find me. Via your email, I uploaded harmful code to your Operation System. I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources. Also I set up a Virus on your system. You aren't my only target, I generally lock computers and ask for a ransom. But I was hit by the web pages of romantic material that you normally stop by. I am in shock of your own fantasies! I have never ever noticed anything at all like this! Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device. There after, I put together them to the content of the currently viewed site. There will certainly be giggling when I send these pics to your connections! Nevertheless I am certain you do not need this. Therefore, I expect to have payment from you for my silence. I feel $859 is an satisfactory price for this! Pay with Bitcoin. My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy. Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system. My Trojan viruses have auto alert, so I know when this specific e mail is read. I give you 2 days (48 hours) to make a payment. If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days. Do not end up being foolish! Police or buddies won't support you for sure ... P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages. I wish for your wisdom. Bon voyage. I Have YOUR code. I rule phone xxxx I SENT this newsletter from YOUR ACCOUNT. I look your device. I am in daze of your sex act fantasies! I made backup your contacts and files. I made screenshots from your digital camera of yours device. I want 888 $ to my (Bitcoin My )Bitcoin currency xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts! If you do not know how to do this - enter into Google/ =how to transfer money to a Bitcoin& wallet- Time 30 hours. This excellent post as Subway & Dairy Queen. Hello! I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it. Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time. Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account. Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you. You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit. I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting! So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site. Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ... I will not do this if you pay me a little amount. I think $877 is a nice price for it! I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system. My Trojan have auto alert, after this email is looked, I will be know it! You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours) Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data). Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites! I hope you will be prudent. Bye. Same as before but they increased the amount I got an order from someone to kill you and your family but I am far from your house if you still love your family, I ask you to transfer 0.1 BTC to me. If you report this email, I will immediately kill your family. FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION! We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account. After analyzing documents. We found Illegal activity - HIDING TAXES. That we want? I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL That we do if you don't pay bitcoin? We send these Documents and Proofs to your Tax Department. And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack This is our guarantee, that you don't clean evidence and building a protection policy. If you don't pay by in 7 days, attack will start. Attack including. 1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack. This is not a joke. Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help. Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL AND YOU WILL NEVER AGAIN HEAR FROM US! If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom. All mistakes in text we do specily. Bitcoin is anonymous, nobody will ever know you cooperated. Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link Hello! I am a hacker who has access to your operating system. I also have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin"). My bitcoin address (BTC Wallet) is: x After receiving the payment, I will delete the video and you will never hear me again. I give you 50 hours (more than 2 days) to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best regards. Hey, I know your password is: Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit". My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it. I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean! After that I removed my malware to not leave any traces. I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are! Only you can prevent me from doing this and only I can help you out in this situation. Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address. It's a very good offer, compared to all that horrible shit that will happen if I publish everything! You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine. My bitcoin address is: Copy and paste my address, it's (cAsE-sEnSEtiVE) I give you 3 days time to transfer the bitcoin! As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before. Next time update your browser before browsing the web! НЕLLО! I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout. You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil. Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе. Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе. At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt. Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post. You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x [Bitcoin dеtӓils] Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
Fifty Years of Cypherpunk: History, Personalities, And Spread of its ideas
In this review, we tell how the ideas of cypherpunk were born, how they influenced cryptocurrencies, and modern technologies, who formed the basis and why its popularity these days has grown again.
From the early days to today: the chronology of key events of the cypherpunk
In the early 1970s,James Ellis of the UK Government Communications Center put forward the concept of public-key cryptography. In the early 1980s, small groups of hackers, mathematicians and cryptographers began working on the realization of this idea. One of them was an American cryptographer, Ph.D. David Chaum, who is sometimes called the godfather of cypherpunk. This new culture has proclaimed computer technology as a means of destroying state power and centralized management systems.Key figure among the cypherpunk of the 80s — Intel specialist Timothy C. May. His dream was to create a global system that allows anonymous exchange of information. He created the concept of the BlackNet system. In September 1988, May wrote The Crypto-Anarchist Manifesto: people themselves, without politicians, manage their lives, use cryptography, use digital currencies, and other decentralized tools.In 1989,David Chaum founded DigiCash an eCash digital money system with its CyberBucks and with the blind digital signature technology.Since 1992, Timothy May, John Gilmore (Electronic Frontier Foundation), and Eric Hughes (University of California) have begun holding secret meetings and regular PGP-encrypted mailing through anonymous remailer servers. And finally, in 1993 Eric Hughes published a fundamental document of the movement — А Cypherpunk's Manifesto. The importance of confidentiality, anonymous transactions, cryptographic protection — all these ideas were subsequently implemented in cryptocurrencies.The term "cypherpunk" was first used by hacker and programmer Jude Milhon to a group of crypto-anarchists.In 1995,Julian Assange, the creator of WikiLeaks, published his first post in cypherpunk mailing.In 1996,John Young and Deborah Natsios created the Cryptome, which published data related to security, privacy, freedom, cryptography. It is here that subsequently will be published data from the famous Edward Snowden.In 1997, cryptographerDr. Adam Back (you know him as CEO of Blockstream) created Hashcash, a distributed anti-spam mechanism.In 1998, computer engineer Wei Dai published two concepts for creating a b-money digital payment system:
Each member of the system has a copy of the system database with user funds balances (this idea found itself in Bitcoin).
Distributed base, but not everyone has a copy. To maintain the integrity of participants, deposits, fines, and incentives are provided. This was later implemented in the Proof-of-Stake consensus algorithm.
In April 2001,Bram Cohen developed the BitTorrent protocol and application.In 2002,Paul Syverson, Roger Dingledine and Nick Mathewson presented the alpha version of the anonymity network named TOR Project.In 2004, cypherpunk Hal Finney created the Reusable Proof of Work (RPoW) algorithm. It was based on Adam Back's Hashcash but its drawback was centralization.In 2005, cryptographer Nick Szabo, who developed the concept of smart contracts in the 1990s, announced the creation of Bit Gold — a digital collectible and investment item.In October 2008, legendary Satoshi Nakamoto created themanifesto“Bitcoin: A Peer-to-Peer Electronic Cash System”, which refers to the works of the cypherpunk classics Adam Back and Wei Dai.In 2011,Ross William Ulbricht aka Dread Pirate Roberts created the Silk Road, the first major market for illegal goods and services on the darknet.In 2016,Julian Assange released the book "Cypherpunks: Freedom and the future of the Internet."At the beginning of 2018,Pavel Durov, the creator of Telegram, announced the launch of the TON multi-blockchain platform and mentioned his plans to launch TON ICO.In 2019, the Tor Project introduced an open anti-censorship group.
Plenty of services, products, and technologies were inspired by cypherpunk: Cryptocurrencies, HD (Hierarchical Deterministic) crypto wallets, Coin Mixers, ECDHM addresses, Privacy Coins. The ideas of distribution and anonymity were also implemented in the torrents and VPN. You can see the embodiment of cybersecurity ideas in the electronic signatures and protected messengers (Telegram, Signal, and many others).Why there were so many talks about cypherpunk this spring?In April 2020, Reddit users suggested that the letter from the famous cypherpunks mailing dated September 19, 1999, was written by Satoshi Nakamoto himself (or someone close to him). This letter is about the functioning of ecash. Anonymous (supposed Satoshi) talks about the "public double-spending database" and Wei Dai's b-money as a possible foundation for ecash.In addition, researchers of the mystery "Who is Satoshi Nakamoto?" periodically make some noise and discover the next "secret" about one or another legendary cypherpunks. So, in May 2020, Adam Back wrote in response to videos and new hype discussions that, despite some coincidences, he is not Satoshi.Other heroes of the scene are not idle too: in April 2020, David Chaum received $9.7 million during the presale of the confidential coin xx, created to encourage venture investors.
As you can see from the Satoshi Nakamoto's mentions and from the stories of DigiCash, Hashcash, RPoW, Bit Gold, the movement of cypherpunk influenced a lot the emergence of cryptocurrencies. As governments and corporations restrict freedom and interfere with confidentiality, cypherpunk ideas will periodically rise in popularity. And this confrontation will not end in the coming decades.
A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet
First, a bit of introduction before we get into the living drama that is Brian Krebs. Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring. In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him. One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to. And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.
Fly on the Wall
By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards. However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places. So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum. While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site. By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away. Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things. He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances. More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses) While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers. In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama. The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect. Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks. This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years. Now time for a couple quick side stories: Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address 188.8.131.52. Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as 184.108.40.206. They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider. Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered dominos.pizza and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site. Back to the main tale! So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai". As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement. By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf. While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei. Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
A source and security researcher he was talking to started blabbing about him working with Krebs, and also was selling data to hackers on the side. His example data in his sales post was fucking Brian Krebs'.
OnionWallet (ow24et3tetp6tvmk.onion) stole about 1000$ bucks from me. Well yesterday I was in the mood to try out this new thing Bitcoins. I created a Coinbase account and wired some money over to said account. About 1000$, I thought to myself I don't really need that money right now so I can try investing it into Bitcoins and letting it sit for a while. After that I waited passionately for a good exchange value. I got lucky and got abount 0.266 BTC for my money. I still got an old OnionWallet account I used for some time ago for mixing some of my old Bitcoins. I trused OnionWallet due to the fact that they are featured on the Hidden Wiki and I tried them before and everything worked just fine. But this time was different I could thought any problems transfer the Botcoins to my OnionWallet took about an hour. After that I planned to transfer the Coins to my offline storage for save keeping. But just then when I entered my address and pincode and pressed send. The page was blank... At the firsr moment I was like okey the hell, but then on the second and third trie I shocked. Did... did I just get scamed? No it cannot be, they just have a problem with their side. I settled down and tryied again today. But today still fucking blank. I just lost 1000$ and I feel like shit. What I learned from all that NEVER TRUST SOMEONE IN THE DARKNET! NEVER! I will only use clearnet wallets from now on. Edit: Hope karma is a bitch
I wrote a 30,000 ft. "executive summary" intro document for cryptos. Not for you, for your non-technical parents or friends.
This document was originally written for my dad, an intelligent guy who was utterly baffled about the cryptocurrency world. The aim was to be extremely concise, giving a broad overview of the industry and some popular coins while staying non-technical. For many of you there will be nothing new here, but recognize that you are in the 0.001% of the population heavily into crypto technology. I've reproduced it for Reddit below, or you can find the original post here on my website. Download the PDF there or hit the direct link: .PDF version. Donations happily accepted:
This document is purely informational. At the time of writing there are over 1000 cryptocurrencies (“cryptos”) in a highly volatile, high risk market. Many of the smaller “altcoins” require significant technical knowledge to store and transact safely. I advise you to carefully scrutinize each crypto’s flavor of blockchain, potential utility, team of developers, and guiding philosophy, before making any investment  decisions. With that out of the way, what follows are brief, extremely high-level summaries of some cryptos which have my interest, listed in current market cap order. But first, some info: Each crypto is a different implementation of a blockchain network. Originally developed as decentralized digital cash, these technologies have evolved into much broader platforms, powering the future of decentralized applications across every industry in the global economy. Without getting into the weeds,  most cryptos work on similar principles: Distributed Ledgers Each node on a blockchain network has a copy of every transaction, which enables a network of trust that eliminates fraud.  Decentralized “Miners” comprise the infrastructure of a blockchain network.  They are monetarily incentivized to add computing power to the network, simultaneously securing and processing each transaction.  Peer-to-peer Cryptos act like digital cash-- they require no third party to transact and are relatively untraceable. Unlike cash, you can back them up. Global Transactions are processed cheaply and instantly, anywhere on Earth. Using cryptos, an African peasant and a San Francisco engineer have the same access to capital, markets, and network services. Secure Blockchains are predicated on the same cryptographic technology that secures your sensitive data and government secrets. They have passed seven years of real-world penetration testing with no failures. 
The first cryptocurrency. As with first movers in any technology, there are associated pros and cons. Bitcoin has by far the strongest brand recognition and deepest market penetration, and it is the only crypto which can be used directly as a currency at over 100,000 physical and web stores around the world. In Venezuela and Zimbabwe, where geopolitical events have created hyperinflation in the centralized fiat currency, citizens have moved to Bitcoin as a de facto transaction standard.  However, Bitcoin unveiled a number of issues that have been solved by subsequent cryptos. It is experiencing significant scaling issues, resulting in high fees and long confirmation times. The argument over potential solutions created a rift in the Bitcoin developer community, who “forked” the network into two separate blockchains amidst drama and politicking in October 2017. Potential solutions to these issues abound, with some already in place, and others nearing deployment. Bitcoin currently has the highest market cap, and since it is easy to buy with fiat currency, the price of many smaller cryptos (“altcoins”) are loosely pegged to its price. This will change in the coming year(s).
Where Bitcoin is a currency, Ethereum is a platform, designed as a foundational protocol on which to develop decentralized applications (“Dapps”). Anyone can write code and deploy their program on the global network for extremely low fees. Just like Twitter wouldn’t exist without the open platform of the internet, the next world-changing Dapp can’t exist without Ethereum. CurrentDapps include a global market for idle computing power and storage, peer-to-peer real estate transactions (no trusted third party for escrow), identity networks for governments and corporations (think digital Social Security card), and monetization strategies for the internet which replace advertising. Think back 10 years to the advent of smartphones, and then to our culture today-- Ethereum could have a similar network effect on humanity. Ethereum is currently the #2 market cap crypto below Bitcoin, and many believe it will surpass it in 2018. It has a large, active group of developers working to solve scaling issues,  maintain security, and create entirely new programming conventions. If successful, platforms like Ethereum may well be the foundation of the decentralized internet of the future.
Ripple is significantly more centralized than most crypto networks, designed as a backbone for the global banking and financial technology (“fintech”) industries. It is a network for exchanging between fiat currencies and other asset classes instantly and cheaply, especially when transacting cross-border and between separate institutions. It uses large banks and remittance companies as “anchors” to allow trading between any asset on the network, and big names like Bank of America, American Express, RBC, and UBS are partners. The utility of this network is global and massive in scale. It is extremely important to note that not all cryptos have the same number of tokens. Ripple has 100 Billion tokens compared to Bitcoin’s 21 Million. Do not directly compare price between cryptos. XRP will likely never reach $1k,  but the price will rise commensurate with its utility as a financial tool. In some sense, Ripple is anathema to the original philosophical vision of this technology space. And while I agree with the cyberpunk notion of decentralized currencies, separation of money and state, this is the natural progression of the crypto world. The internet was an incredible decentralized wild west of Usenet groups and listservs before Eternal September and the dot-com boom, but its maturation affected every part of global society.
Cardano’s main claim to fame: it is the only crypto developed using academic methodologies by a global collective of engineers and researchers, built on a foundation of industry-leading, peer-reviewed cryptographic research. The network was designed from first-principles to allow scalability, system upgrades, and to balance the privacy of its users with the security needs of regulators. One part of this ecosystem is the Cardano Foundation, a Swiss non-profit founded to work proactively with governments and regulatory bodies to institute legal frameworks around the crypto industry. Detractors of Cardano claim that it doesn’t do anything innovative, but supporters see the academic backing and focus on regulation development as uniquely valuable.
Stellar Lumens (XLM)
Stellar Lumens and Ripple were founded by the same person. They initially shared the same code, but today the two are distinct in their technical back-end as well as their guiding philosophy and development goals. Ripple is closed-source, for-profit, deflationary, and intended for use by large financial institutions. Stellar is open-source, non-profit, inflationary, and intended to promote international wealth distribution. As such, they are not direct competitors. IBM is a major partner to Stellar. Their network is already processing live transactions in 12 currency corridors across the South Pacific, with plans to process 60% of all cross-border payments in the South Pacific’s retail foreign exchange corridor by Q2 2018. Beyond its utility as a financial tool, the Stellar network may become a competitor to Ethereum as a platform for application development and Initial Coin Offerings (“ICOs”). The theoretical maximum throughput for the network is higher, and it takes less computational power to run. The Stellar development team is highly active, has written extensive documentation for third-party developers, and has an impressive list of advisors, including Patrick Collison (Stripe), Sam Altman (Y Combinator), and other giants in the software development community.
Iota was developed as the infrastructure backbone for the Internet of Things (IoT), sometimes called the machine economy. As the world of inanimate objects is networked together, their need to communicate grows exponentially. Fridges, thermostats, self-driving cars, printers, planes, and industrial sensors all need a secure protocol with which to transact information. Iota uses a “Tangle” instead of a traditional blockchain, and this is the main innovation driving the crypto’s value. Each device that sends a transaction confirms two other transactions in the Tanlge. This removes the need for miners, and enables unique features like zero fees and infinite scalability. The supply of tokens is fixed forever at 2.8*1015, a staggeringly large number (almost three thousand trillion), and the price you see reported is technically “MIOT”, or the price for a million tokens.
The most successful privacy-focused cryptocurrency. In Bitcoin and most other cryptos, anyone can examine the public ledger and trace specific coins through the network. If your identity can be attached to a public address on that network, an accurate picture of your transaction history can be built-- who, what, and when. Monero builds anonymity into the system using strong cryptographic principles, which makes it functionally impossible to trace coins,  attach names to wallets, or extract metadata from transactions. The development team actively publishes in the cryptography research community. Anonymous transactions are not new-- we call it cash. Only in the past two decades has anonymity grown scarce in the first-world with the rise of credit cards and ubiquitous digital records. Personal data is becoming the most valuable resource on Earth, and there are many legitimate reasons for law-abiding citizens to want digital privacy, but it is true that with anonymity comes bad actors-- Monero is the currency of choice for the majority of black market (“darknet”) transactions. Similarly, US Dollars are the main vehicle for the $320B annual drug trade. An investment here should be based on the underlying cryptographic research and technology behind this coin, as well as competitors like Zcash. 
Zero fees and instantaneous transfer make RaiBlocks extremely attractive for exchange of value, in many senses outperforming Bitcoin at its original intended purpose. This crypto has seen an explosion in price and exposure over the past month, and it may become the network of choice for transferring value within and between crypto exchanges. Just in the first week of 2018: the CEO of Ledger (makers of the most popular hardware wallet on the market) waived the $50k code review fee to get RaiBlocks on his product, and XRB got listed on Binance and Kucoin, two of the largest altcoin exchanges globally. This is one to watch for 2018. 
Developed as a single answer to the problem of supply-chain logistics, VeChain is knocking on the door of a fast-growing $8 trillion industry. Every shipping container and packaged product in the world requires constant tracking and verification. A smart economy for logistics built on the blockchain promises greater efficiency and lower cost through the entire process flow. Don’t take my word for it-- VeChain has investment from PwC (5th largest US corporation), Groupe Renault, Kuehne & Nagel (world’s largest freight company), and DIG (China’s largest wine importer). The Chinese government has mandated VeChain to serve as blockchain technology partner to the city of Gui’an, a special economic zone and testbed for China’s smart city of the future. This crypto has some of the strongest commercial partnerships in the industry, and a large active development team.
“Investment” is a misnomer. Cryptos are traded like securities, but grant you no equity (like trading currency).
It is impossible to double-spend or create a fake transaction, as each ledger is confirmed against every other ledger.
Some utility token blockchains use DAG networks or similar non-linear networks which don’t require mining.
In practice, these are giant warehouses full of specialized computers constantly processing transactions. Miners locate to the cheapest electricity source, and the bulk of mining currently occurs in China.
Centralized second-layer exchange websites have been hacked, but the core technology is untouched.
Please, explain to me how it works then. You obviously know nothing about bitcoin/ cryptocurrency or their wallets, and multiple other OPSEC related standards. I have extensive knowledge on the subject, from multiple Reddit wikis from the darknetmarket subs to bitcoin subs, I have an offline wallet that has never seen the light of day, I have a darknet wallet I have a clear net wallet, you NEVER store your passwords on a computer. I’ve worked on kali Linux, using multiple cracking techniques, I’ve infiltrated my own network to find flaws and make it more secure. I think you’re the one who doesn’t have any idea what he’s talking about, but you are in some type of shit mood and have to act tough over the Internet. I don’t care much for what you’re saying, my knowledge has has led me in the right direction for some time now, and unless you can give me any number of reasons why it’s better to use a password manager, then good day sir.
PIVX is an instantly locked, fungible and private digital currency. Built on the quark algorithm, PIVX is the first POS coin running on the current Bitcoin Core.
KEY PROPERTIES OF PIVX
Open Source: You can read the source code yourself here. Instant Transactions: This technology will allow PIVX to be used for point-of-sale situations where a locked payment is sent in about 1 second, while not being exposed to double spends that other cryptos are susceptible to. Private Transactions is the feature that gives PIVX users a high degree of privacy when they use it. Based on CoinJoin, but is heavily modified with mixing ahead of the transaction and other major improvements. Fungibility is the result of offering Private Transaction mixing on the network. Erasing the history of each PIVX transaction before you spend it makes your PIVX just as valuable as anyone else’s. No more tainted funds.
HOW CAN I ACQUIRE PIVX?
Purchasing bitcoin and converting to PIVX or buying PIVX directly with FIAT is the fastest way to get some. WHERE CAN I CONVERT MY BITCOIN TO PIVX? Here is a list of exchanges that trade PIVX.
Note: The author is not responsible for any loss or damages caused due to using the above. Please perform due diligence before opting for any of the above, and, indeed, all others services. A list of all the PIVX markets can be found here MASTERNODES (EARNING PIVX) As stated earlier, PIVX is a privacy-centric, instant and innovative digital currency that seeks to solve the drawbacks of Bitcoin. These improvements are achieved primarily through a layer of users hosting servers that provide services on top of PIVX which are called Masternodes. Masternode owners also have to deposit a stake of their PIVX (10,000 PIVX which is worth about $70 USD at the time of writing ) and temporarily locks it up to host a Masternode. This prevents people from easily creating a Masternode in order to game the security of the system. Masternode owners can also take part in the governance process of the digital currency through a "Budget System" for which each Masternode has one vote. If you cannot set up your own Masternode you could turn to a Masternode Service Provider (MSP). There are likely more Masternode hosting providers available, but 2 well known providers are listed below. Coin-Server Node Hosting ServiceMP-Node Hosting Service
A PIVX wallet is made up of two halves. One is the public, shareable part called the public key. The other is the private part that is required for spending the stored PIVX in that wallet. If one wants to receive PIVX in one’s wallet, one should only provide the public half of their wallet. Think of the public part of a PIVX wallet as your email address and the private part of the PIVX wallet as the password to that email address: you can share the email address freely, but not the password. Download the PIVX-QT Wallet here. Connect with PIVX socially, here's a list with all the PIVX social profiles. The PIVX Website is here! Welcome to PIVX! The PIVX Slack channel is available here! The PIVX Twitter account is here! Remember to #PIVXCrypto The PIVX Forum on BitcoinTalk is here.
Testimonials “Not enough trolling” - nanoakron, XMR Contributor “you are so obviously a shill” - ButtBazaar, in comments on the ETH survey “Wow.” - jstolfi, in reply to the ETH survey Survey ID: 00002 Coin: Monero (XMR) Client: jwinterm Executive Summary Monero is a leading privacy-oriented cryptocurrency. It was originally forked from Bytecoin which introduced Cryptonote, and whose launch was so bad they needed another chance to get it wrong. After their launch, they were a proving ground for Bytecoin exploits. Since then, Monero has become the leader in Cryptonote comedy gold, surpassing Bytecoin. Its future promises exciting drug market comedy gold, while the development team is a zoo of likely furries. 6 Top Comedy Gold Veins
Slow development - Likely due to the amount of time spent yiffing, “nice-to-have” extras like a GUI take a while to be released. After more than two years since at least one possible design for multisig in Cryptonote (curiously enough, from a paper co-authored by Gmax), multisig is still not in Monero yet, although still in development.
Launch issues - Launched because of complaints that the Bytecoin launch was unfair (i.e., not announced on Bitcointalk), Monero launched after about a week’s notice without an overabundance of communication from its founder. It released without 32-bit support, without a GUI, and without a mac client which according to BCT trollscritics is functionally equivalent to a premine.
Fenty - Monero is poised to take a commanding lead in the drug markets because of its combination of market share and stronger privacy commitment. Fent is known to be the leader in comedy gold potential for drug markets. Someday, there will be a major incident linked to a fent shipment arranged by a cryptocurrency. If that’s Monero, the fallout could be substantial.
Bleeding Edge: Monero started out as a clonecoin, a relaunch of Bytecoin, the first CryptoNote coin. However, it is in a position which is I think unique, or at least quite rare: despite starting as the clone, it is now leading the original upstream in market cap. Further, as a result CryptoNote / Bytecoin exploits have been demonstrated first on Monero. Monero has also developed its codebase such that it could not directly import upstream easily like most clonecoins could. Like all of the bleeding edge cryptocurrencies, Monero may produce more comedy gold from bugs being exploited on the chain.
51% / miner attack: Monero has had at some points large concentration in mining. As with most if not all cryptocurrencies, this centralization can lead to miners having significant control over a coin. So far, there doesn’t seem to have been any direct impact on Monero from this, and there may not be any effect. But Bitcoin and Ethereum have both had issues relating to functional centralization in mining in one way or another. Monero could as well. If anything does develop here, the popcorn futures could be explosive.
A brief history of comedy gold in Monero
There's an old proverb that says just about whatever you want it to.
- Anonymous (from this page of anonymous quotes) In the beginning there was Bytecoin. Of course, the original bytecoin was actually just a basic BTC clonecoin. And I think there was at least one other Bytecoin not the one we’re talking about here, since deceased as well. And when exactly this Bytecoin started is a matter of no little dispute. But, whenever it was, it was. By the time it was “discovered” and posted on BCT, about 80% of the total supply had been mined. Regardless of what exactly led to this, there were many in the cryptocurrency community on BCT who wanted a relaunch to use the tech without having to buy into the existing distribution. Then came “bitMonero” (first reference BCT ANN). Launched on relatively short notice, with a de-optimized miner inherited from upstream, no mac client, without 32bit support, and without a GUI. The original developer of the bitMonero fork, thankful_for_today (TFT), supported the network through an initial bug inherited from upstream [ 1 ]. TFT disappears from the thread for a while, and some of the community pull together to make a sort of rebranding, changing to “Monero”, making a new ANN (second BCT ANN listed in references) and forming a new team to run the coin. In the meantime, TFT made another Cryptonote based coin, Fantomcoin, but TFT continued to try bitMonero development as well , before finally abandoning the attempt again. And then the coin gets pretty boring. There’s a potentially serious issue revealed  which was inherited from Cryptonote and potentially even a deliberate backdoor left in, but the fix is in pretty quick and the ecosystem is small enough there’s not really an opportunity to exploit it further. While development is slow, the coin continues to work and move on. The coin gets adopted on one of the darknet markets in 2016, and around the same period it sees a surge in market price. While there is potential for comedy gold fallout from this, there hasn’t been anything obvious so far that I’ve seen. Researcher’s Narrative: After wrapping up the ETH survey, I put up the new $5 survey special sign and settled in with a bottle of cheap vodka to contemplate deep questions like how I got here, where I’m going, and why the ground is swaying like that. By the time I woke up, the bottle was empty, but there was a $5 bill slipped under the door with a note which read “Monero?” After only a few short hours of pondering the note and where the vodka had gone, I knew what I had to do next. A dark night in a world that never sleeps and knows how to keep its secrets...But on the 12th Floor of the Acme Building, one man is still trying to find the answers to life's persistent questions: Guy Noir, drunken sotprivate comedy gold surveyor. Thanks Narrator. Although I can do without the judgemental commentary. At least I struck it out. I’ll strike you out! But this is going even more off-course than usual. I should really make at least a token effort to do my job. So off I go to the furriest corner of cryptocurrency, and I ask the Monerons what they think their greatest weaknesses are. A rather clever move, if I do say so myself, as they’ll either do much of my job for me, or they’ll say they are entirely without fault and thus provide me with more fodder about how unselfaware they are! They rather surprise me by providing solid responses, with only a rather token “we’re flawless!” attitude to be found. This actually makes my job somewhat harder, as now I have to try to figure out whether the seeming lack of major flaws is a result of such a biased “research” method, general laziness, or being co-opted by actually enjoying the community. So I take the only logical route and go on a weeklong acid binge. At the end, I realize I’m an insignificant mote in an uncaring universe where humanity itself is an unnoticed blip. The futility of civilization and life itself is obvious. After some further reflection aided by bottles and pipes, as well as overdue bill notices, I realize that while all of this is true, none of it is relevant, and my foggy mind is further from any useful answers than when I started. Disclosure of biases: I was hired to write this article with $5 in BTC from jwinterm who is a participant in Monero. In the thread where I asked Monerons what their greatest weaknesses are, I learned a bit about their development process and decided I wanted to pitch my services to them. This has unquestionably made me biased. However, I did do my best to try to figure out where the critical flaw was to maximize the comedy gold yield. In coming up short, I’m not sure whether I’ve missed flaws or simply blinded myself to them. I know there are additional paths to find more comedy gold. I should ask the Bytecoin community what they think of Monero. And DASH and etc. to try to find all of its critics. But this piece must stand as simply an initial survey and I must move on to my next step. References
[ ] https://bitcointalk.org/index.php?topic=563821.msg6147116#msg6147116 - states rationale for not using Bytecoin rather than Monero (presented as Bytecoin clonecoin at this point) as being “Also the fact that cryptonote/bytecoin was hidden deep for the last few years and was being mined by a "big" unknown community the fork would give people a fair start on this new technology.”
[ ] https://bitcointalk.org/index.php?topic=563821.msg6286990#msg6286990 - Johnny Mnemonic, “There may be no pre-mine, but not a single step was taken to make this coin any more accessible than BCN. An easy GUI miner is super critical for early adoption, as is a cross-platform wallet that can be used out of the box. So now the only miners are the same few people willing to fuss around in the command line.”
[ ] https://bitcointalk.org/index.php?topic=563821.msg6300505#msg6300505 - “The problem is in block generation code. In one of last updates in Bytecoin there was a bug introduced: it calculates extra-size penalty the wrong way. As a result we see that a mined block isn't accepted by the network. I will consume the big transaction now into correct block. As soon as network accepts this block I will release new mining code to git.”
[ ] https://coinmarketcap.com/currencies/fantomcoin/ - Fantomcoin, merged mining cryptonote coin. Gets mentioned in BCT XMR thread since the cryptonote world is relatively small, with Bytecoin being the other one I know, and the reference implementation which isn’t actually a coin. (Subsequent to writing this learned about other ones, and learned Fantomcoin was created by TFT (original creator of BMR which was rebranded to XMR))
[ ] https://news.ycombinator.com/item?id=7765455 - nullc on zerocash vs bytecoin; “(And come on, I'm not usually one to lean on authority— but you ought to believe /me/ when I say it's not copying Bitcoin and that it's doing something very useful and interesting for cryptographic privacy)”
[ ] https://bitcointalk.org/index.php?topic=583449.14980 bookmark at page 750 in case computer crashes before I’m back from smoke break; actually an interesting page; all about talking about changing the emission rate and what is fundamental and unchangeable and who needs to approve changes. Very core cryptocurrency discussion.
A SIMPLE GUIDE TO MIXING BITCOINS AND MAKING THEM UNTRACEABLE
A SIMPLE GUIDE TO SAFELY AND EFFECTIVELY TUMBLING (MIXING) BITCOINS
The level of Monero anonymity is sometimes questioned, in particular, Edward Snowden called it "amateur cryptocurrency." At the time of writing, Monero is ranked 11th by the capitalization in Coinmarketcap.com How does it work? Monero is mostly an open source software that uses the principle of proof-of-work. But unlike Bitcoin, Monero emission is not limited. That's why the developers did it so that the miners would ensure the system's operation even after the emission was completed. https://i.redd.it/nzcpy6u3cpi11.gif The developers of Monero have made a lot of efforts to make their cryptocurrency secure. To achieve a high result, special measures were taken:
Use of "Annular signatures". This technology allows you to "shuffle" all the public keys, thus eliminating the possibility of identifying any of the participants in the system.
Monero uses a unique protocol that creates one-time addresses. This allows you to hide information about the payee, the balance of his account and so on.
Protection against hacking. Cryptographic algorithms ensure the security of electronic cash stored in user wallets.
Due to CryptoNote and the obfuscation added to the protocol, passive mixing is provided: all transactions in the system are anonymous, and all participants in the system can use plausible negation in the event if they are being captured. Dirty Monero? Among the miners, it’s in high demand, due to anonymity for mining on other people's computers and servers. Recently, there have been more cases when Monero was noticed in the code of many viruses. The power of many computers around the world is used to extract this particular cryptocurrency, in particular, this happened last year in London, where scammers used the hacked government servers for mining. Also Monero, right along with Bitcoin, Zcash and Dash is the most used cryptocurrency in Darknet. A particularly favored method of money laundering is the so-called "mixer". The principle of its work is that the money received illegally is sent to the exchange where Bitcoin coins are purchased, for which the Monero tokens are then purchased and then the attacker can safely transfer to any stock exchange, to a pre-established account and receive money in any form convenient for him. Advantages of Monero
Absolute decentralization. Without any control, including financial organizations (banks and etc);
The anonymity of transactions;
Constant growth and trust;
The presence of his own personal wallet.
Disadvantages of Monero
The size of one transaction in Monero is more significant than in Bitcoin;
The anonymity of transactions began to challenge experts working on the development of other cryptocurrencies.
*DISCLAIMER: Windows 7 is my operating system. Unexpected problems may occur if you use another OS, however it may also work perfectly. I simply do not know. Before doing anything i would recommend making a folder to keep all of these downloaded programs in so you do not lose anything. I would also recommend either grabbing a pen and pencil to write all of your passwords down, OR creating a notepad file that you put all of your passwords in and then putting that notepad file safely on a flashdrive. If you choose to use a flashdrive be sure to only use that flashdrive for keeping your passwords safe and NOTHING else. For example i would NOT put work related or college related projects on this flash drive. I would use it solely for Silkroad or other darknet browsing. Alright the first step i would say you need to take is downloading MultiBit. It is a bitcoin wallet that allows you to store your bitcoin. Multibit is NOT directly connected to your real identity. After you've downloaded this wallet you need to add a password to your wallet. Since multibit is NOT connected to your real identity i would recommend using a completely random password with more than 15 characters using caps and noncaps letters, numbers and symbols. I would then recommend writing that password down and keeping it somewhere safe. Do not lose this password. The next step is to make an account on coinbase. Coin base is probably the safest way to obtain bitcoin. It takes a while but it is the easiest and most secure way to purchase bitcoin. You connect your bank account to this website and then buy bitcoin which will be transferred to your account within 4-7 days. Your coinbase account IS directly connected to your identity so i would recommend using your real email, and a NEW password. It is very important that this password is DIFFERENT from your multibit password because if it is the same password someone may be able to connect your bank account with the multibit wallet. You don't want that. After you've created an account on coinbase fill out as many verifications as possible. The more, the better. *Also, it's worth noting that if you wish to make a purchase instantly, for a slightly higher price, you can. After you've reached "Level 1" on the coinbase verification page you can instantly buy up to 100$ worth of bitcoin each day with vista credit card. If you wish to buy over 100$ worth of bitcoin instantly you can, but you must fill out more of the coinbase verification page. To reach "Level 2" on coinbase and buy up to 1000$ worth of bitcoin instantly you must wait 30 days after your first purchase and verify your identity. The next step is to download Block Chain. Block chain is an app on the chrome browser that allows you to make your newly purchased bitcoin completely anonymous. This website is NOT connected to your real identity. I would recommend creating another NEW password that is DIFFERENT from your other two. The next step is to download Tor. Tor allows you to connect to clearnet websites such as silkroad. The silkroad web address is currently silkroad6ownowfk.onion. If this address changes it will be updated to the sidebar on the /silkroad subreddit. Open Tor and select the "S" loacted next to the address bar. Turn scripts off. This is important. After downloading Tor you need to download PGP (also known as GPG4win). The default installation settings include GPA unchecked. Users need to ensure that GPA is checked and installed. You need to make a "New Key". To do this open the folder you downloaded PGP in, then click on the "GPA" application. It will open up a gui that will contain all of the keys you import from now on. You need to create a New key so click on the "Keys" listing at the top of the gui (next to the file and edit listings) and select "New key...". It will ask for your name. It is important that you make up a FAKE name that is NOT connected to your real identity. Click "Forward". It will now ask for your E-mail. It is important that your make up a FAKE email that is NOT connected to your real identity. Click "Forward" again. It will ask you to create a backup copy of your key. I highly recommend doing this. It will now ask you for a password. I would recommend creating another NEW and SECURE password that is DIFFERENT from your other three. After you have created a passphrase it will ask you to backup your key to somewhere. I recommend backing it up to your PGP folder and later putting it on a flashdrive that you keep safe with your other written down passwords. After you've chosen a folder to place your backup file in you need to go to that folder and open your "secret-key" file with notepad. To do this rightclick it and select "Open with..." then browse for notepad. After you've opened your "secret key" file you will see two keys. One will be a public key that you can give to anyone and the next will be a private key that you probably will never need; however you should NEVER disclose your private key to ANYONE. The next step is using Tor to go to the silkroad website which is currently silkroad6ownowfk.onion . Once there create an account with a NEW username, password, and PIN that is NOT connected in anyway to your real identity. Once you've created an account on this website you need to make sure the silk road vendors know your public key. Copy and paste your PUBLIC key (located in your "secret key" file) to the "settings" section on Silk Road. This section is located under your silkroad username in the top right corner. Once there copy and paste your PUBLIC key here: "your public PGP key (will show error if invalid)". After you've pasted your PUBLIC key select "Update user". After you've done this you've done almost everything you need to do to make a purchase on the silk road. Part 2 is located here
Ive seen people have been asking for it and i decided id post up a guide for buying online seeing as ive some knowledge in this area with many successful transactions. This guide won’t be going too deep but will give you the perfect protection and security for getting started to buying online. What is needed
VPN A VPN is a virtual private network and in layman terms it masks your identity so snooping eyes cannot see what you are doing over a network. This is very useful when searching on the clearnet (websites without .onion directory). It also helps in hiding tor traffic from your internet provider. Even though everything on tor is encrypted your internet provider can still see when you are using the tor network, VPN blocks them from seeing this. A VPN is essential. For finding a good VPN go to this site/this site Tor Browser Bundle Im sure most of you know what this is already but for those who don’t its the browser needed to access hidden websites on the tor network, to download it go to tor Bitcoin Bitcoin is the currency you will be using to purchase online. You can obtain bitcoin in many ways but for it to be truly untraceable purchasing using a bank account linked to your name isn’t a great idea. This is why many people like to use the site localbitcoins to meet up and purchase bitcoin using cash. If you are in dublin there are 2 bitcoin atms in the city centre which are very useful for getting bitcoins. To store your Bitcoins you will need a wallet and this is where you can store your bitcoins you purchased. For simplicity you can set up an online wallet at blockchain but for a more secure wallet you should download one. Its not a necessity but i would recommend Electrum PGP PGP stands for “Pretty Good Privacy,” and it’s most often used for sending encrypted messages between two people. This is a necessity when buying online as you will use it for sending information such as your shipping address. I won’t go into the full details on how to use PGP but there are some great tutorials on PGP on youtube. Buying process Im going to run through the steps of the buying process in order. (1)Make sure you VPN is running, open up tor browser and navigate to your market of preference. You can find a list of markets and their addresses over at /darknetmarkets wiki page. (2)Search for your desired product. When looking for the right product one thing you should keep in mind is Escrow. Escrow is essentially the paypal of the darknet. It is a middle man and holds the bitcoins you sent to the buyer safe until you’ve marked the product as received, they are then released to the seller. This is good as if the seller scams you and you do not receive anything you can open a dispute with the market and get your coins back. Unfortunatley because of all the market exit scams a lot of buyers are asking for full escrow so their money isn’t lost and this is where common sense comes in. If a buyer asks for full escrow and has negative feedback or a bad rep, stay clear. Im gonna recommend sticking with buyers who offer escrow and order from countries within the EU. Ordering from countries outside of the EU would carries the most risk of getting stopped by customs. (3)Once you’ve found the product you want your ready to move onto the next step which is getting bitcoins. Go tolocalbitcoins and buy some bitcoins near you. As I recommended above i would steer towards cash transactions for bitcoins rather than transactions using paypal or your bank account. (4)Once you have your bitcoins its time to purchase the product. Send the bitcoins from your bitcoin wallet to the wallet on the market you are using. You can find your bitcoin wallet address for that market by clicking on your balance. When sending the bitcoins to the market they don’t not show up straight away, it usually takes between 10mins and 1 hour. (5)When they have arrived to your wallet on the market navigate to the product you are buying and purchase. (6)you will be met with the confirmation screen where you will input any comments and shipping details. This is where you will use PGP to encrypt the message, use the PGP tutorial i have linked above. NEVER send personal information(name/address) in plain text, normal chitchat between you and the buyer is fine in plain text though. I recommend using address doctor to see if your address is formatted correctly for international purchases. (7)Now sit back and wait for the product you have purchased to arrive. some recommendations i have for first timers:
Dont tell anyone you are buying online
Make sure your VPN is on
Make sure the seller offers escrow(if unsure ask the seller)
ALWAYS Use pgp for address
Dont panic if bitcoins dont appear in your wallet straight away
DO NOT use a parcel motel
If anyone has any questions feel free to ask I know some of the steps are a bit tricky and i would be happy to help
Hello Everyone! Today, I'm going to teach you how to access the darknet and how you can help keep yourself anonymous and safe. This guide is going to be UK-centric for the parts that are localised - like buying bitcoins. Quick Disclaimer: Everything you do on the Darknet is at your own risk. Do your research where you feel you don't have enough information. Be informed and be educated. Also worth mentioning is specific subreddits, they'll likely have more detailed guides for every step available: /DarkNetMarketsNoobs & /DarkNetMarkets The most important thing to remember is that how anonymous you are on the darknet is up to you. It can take time and effort to do it properly, but ensuring your privacy and safety is important with things like this. Okay, so here we go.
Tails is an operating system that you can install to a memory stick, DVD or SD Card. You restart your computer and choose it as your boot device. Instead of windows, you'll load up on the Tails operating system. It comes with Tor built in and once you shutdown the computer your whole session will be wiped. I personally don't use tails, but it's pretty highly recommended to use it if you can, it provides a whole lot of security. The real benefit of using Tails is that your session is wiped after you've shutdown, so there's no evidence logged onto your computer at all. So keep in mind, if you use tails, do not store a wallet on it. As soon as you shutdown, your bitcoins would be lost forever.
You should now have either have tails installed to a USB stick ready to boot or Tor installed to your computer. So now you'll need access to a market. I personally can recommend Agora, it's one of the longest standing markets and they've survived a lot of attacks and investigations. It can be pretty tempermental though and suffers from downtime occasionally. The other most used market is BlackBank but I don't have any personal experience with this. Agora - http://agorahooawayyfoe.onion/registeEJNZoVsMp6 BlackBank - http://wztyb7vlfcw6l4xd.onion
Now it's time for you to find the product you want. In Agora you'll want to make sure that the vendor has a green thumb near their username. This means that you don't need to finalise early. Once you find the product you want, check the vendors profile. Some vendors will want you to finalise early if you have under a certain amount of orders on your account, so you may need to make small orders initially to build reputation. Ideally you also want a vendor with a high rating who has made lots of deals. Someone who is reliable. So you've found a product you want from a vendor you trust. You now need to place the order. If you've been following along with this guide while you're making your order I want you to read the following four sections before continuing. For Agora, check the postage of the product too by clicking the "Buy..." button.
So you know how many bitcoins you're going to need. I get my bitcoins from Bit Bargain for the uk. Register for an account and follow the steps on the website to get your bitcoins. It has a step-by-step guide to follow and it's very easy to do. It'll involve a bank transfer too, so make sure you're prepared for that. It might be worth noting that transferring coins from your own wallet can cost you bitcoins, usually around 0.0001 BTC, so it can be worth it to get a tiny amount extra than needed. This also helps to account for any variation in the value of bitcoin in the time it takes for you to buy the coins and get them to your Agora wallet. Once you've got your coins transfer them to your own personal wallet. You can transfer them directly to your darknet wallet also. The recommended wallet to use at the moment is Electrum. Make sure you get your bitcoins out otherwise bitbargain will tax you 1% every week.
I don't personally follow this step but I feel it should be in everyone's interest to know about it. Tumbling your coins will also cost you a fee depending on which tumbling service you decide to use. The way this works is that bitcoins use a blockchain so that you can track where it's been throughout its existence. So the idea is that if a vendor has their coins seized they can track the transactions back to you through the blockchain. In practice, the chances of this happening are minimal and tumbling coins is ultimately not necessary. It can't be proved that you sent that money to them for anything illicit anyway. But if you want to practice that extra bit of safety - and I encourage everyone to be as safe as possible - then you can look at something like Helix as a tumbler. You can investigate the darknet subreddits for other recommendations too, as I do not know a lot about tumbling personally.
This is the most important step here. So, you've got bitcoins and transferred them to your chosen market's wallet. Go back to the vendor profile and check for a PGP key. This is their public key and you're going to use this to encrypt your address so only that vendor can read it. This is a great and detailed guide I'd recommend you follow. It covers everything you need to know. So import the vendors key, type out your name and address in full, including country if the source is from abroad. Use your real name and address. It may seem scary, but I assure you that your postman is more likely to be suspicious that you're suddenly receiving a lot of packages for John Smith, who only seems to have recently moved in to your place. Encrypt your address with the vendors key and save it to your clipboard.
Making The Order
Okay, you've got the bitcoins in your wallet and you've encrypted your address with your vendors PGP key. Click "Buy..." then paste your encrypted message into the box and press "Confirm" for your order. You'll need to make sure you've got all the funds in your wallet. This will take you to a finalisation page. DO NOT FINALISE until your product arrives. Don't ever finalise before you receive your product. The finalisation page for each order can be accessed via the "Orders" tab on Agora. This is where the vendor will update the status and send you messages if necessary. The order will auto-finalise after 14 days, releasing the money to the vendor. Make sure that if your product hasn't turned up by then you log in to Agora and send a message to the vendor explaining that it hasn't turned up to extend the auto-finalise time. It could be that you can resolve the problems with the vendor directly. As soon as your product arrives though, log in and finalise your order. Bitcoins are a volatile currency and the vendors should be paid for their service, so release the funds to them when you've got what you ordered.
If your order doesn't turn up - don't panic. In the UK, controlled deliveries seem to be entirely uncommon. In all chances, the order may have just been confiscated or lost in the post. I'd recommend that if an order never turns up though that you not order to that address again. It could be flagged, it could be ignored, but I don't really know and it's your choice. If you do receive a letter from the post office or any other agency, then you should definitely not use that address. On the entirely slim chance you ever do get a visit from the police - you have no knowledge of that package and you should always lawyer up if it ever goes further. Use your Miranda Rights and keep quiet. It's not as prevalent here in the UK I don't think, but you should always protect yourself. To be honest there doesn't seem to be much record in the dark net subreddits about police incidence in the UK though.
Make your Dark Net Identity separate from your other Identities. Don't reuse online personas you use to comment on reddit or any other service. Pick two random words in the dictionary and throw in some random numbers if you want. Your darknet name should be unique and unidentifiable. The only way in which your dark net identity should be linked to you is when you send a vendor your address and name. And even then a vendor should not be storing this information. If you get the sense a vendor is storing your data in any way, then try to avoid that vendor if you can. Don't leave leftover coins in your market wallet. I say this as someone that lost a tiny amount of coins on the Evo exit scam and a slightly larger sum during the Silk Road raid. It's always a good idea to have control over your own coins. I'd probably password protect your wallet too. Domestic orders are always safer. If a delivery doesn't have to come through customs then it's always going to be less likely to be detected. Then again, Canada has some crazy green prices. Personal choice. For Mac users I'd recommend Tails even more highly than before because I really do not have any experience with Mac. If however you don't want to use it, there's a guide on DarkNetMarketsNoobs Always check vendor reviews for mentions of poor stealth. This means that the vendor is not hiding what they're sending you in the post. Obviously this increases your risk of being caught, which is bad. So a vendor who has a reputation for good stealth is recommended. Oh, and don't ever discuss the actual mechanics of the stealthing methods in a public forum. It should remain secret. You can use www.dnstats.net to check the availability of darknet sites. You can use this to find tumblers, markets and whatever else you might want for the darknet. It will also show you the uptimes of the websites so you can work out reliability for yourselves. 20/04/2015 - LSD from the Netherlands I haven't seen anything mentioned super recently, but it seemed like earlier in the month a lot of LSD orders out of the netherlands have been confiscated. I don't know if it's still going on but keeping an eye on the dark net subreddits should keep you informed.
And that's it - you should know everything you need to know to order from the darknet. If you have any questions or comments about the guide, leave a comment or message me and I'll try to update it.
FE - Finalise Early LE - Law Enforcement PGP - Pretty Good Protection, you should use this to send messages to vendors. Bitcoins - A digital currency Darknet - Websites ending with .onion domain name.
Bisher waren die verschiedenen Bitcoin-Wallets starken Schwankungen unterworfen, ... The Hidden Wiki: Ein Wiki über das Darknet; Torch: Eine alternative Suchmaschine; Dadurch, dass die Suchmaschinen nur Schwarzmarktangebote durchsuchen und anzeigen, entsteht bei vielen Besuchern, die diese Suchmaschinen benutzen, der Eindruck, dass das Darknet nur von Kriminellen für verschiedene Verbrechen ... Deep & Dark Web News Portal – Newly Designed Hidden Wiki – Links To the Hottest .Onion Sites & Darknet Markets – Comprehensive Guide To the Deepest Depths Of the Dark Web. Bitcoin; Hidden Wiki URL Links; Security ; Hacking; Buy Bitcoin Anonymously; Top 10 Cryptocurrencies; Tor Email Service List; Dark Web Dictionary; bitcoin wallets . Bitcoin Info . Buy Bitcoins With Paypal! July 25 ... History of Bitcoin cryptocurrency.Bitcoin is a decentralized cryptocurrency created in 2008 by the pseudonymous Satoshi Nakamoto.This account resumes the whole history of Bitcoin since 2008 to 2017 and 2018.. On 18 August 2008, the domain name bitcoin.org was registered.. Later that year on October 31st, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic ... Oft wurden wir gefragt wie man Bitcoin Darknet Anleitung zusammen erklärt. Die Bitcoin Darknet Schritt für Schritt Anleitung Bitcoin irgendwo kaufen – bei Mengen unter 2000€ im Jahr ist es nicht so wichtig. Deinen ersten Bruchteil eines Bitcoin kannst du schnell und sicher mit dieser Anleitung kaufen. Am günstigsten kann man Bitcoin über bitcoin.de kaufen, ... Bitcoin und Darknet, das passt irgendwie. Und so verwundert es nicht, dass es ordentliche Bitcoin-Wallets gibt, beispielsweise das OnionWallet . Die Nutzung ist ziemlich einfach, sofern Ihr wisst, was es mit Blockchain, Wallets und Bitcoins auf sich hat.
How To order off the darknet using bitcoin 💯links provided ...
Today I take a look at Electrum – a fully featured desktop Bitcoin wallet for those that want to get the most flexibility and customization out of their tran... Expand Description for more information! ♦ In today's video I walk through the process of setting up a Bitcoin software wallet using Electrum. Software Wal... in this video i will show you how to purchase bitcoins remember We are Anonymous. We are Legion. We do not Forgive. We do not Forget. EXPECT US! Dark.fail https://www.torproject.org http://bitcoinworldwide.net/ - In this video, Jonathan will discusses about the different types of bitcoin wallets and which one you should choose based on y...