How to uninstall Bitcoin Virus - virus removal ...

Buy Bitcoin Paypal

Bit coin is a peer to peer transaction system created last year that uses trades to be, conducted by a digital money, the bit coin. Unlike monies given by states, Bit Coin is completely electronic and is separate of any state or market, without ties to some monetary authority, corporation, or business.
[link]

Clinton Foundation Investigation

A subreddit for the ongoing investigation into the Clinton Foundation. Want to help? Follow the sidebar.
[link]

Unidentified (and very nasty) Bitcoin Miner Virus. Malwarebytes doesn't detect it even when the folder is targeted. It also seems to override my Windows security functions. Seems to spread via my Network. Not sure what to do.

I seem to have acquired a rather nasty Bitcoin miner (or I assume that's what it is). It seems to generate a random name and create a folder in Appdata/Low which I cannot access due to an access denied. It asks for administrator rights which when provided it still says access denied (these are my personal machines. I'm the only admin). I tried to take ownership via file security but I always get an access denied error and it says the current owner is unknown. It creates multiple threads using the same name as the folder it created which I cannot affect in any way. I can't kill them or restrict there priority level. I also cannot open the containing folder due to the aforementioned admin issue. It seems to constantly max out either 1 or 2 cores on and off. It drops down to no usage for 30 seconds to 2 minutes on a regular basis. I'm not sure what it's doing as I don't get a spike in network traffic. Based on how the performance hit affects my system I suspect these processes have given themselves above average priority. The virus seems to have spread to my Laptop and HTPC via my network since there isn't any download I've made that the 3 of them have in common. The processes have in common only that they identify themselves as "Windows Process Manager" in the description bar and that whenever the file name of the current process is googled it always seems to be listed on the page of a spam redirect webpage:
I suspect that web portal acts as some sort of homing device since every filename they've taken so far has been on that webpage. The hard part is I can't find out how to remove the virus because I don't know the name or strain of the virus due to it creating randomly named folders. MalwareBytes Anti Malware (which is supposedly the best at detecting Malware) never detects it even when I specifically tell it to scan the aforementioned folders. It doesn't seem to be using my GPU. Only my CPU. So far the process names i've seen are:
It's also always accompanied by a process that describes itself as "Printer Driver Host"
They are always 32-bit processes. Each instance of the main mining process seems to use between 20 and 100MB of RAM depending on the age of the process.
Do any of you recognize this behavior? If I can find out what virus I'm dealing with I can likely find instructions on its removal. I've never seen a virus that takes this degree of control over my systems.
submitted by The_Lone-Wanderer to techsupport [link] [comments]

Unidentified (and very nasty) Bitcoin Miner Virus. Malwarebytes doesn't detect it even when the folder is targeted. It also seems to override my Windows security functions. Seems to spread via my Network. Not sure what to do.

I seem to have acquired a rather nasty Bitcoin miner (or I assume that's what it is). It seems to generate a random name and create a folder in Appdata/Low which I cannot access due to an access denied. It asks for administrator rights which when provided it still says access denied (these are my personal machines. I'm the only admin). I tried to take ownership via file security but I always get an access denied error and it says the current owner is unknown. It creates multiple threads using the same name as the folder it created which I cannot affect in any way. I can't kill them or restrict there priority level. I also cannot open the containing folder due to the aforementioned admin issue. It seems to constantly max out either 1 or 2 cores on and off. It drops down to no usage for 30 seconds to 2 minutes on a regular basis. I'm not sure what it's doing as I don't get a spike in network traffic. Based on how the performance hit affects my system I suspect these processes have given themselves above average priority. The virus seems to have spread to my Laptop and HTPC via my network since there isn't any download I've made that the 3 of them have in common. The processes have in common only that they identify themselves as "Windows Process Manager" in the description bar and that whenever the file name of the current process is googled it always seems to be listed on the page of a spam redirect webpage:
I suspect that web portal acts as some sort of homing device since every filename they've taken so far has been on that webpage. The hard part is I can't find out how to remove the virus because I don't know the name or strain of the virus due to it creating randomly named folders. MalwareBytes Anti Malware (which is supposedly the best at detecting Malware) never detects it even when I specifically tell it to scan the aforementioned folders. It doesn't seem to be using my GPU. Only my CPU. So far the process names i've seen are:
It's also always accompanied by a process that describes itself as "Printer Driver Host"
They are always 32-bit processes. Each instance of the main mining process seems to use between 20 and 100MB of RAM depending on the age of the process.
Do any of you recognize this behavior? If I can find out what virus I'm dealing with I can likely find instructions on its removal. I've never seen a virus that takes this degree of control over my systems.
submitted by The_Lone-Wanderer to antivirus [link] [comments]

"What Is Bitcoin" Debuts On Jeopardy With 25 Million Viewers Each Week, The Virus Is Spreading

submitted by TrueCryptoFan to btc [link] [comments]

"What is Bitcoin?" Debuts On Jeopardy With 25 Million Viewers Each Week, The Virus Is Spreading

submitted by TrueCryptoFan to Bitcoin [link] [comments]

"What is Bitcoin?" Debuts On Jeopardy With 25 Million Viewers Each Week, The Virus Is Spreading

submitted by ABitcoinAllBot to BitcoinAll [link] [comments]

Found virus, "Alticopter", mining bitcoin on port 8000 with its own ip - what is this?

https://i.imgur.com/dksPtqm.png
Edit: it's actually Alticaptor - I misread the ascii art
submitted by xblade724 to BitcoinMining [link] [comments]

Young Retiring Couple Scam Alert!

Throwaway account.
I just wanted to let people know about a scam that we thought was fishy but almost continued with, until we got home and did research. It's a classic MLM.
A lot of you may already know this, but for those who don't it is a young couple in their 20's or 30's who will strike up a conversation with you and be super friendly. One of their first questions - "Have you been affected by the virus?" I realize now it was to see how vulnerable & desperate we were. Look out for buzzwords like mentor, cash flow, income generating assets (bitcoin, gold, silver), rat race, how do you want to live your life. And ESPECIALLY if they mention they or their mentor is retiring young.
This can happen at the dog park, Target, Barnes & Noble, or Whole Foods mostly. They will get your number and text you about meeting up (especially at a coffee shop) with their mentor to see if you have a mindset that will work with their program. Will most likely give you a copy of the book 21st Century Business (so you don't have to go on Amazon and read the reviews saying it's part of a scam). It's the first step to indoctrinating you. Ask what the name of their company is and if they don't tell you the first time you know what's up.
I'm sure a lot of people know, it is something you have to experience to know what to look out for. But just in case it helps even one person, I wanted to post it in our locals subreddit. The whole thing that really bothered me was that they are specifically trying to find vulnerable people during the pandemic that are willing to believe they can make a bunch of quick, easy cash.
submitted by vegdoggo to vegaslocals [link] [comments]

Bitcoin mentioned around Reddit: A virus just turned 99.9999% of humanity into Bitcoin; you are one of the 72,000 that are immune; what is your post-apocalypse strategy, now that bitcoin is worthless? /r/AskReddit

Bitcoin mentioned around Reddit: A virus just turned 99.9999% of humanity into Bitcoin; you are one of the 72,000 that are immune; what is your post-apocalypse strategy, now that bitcoin is worthless? /AskReddit submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Found virus, "Alticopter", mining bitcoin on port 8000 with its own ip - what is this? /r/BitcoinMining

Found virus, submitted by BitcoinAllBot to BitcoinAll [link] [comments]

If you need help or you're New to roms and emulation these are some tips

First thing first You need an Emulator i suggest RetroArch is a Newbie Friendly good all in one emulator this is a video to how to setup and use ReTrOaRcH
OpenEmu FOR MAC USERS THAT WILL NOT USE RETRO ARCH BECAUSE IT'S NOT ENOUGH LOOKING LIKE MAC UI OR THEY HAVE AN OCD OR something like that it's good anyways ( i didn't use it bc i'm not a mac user )
🕿︎♋︎◻︎◻︎●︎♏︎ ◻︎❒︎□︎♎︎◆︎♍︎⧫︎⬧︎ ♋︎❒︎♏︎ □︎❖︎♏︎❒︎◻︎❒︎♓︎♍︎♏︎♎︎✆︎
and a download Manger
Jdownloader ( download the jar version ) A photo to explain what to download (don't download the .exe version it has an adware in it )
or idm u can trial reset with this
a torrent clients (credits to Piracy wiki)
for mobile ( torrent clients ) [credits to Piracy wiki]
stay away from [credits to Piracy wiki]
second you need sources to download roms these are the best sites + some tips
sites :
ziperto
No intro romset ( you can download it directly without a torrent you CAN FROM HERE ) (If you don't want to download the whole romset for the system press view content )
AlvRo's Collection
Vimm's Lair
The Eye
GamesTorrents ( of course if u can torrent )
MEGA-ROM
N(itro)blog
THE MEGATHREAD
RomsUniverse
MOBAsuite
IDK?? A WIKI FOR ROMpacks?????
The Old Megathread idk why u need it
A guy who uploaded some roms but he didn't get attention
ROMstorge ( idk how to use this site )
Roms WIKI
Another ROMs site
Edgeemu
EmulatorGames ( the name is baaaaaaaad )
ROMsDownload
WoW Roms
cdROMance
Startgame ( wtf is this name )
Retrostic
ROMulation
If u Want to Check if the site is safe go to here and comment ur site url
Tips :
Tip #1 : If you're in a country that hate piracy like USA or Germany ( i think Germany have dmca or something ?? idk ) etc. stay away from torrent and stay away from http sites
( download Https Everywhere extension and enable encrypt all sites eligible option by pressing on the icon of https everywhere ) even if your browser included with it . because it will warn you if the site is http...
Tip #2 : FBI will not raid your house ( because fbi will not waste there time on you )
Tip #3 : https is your best friend because it's encrypted that means if you go to a https roms site
your isp will see (random numbers and letters) .com/.net/.org/.to/.site etc.
Tip #4 : install an adblock i suggest Ublock Origin
Tip #5 : install a pop-up blocker if you have a chromium based browser like Brave, Chrome, New Edge etc. i suggest this ( if you know a better one please give me the link ) poperblocker
Tip #6 The MegaThread is your OTHER BEST FRIEND if you want an rom head to the megathread and press ctrl + F and search ;)
Tip #7 DON'T DO NOT OPEN ANY ANY ANY .MSI .EXE/.DMG/.DEB or ANY OTHER FILE THAT you CAN OPEN WITHOUT AN EMULATOR THE FILE IT'S 2000% A VIRUS ( EXCEPT WHEN you DOWNLOAD RETRO ARCH [ or any other emulator OF COURSE ] ) AND DON'T OPEN .BAT FILES IT CAN DELETE SYSTEM32 FILE AND IT'S ONE OF THE MOST IMPORTANT FILES IN WINDOWS
Tip #8 Emulating is Legal but Downloading ROMs is ILEGAL ( OF COURSE IF you're LIVING IN A COUNTRY THAT DMCA IS A HOLY THING ) ;-)
Tip #9 If you're suspicious of a file u can scan it on VirusTotal or Hybird Analysis ( you need to upload the file because it will open it on a vm in there sever ).
Tip #10 I recommend using a controller if you have a xbox controller just connect it to your pc and you're good to go BUT if you have a dualshock controller (ps controller )
use DS4 Windows ( if you have a windows pc ) ( I Know it's the fork bc the og creator stopped working on it in 2016 or somthing like that )
or any other controller .
Tip #11 If you download a rom and it came in .rar .zip .7z .r001( if the rom came with multiple files like .r001 .r002 .r003... you need to extract just a one file) etc. you can use 7-ZIP or Winrar ( don't worry 40 days trial doesn't end ).

Tip #12 if the rom came in this order rom.rar.exe don't think to open it and if you hide the extension file from showing from the file name it will show like rom.rar but it's actually a .exe or .dmg etc.

Tip #13 if you have a linux pc or a mac that doesn't mean you will not get infected even Temple OS have malwares ( if you don't what's a malware is just search )​.
Tip #14 if u tired of link shorters and etc. use universal Bypass
Tip #15 Some good emulators :
Dolphin a wii and gamecube emulator ( check the compatibility list to check if the game work )
Citra 3DS emulator ( check the compatibility list to check if the game work )
BSNES HD beta if u want to play snes games on HD
PCSX2 the best ps2 emulator
EPSXE a little bit old but it's good (ps1)
DON'T use zsnes ( i guy on the comments said that )
RPCS3 PS3 ( check the compatibility list to check if the game work )
Xenia Xbox 360 ( check the compatibility list to check if the game work )
Cemu WiiU Emulator ( check the compatibility list to check if the game work )
a Decryptor for 3ds games if citra won't open the rom HERE
DS DeSmuME (OLD) ( if u have a good ds emulator give me the link pls )
Project64 N64
DOSBox DOS emulator ( check the compatibility list to check if the game work )
IF U HAVE any other emulator pls link it in the comments <3
Tip #16
Romsmania
CoolRoms
etc. are NOT SAFE
if you have any other tips share it =)
submitted by real_nyha454 to Roms [link] [comments]

A virus ate the memories on my USB wallet, what is Bitcoin's customer support number? /r/Bitcoin

A virus ate the memories on my USB wallet, what is Bitcoin's customer support number? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

What is the usual counter-point to the assumption that bitcoin can be "wiped out" with a single virus?

This is a commonly used criticism on bitcoin I hear. That due to its electronic nature it is very susceptible to cyber-attacks and some say someone can just create a virus that spreads to every computer that stores the blockchain.
submitted by ccricers to Bitcoin [link] [comments]

God, Proctortrack is invasive

It's another goddamn level of data collection. I bet they're selling this data.
I did 4 face scans, 4 knuckle scans, and 2 full room scans today.
What the actual fuck. Why do you need to see my whole room? I'm sitting in this tiny ass corner so it doesn't seem like I'm cheating and now they wanna see the whole goddamn room?
The audacity of these a-holes is incredible. It says "show under the desk". Yeah, cuz I got eyes on my feet right?
Isn't my face and hands and constant proctoring and FULL MOTHERFUCKIN DISK ACCESS, and access to control any and all apps on my laptop at any time in any way enough?
This is the exact access a virus needs to use your laptop for bitcoin mining.

Oh, and not to mention they made me download a chrome extension with full access to all data, control over the whole browser, and ability to open and close tabs without my permission

I don't even feel like this is my laptop anymore.

Why can't we use lockdown browser? It's THE SAME SHIT. Just have us join zoom or some shit and lockdown browser.
At this point they might as well make us naked and take a full body scan to make sure we didn't tattoo the fuckin syllabus on us or some shit

Dear Proctortrack, lmk if you need to scan the inside of my eyeballs too, you know, to make sure i have "aCaDeMiC iNtEgRiTy". Who knows? Maybe I tattooed the inside of my goddamn retinas?
submitted by Dave30954 to rutgers [link] [comments]

Anyone come across the mars virus? Cause I don't really know what to do

So I got a virus suddenly. Not really sure how and for sure haven't downloaded anything today but my plex server just stopped working randomly between 2 episodes. I go to my media folder to see whats up and all my video files have been encrypted with MARS alongside a txt telling me to send bitcoins
It's just those files right now. All my programming stuff is fine. Really not sure how this happened, I've just spent today programming. I've shutdown my server until I can get some idea of this.
submitted by GloriousDioxide to linuxquestions [link] [comments]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

The Fed's Losing Battle with Technological Deflation

PART 1/4 - FREE MARKET?
First off, let's set the scene.
The stock market is telling you nothing about the real economy anymore.
Economic fundamentals have never mattered as little for the stock market as has been the case during this 11-year bull market.
The correlation between gross-domestic-product growth and the direction of the S&P 500 Index has only been 7% in this cycle - historically it has been 30% to 70%.
Why?
Well, it is the Central Banks, led by the Fed, who printed their way out of the Recession in '08.
In doing so, they have papered over the cracks, and we have seen the longest economic expansion in US history.
However, this is not a particularly meritocratic process: money creation itself increases inequality via the Cantillon Effect, as money printing leads to asset price inflation, which disproportionately benefits the rich and hurts the poor.
Former Federal Reserve Chairman Paul Volcker told the New York Times in 2018:
“The central issue is we’re developing into a plutocracy. We’ve got an enormous number of enormously rich people that have convinced themselves that they’re rich because they’re smart and constructive."
The reality of course is that this is largely not the case - it is because the game is rigged in their favour.
Now, it is important to emphasise the fact that the path we have taken has resulted in the highest living standards we have seen in human history.
However, the issue, particularly since the US completely abandoned the gold standard in 1971, is that debt has exploded to obscene levels.
We are not operating in a free market if it takes $185 trillion of debt over the last 20 years to create 'growth'.
In fact, the global debt to GDP ratio hit an all-time high of 322% in the third quarter of 2019.
Inflation means that your dollar loses value and thus your purchasing power goes down.
Deflation means that the value of your dollar goes up and your purchasing power goes up.
That's a good thing right? You get more goods and services for less.
Well, no.
If you have deflation, debt explodes in real terms and you can never pay it back.
As the economy is based on debt, if you allow deflation, then you have to reset the debt.
This is why central banks fear deflation so much.
However, the major force driving the human race is technological progress - and this stops for no mortal...
PART 2/4 - TECHNOLOGICAL DEFLATION:
The increased abundance created by technology will result in massive job losses.
Throughout history, doom porn enthusiasts have screamed that the machines are coming for jobs. This is not a new phenomenon.
All technological revolutions are deflationary - since they create "supply side shocks", meaning that they allow for more intensive use of resources and thus higher production. With more goods being produced, all other things being equal, the price of those goods will fall.
In the last 20 years or so, software has disrupted and replaced many established goods and services.
It is in the next 20 years that another disruptive technology is set to take the stage: AI
According to Steve Schwarzman, the co-founder and CEO of The Blackstone Group who has a net worth of $17.6BN:
"This is going to touch everyone's life....you're not going to be able to get away from this technology"
Moreover, this virus will only accelerate this trend towards tech. Zoom is a fantastic example of exactly this.
Old legacy economic systems were not built for this tech deflation, and the thing about exponential growth is that we humans do not intuitively understand it.
As an example, if you folded a piece of paper 51 times, of course you can only fold it seven times, but if you could fold it 51 times, it would reach the Sun!
PART 3/4 - IMPLICATIONS FOR SOCIETY:
The question is: how does this play out?
In the long term, it is the fundamental structure of the economic system that has a significant impact on people's lives, not who is President for 4 to 8 years.
In reality, politicians have limited power and are effectively all puppets. We have seen what happens when a President doesn't stay in their lane...
One could argue that the two main mechanisms of control are:
  1. Divide and Conquer and
  2. Order from Chaos
As we have seen many times in the past, herd psychology is worryingly easy to manipulate...
Speaking of the censorship, in his book Antifragile, Nassim Taleb discusses the anti fragility of information.
Information feeds more on attempts to harm it than it does on efforts to promote it.
A fantastic example of this process is what has happened with London Real: they were banned on LinkedIn and David Icke's interview was censored. Now, regardless of what you think of this particular channel or your thoughts on David Icke and the theories provided, censoring information in this way actually spreads it more virally.
It's fascinating to observe how many views the videos regarding the bans and censorship have relative to the others. And the impact this has had on subscribers.
It is always easier to blame a bigger enemy (or create a new one) rather than to admit it's a structural problem.
Therefore, you avoid short term pain...whatever the cost.
The real question is if and when this situation will lead to social unrest...
PART 4/4 - INTELLECTUAL CAPITALISM:
The depth and width of jobs impacted by AI will continue to increase in the future.
Now this will not necessarily happen straight away.
However, our transition from commodity capitalism to intellectual capitalism is inevitable and the people and nations who fight against this trend will be on the wrong side of history.
From a practical investment perspective, and disclaimer this is not investment advice, network effects are a crucial aspect to consider moving forwards.
Essentially, this means that the value of the network increases with each additional user - all of the tech monopolies have exhibited this property.
An asset which could in time demonstrate very strong network effects is Bitcoin.
Looking at the market cap relative to other asset classes, Bitcoin provides an asymmetric investment opportunity.
Only time will tell...
https://www.youtube.com/watch?v=7nFbKzt-uwE
submitted by financeoptimum to Bitcoin [link] [comments]

Community math time: What if the only way to buy Bitcoin was to buy from the miners because nobody who buys Bitcoin ever sells it for fiat? As we get closer to this, the price of Bitcoin will continue ever upward to new highs. Bitcoin to infinity.

I think it's a matter of time before Bitcoin is worth millions and then billions of dollars per BTC. I'm probably calling it 40-100 years ahead of time.
Weak hands will lose the long game in Bitcoin. Every time a weak seller sells, a deep holder will buy it up. Eventually Bitcoin winds up in the titanium hands of true Bitcoiners who will never sell.
I think this is what Michael Saylor CEO of Microstrategy was thinking. Bitcoin is the perfect system for usurping value from all other forms of money. It's a financial virus in a way.
Bitcoin rewards you based on how soon you figure this out. The sooner you buy the better. And Bitcoin will always be the best long term investment no matter when you buy it. Just be patient and never sell.
Bitcoin is money. Just buy stuff with it when you want to take profit. You never need to sell Bitcoin.
The fewer sellers, the higher the price obviously.
submitted by BlandTomato to Bitcoin [link] [comments]

Everyday info sec, hardcore info sec, and DNMs

Edit: Currently writing a new version of this, dont know when it will be done.
Edit: Since first post I have updated a few sections with additional information.
I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful.
I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips)
Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful.
I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both.
--------
Everyday Simple Info Sec:
-There could be a hidden administrator user on your PC, make sure to change its password
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted)
-Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password)
-use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good.
-Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question)
-------_
High level crimimal information security:
The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked.
Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible.
-Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown)
-Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities)
-rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password)
-Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade)
-Never use accounts that have been exposed to lower security on higher security machines
-your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak)
-Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
-------_
How to use dark net markets (DNMs)
If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential.
Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money.
-A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist)
-Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature)
-Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen)
-now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct.
-wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in
-test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews.
Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask.
No idea how long this will stay up, I might purge it in 7 days, or never.
submitted by seven_N_A7 to u/seven_N_A7 [link] [comments]

Bitcoin Fullnode Install Guide for Dummies ;-)

Bitcoin Fullnode Install Guide for Dummies ;-)
Feel free to stop at Level 0 or Level 1, which is fine. More advanced configs are offered to those with more tech savvy. This guide, obviously assumes a Windows 10 install, but other OSes work fine, just find a different guide. BTW, the "For Dummies" is a callback to a set of "tech" books in the 90's intended to be as easy as possible. It is in jest and not intended to insult the reader. Finally, if you dislike the formatting, a well formatted copy can be found here
There is a fairly small subset of Bitcoin users that run a full node. I think the idea of running a full node has gotten a bad rap over the years since there is so much talk about running on a Raspberry Pi, or getting zippy SSDs. Although all of this can be fun, it is often not really required at all. Here are some ways to run a full node starting with the very simple. I'll get into more complex configs, but these are all optional.

Tech Skill Level: 0 (the basics)

  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
In many cases, thats it. If your running a new machine with a fairly good internet connection, 8 or 9 hours will be enough to complete the "Initial Block Download" (IBD). This may fill up your drive a bit, but again, on most new machines, 300 GB of space isn't that hard to come by.

Tech Skill Level: 1 (encrypted wallet)

One thing we left out in the level-0 exercise is encrypting your wallet. It's easy enough to do well, but a bit more difficult to do right. The main challenge is that humans generate really poor passwords. If you want a good password, the best way is to use something called "diceware". Basically, you just grab 4 or 5 dice and each throw of the dice represents a certain word on a special list. The throw {1,4,5,3,1} for example would be the word camping on the EFF-diceware-wordlist. So you repeat this a few times until you have a list of 8 or so words which becomes the passphrase you use to encrypt your wallet. Write it down, it is always hard to remember at first. So at level-1 your list becomes:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Choose Encrypt Wallet from the Settings menu
  5. Enter your 8 word (or so) passphrase generated using the Diceware method

Wallet Encryption Dialog

Tech Skill Level: 2 (enable pruning if needed)

Though I said "300 GB of space isn't hard to come by", some times it actually is. If space is an issue, a simple way to fix it is to tell bitcoin to simple take less space. This is called "pruning" and can take that number from 300 GB down to below 5 GB. If you can't find 5 GB, then you'll have to read ahead to level-4 to add USB storage. But the good news is, enabling pruning is pretty easy, we just add another step to our working list:
  1. Download Bitcoin Core
  2. Launch the downloaded installer and install the app
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Choose Options from the Settings menu
  6. Choose Prune block storage to: and select the max size for the blocks to use
  7. Exit and restart the bitcoin application for the changes to take effect

Pruning Dialog
Note, even setting this to 1 GB will still leave you with about a 4.5 GB install. The blocks take up a lot of space, but the chainstate and other folders eat up at least 3.5 GB and they can't be pruned. Also, be aware, to disable pruning requires you to perform the entire IBD again. While pruned some other functions my be disabled as well, so just know that pruning does limit some functionality.

Tech Skill Level: 3 (verify the installer)

Although this is arguably something that should be done at level-0, some find the intricacies of comparing hash (thumbprint) values to be tedious and beyond the scope of a beginner. You will find these types of hash compares suggested quite often as a way to prevent running tainted programs. Programs are often tainted by bad disk or network performance, but most often, taint is malicious code inserted by viruses or malware. This is a way to guard yourself against those types of attacks.
What I cover here is a very basic comparison on the certificate, but a more thorough verification advised by mosts uses a program called Gpg4Win, and is beyond the scope of this beginners guide. But regardless, most users should strive to do this minimum level of validation.
  1. Download Bitcoin Core
  2. Launch the downloaded installer
  3. When prompted "Do you want to allow..." click Show more details
  4. In the details section select Show information about the publisher's certificate
  5. In the certificate window select the Details tab
  6. In the Details tab Subject should start with "CN = Bitcoin Core Code Signing Association"
  7. Ensure Thumbprint in Details reads ea27d3cefb3eb715ed214176a5d027e01ba1ee86
  8. If the checks pass, click OK to exit the certificate window and Yes to allow the installer to run.
  9. Launch the installed "Bitcoin Core" app and let it run overnight
  10. Do the wallet encryption steps here if you wish
  11. Do the optional pruning steps here if you wish

Certification Validation Windows
Note: The certificate used to sign the current Bitcoin installer is only valid from March 2020 to March 2021. After that point the thumbprint on the certificate will change. This is by design and intentional. If your reading this post after March 2021, then it is understood that the thumbprint has changed.

Tech Skill Level: 4 (use secondary storage)

We glossed over the "new machine with fairly good internet" part. Truth be known many people do not have fairly new machines, and find the IBD to take longer than the "over night" best wishes. For most people the slowdown is the disk access when calculating what is called chainstate. This requires fast random reads and writes to the disk. If you have an SSD disk, this will be no problem, but if you have a non-SSD "spinning" disk, random writes are always slow. Though an SSD will speed things up, they are pricey, so a nice middle ground may be a simple high-end USB key drive. You can get some with 10 to 15 MB/s random writes for $20 on Amazon. This is usually a order of magnitude faster than a "spinning" disk. And with pruning (see level-2), a small USB drive should be fine.
Once you decide on a drive, the tricky part will be to enable external storage. It requires editing a configuration file and adding a line. First, we want to create a directory on the key drive. You will need to determine the drive letter of your USB key drive. For the sake of this example, we will assume it is D:, but you must determine this yourself and correct the example. Once you know the drive letter, create a blank folder on the drive called Bitcoin. So for this example, creating Bitcoin on drive D: will create the path D:\Bitcoin. Once done, assuming that D: is your drive, here are the new steps including the edit of the configuration file:
  1. Download Bitcoin Core
  2. Launch the installer, verify it, then run it
  3. Launch the installed "Bitcoin Core" app and let it run overnight
  4. Do the wallet encryption steps here if you wish
  5. Do the optional pruning steps here if you wish
  6. Launch "Notepad" by typing "Notepad.exe" in the windows search bar then click Open
  7. Type the line datadir=D:\Bitcoin (depending on your drive letter) in the blank file
  8. Choose Save from the File menu in notepad
  9. Type %APPDATA%\Bitcoin\bitcoin.conf (note the percent signs) in the File name box
  10. Select All Files from the Save as type dropdown
  11. Click the Save button and overwrite the file if prompted
  12. Exit and restart the bitcoin application for the changes to take effect

Save As Dialog
Now that you've reached this level of technical expertise, there are many new configuration options that you can begin to modify if you wish. Most configuration data is contained in the bitcoin.conf file and learning how to maintain it is a key step for a node operator.

Tech Skill Level: 5 (all other customizations)

Here's a short list of various things you can ADD to your bitcoin.conf file. You generally just add a new line for each configuration settings.
  • addresstype=bech32
  • changetype=bech32
The addresstype / changetype allows your wallet to use the native-segwit (bech32) format. This is the most efficient and inexpensive way to spend bitcoin, and is a recommended configuration. The default uses something called p2sh-segwit which is more compatible with older wallets, but more expensive to spend.
  • minrelaytxfee=0.00000011
Changing the minrelaytxfee setting allows you to help propagate lower fee transactions. It will require more memory but TXN memory is capped at 300 MB by default anyways, so if you have enough memory, it is a good setting to choose.
  • dbcache=2048
The dbcache setting controls how many MB of memory the program will use for the chainstate database. Since this is a key bottleneck in the IBD, setting this value high (2048 MB) will greatly speed up the IBD, assuming you have the memory to spare
  • blocksdir=C:\Bitcoin
  • datadir=D:\Bitcoin
In level-4 we discussed moving the datadir to a fast external storage, but the majority of the space used for bitcoin is the blocks directory (blocksdir). Although you should always use for fastest storage for datadir, you are free to use slow storage for blocksdir. So if you only want to consume a small amount of your SSD (assumed D:) then you can keep your blocks on your slow "spinning" drive.
  • upnp=1
One of the harder challenges you may face running a node, is to get incoming connections. If you are lucky, you may find that your firewall and network HW support the uPnP protocol. If they do, this setting will allow bitcoin to configure uPnP to allow incoming connections to your node. Other methods exist to make your node reachable, but they are well beyond the scope of this guide.
submitted by brianddk to Bitcoin [link] [comments]

Benefits of air-gapping?

So I keep seeing this term come up when talking about cold storage and hardware wallets. What I'm confused about is what exactly the benefits are to air-gapping.
For example, a Trezor wallet that you connect to your computer isn't air-gapped, however a coldcard using PSBT (Partially Signed Bitcoin Transactions) never connects to a computer and is therefore air-gapped.
What I don't understand is how exactly this benefits you. Isn't the whole point of a Trezor wallet that it is a completely separate computer that works independently of the computer that it's plugged into? The private keys never actually touch the computer that it is attached to. I have heard that you could plug in your Trezor to a computer filled with viruses and your private keys would still be safe (so long as you didn't type them into that computer and just did all transaction steps on the Trezor).
So I'm trying to figure out what the practical benefits are to using an air-gapped device. The usual response is something like: "Well it's never plugged into a computer so it's safer." But like I said I thought the whole point of a Trezor was that it is safe despite being plugged into a computer... Can anyone explain how a hacker would be able to steal your bitcoin on a Trezor and not be able to on a Coldcard?
submitted by Xanaxtastrophy to BitcoinBeginners [link] [comments]

ILPT: Hack into a CEO’s twitter account and tweet something that will manipulate the stock price

Recently someone hacked into Elon Musk’s twitter. Unfortunately, they just asked for bitcoin or some crap.
The real money would be using the twitter account to manipulate the stock price of TSLA. If you tweeted something about Tesla using Elon’s account, depending on what you say, you could manipulate the stock price.
For an example, Open up a short position (betting the stock will go down) on TLSA stock. Make sure to go all in! Then tweet “All Tesla factories will be shutting down for the next year due to virus concerns. We care more about our employees safety than profits. We are open to filling for bankruptcy if need be.”
The stock price will tank and you will make thousands, possibly millions depending on how much you put in. This could work with any company that is publicly traded.
Do not short shares if you do this. Open a short position with stock options and put everything in puts! Puts yield a far higher reward if you buy the right strike price.
submitted by Jshbone12 to IllegalLifeProTips [link] [comments]

The Fed's Losing Battle with Technological Deflation

PART 1/4 - FREE MARKET?
First off, let's set the scene.
The stock market is telling you nothing about the real economy anymore.
Economic fundamentals have never mattered as little for the stock market as has been the case during this 11-year bull market.
The correlation between gross-domestic-product growth and the direction of the S&P 500 Index has only been 7% in this cycle - historically it has been 30% to 70%.
Why?
Well, it is the Central Banks, led by the Fed, who printed their way out of the Recession in '08.
In doing so, they have papered over the cracks, and we have seen the longest economic expansion in US history.
However, this is not a particularly meritocratic process: money creation itself increases inequality via the Cantillon Effect, as money printing leads to asset price inflation, which disproportionately benefits the rich and hurts the poor.
Former Federal Reserve Chairman Paul Volcker told the New York Times in 2018:
“The central issue is we’re developing into a plutocracy. We’ve got an enormous number of enormously rich people that have convinced themselves that they’re rich because they’re smart and constructive."
The reality of course is that this is largely not the case - it is because the game is rigged in their favour.
Now, it is important to emphasise the fact that the path we have taken has resulted in the highest living standards we have seen in human history.
However, the issue, particularly since the US completely abandoned the gold standard in 1971, is that debt has exploded to obscene levels.
We are not operating in a free market if it takes $185 trillion of debt over the last 20 years to create 'growth'.
In fact, the global debt to GDP ratio hit an all-time high of 322% in the third quarter of 2019.
Inflation means that your dollar loses value and thus your purchasing power goes down.
Deflation means that the value of your dollar goes up and your purchasing power goes up.
That's a good thing right? You get more goods and services for less.
Well, no.
If you have deflation, debt explodes in real terms and you can never pay it back.
As the economy is based on debt, if you allow deflation, then you have to reset the debt.
This is why central banks fear deflation so much.
However, the major force driving the human race is technological progress - and this stops for no mortal...
PART 2/4 - TECHNOLOGICAL DEFLATION:
The increased abundance created by technology will result in massive job losses.
Throughout history, doom porn enthusiasts have screamed that the machines are coming for jobs. This is not a new phenomenon.
All technological revolutions are deflationary - since they create "supply side shocks", meaning that they allow for more intensive use of resources and thus higher production. With more goods being produced, all other things being equal, the price of those goods will fall.
In the last 20 years or so, software has disrupted and replaced many established goods and services.
It is in the next 20 years that another disruptive technology is set to take the stage: AI
According to Steve Schwarzman, the co-founder and CEO of The Blackstone Group who has a net worth of $17.6BN:
"This is going to touch everyone's life....you're not going to be able to get away from this technology"
Moreover, this virus will only accelerate this trend towards tech. Zoom is a fantastic example of exactly this.
Old legacy economic systems were not built for this tech deflation, and the thing about exponential growth is that we humans do not intuitively understand it.
As an example, if you folded a piece of paper 51 times, of course you can only fold it seven times, but if you could fold it 51 times, it would reach the Sun!
PART 3/4 - IMPLICATIONS FOR SOCIETY:
The question is: how does this play out?
In the long term, it is the fundamental structure of the economic system that has a significant impact on people's lives, not who is President for 4 to 8 years.
In reality, politicians have limited power and are effectively all puppets. We have seen what happens when a President doesn't stay in their lane...
One could argue that the two main mechanisms of control are:
  1. Divide and Conquer and
  2. Order from Chaos
As we have seen many times in the past, herd psychology is worryingly easy to manipulate...
Speaking of the censorship, in his book Antifragile, Nassim Taleb discusses the anti fragility of information.
Information feeds more on attempts to harm it than it does on efforts to promote it.
A fantastic example of this process is what has happened with London Real: they were banned on LinkedIn and David Icke's interview was censored. Now, regardless of what you think of this particular channel or your thoughts on David Icke and the theories provided, censoring information in this way actually spreads it more virally.
It's fascinating to observe how many views the videos regarding the bans and censorship have relative to the others. And the impact this has had on subscribers.
It is always easier to blame a bigger enemy (or create a new one) rather than to admit it's a structural problem.
Therefore, you avoid short term pain...whatever the cost.
The real question is if and when this situation will lead to social unrest...
PART 4/4 - INTELLECTUAL CAPITALISM:
The depth and width of jobs impacted by AI will continue to increase in the future.
Now this will not necessarily happen straight away.
However, our transition from commodity capitalism to intellectual capitalism is inevitable and the people and nations who fight against this trend will be on the wrong side of history.
From a practical investment perspective, and disclaimer this is not investment advice, network effects are a crucial aspect to consider moving forwards.
Essentially, this means that the value of the network increases with each additional user - all of the tech monopolies have exhibited this property.
An asset which could in time demonstrate very strong network effects is Bitcoin.
Looking at the market cap relative to other asset classes, Bitcoin provides an asymmetric investment opportunity.
Only time will tell...
https://www.youtube.com/watch?v=7nFbKzt-uwE
submitted by financeoptimum to CryptoCurrency [link] [comments]

Unedited: BitCoin mining Virus/Malware found, explained. BEWARE THE BITCOIN VIRUS! (Bitcoin Trojan Provention) Bitcoin (BTC) Virus / Malware BE VIGILANT! - YouTube HORRIBLE BITCOIN MINING VIRUS SPREADING - 30% INFECTED TALK ABOUT BITCOIN AND THE VIRUS

Spieleanbieter muss Strafe wegen Bitcoin-Mining-Virus zahlen Nachrichten - 20.11.2013 (0) Bitcoin: Diebstahl bei Bitcoin-Central und Ozcoin Nachrichten - 25.04.2013 (0) GVU Virus/Trojaner eingefangen: 48h per Paysafecard bezahlen Plagegeister aller Art und deren Bekämpfung - 21.12.2012 (5) Virus: Deutschlandflagge, 100€ bezahlen, PC gesperrt ... Der BitCoin Miner-Virus oder der BitCoin Mining-Virus ist eine gefährliche Malware, die möglicherweise Ihre CPU und / oder GPU verwendet, um die BitCoin-Kryptowährung durch illegales Mining abzurufen. Cryptocurrency Miner greifen immer wieder auf Computer zu und versuchen, mit ihren Ressourcen Einnahmen für ihre Entwickler zu generieren. Obwohl diese Art der Infektion BitCoinMiner heißt ... Such a tool will immediately detect and remove the Bitcoin virus. Also, specialists recommend using the solutions from Dr. Web, CureIT, and Malwarebytes Anti-Malware. Be sure to check the system immediately, notice changes in the speed of your computer, because this is the only way to get rid of this threat without additional problems. If you have a Bitcoin virus on your computer, you can ... Der CoinMiner-Virus missbraucht die Rechenleistung Ihres Computers, damit der Inhaber des Virus Geld mit aufwendigen Berechnungen verdient. Wie das Prinzip des BitCoin Mining genau funktioniert, erfahren Sie in diesem Praxistipp. Bitcoin virus is a type of malicious program that seeks to mine Bitcoin cryptocurrency illegally while using victims' CPU power. In some cases, graphics processing unit (GPU) can be utilized as well. The virus typically enters machines via a trojan horse – a backdoor virus that clears the path for coin-mining malware. The extensive usage of computer hardware diminishes overall performance of ...

[index] [22574] [40934] [29246] [24850] [40017] [16388] [10257] [35049] [26524] [4716]

Unedited: BitCoin mining Virus/Malware found, explained.

Tiny copy/paste virus on my PC that stealing my cryptocurrency. Remember, bitcoins cannot be returned, also you can not punish the recipient of your cryptocurrency! Learn more: https://en.bitcoin.it/wiki/FAQ Learn about the virus and what it's doing to the Bitcoin economy: http://blogs.marketwatch.com/thetell/2013/04/08/... This video is simply some unedited footage that I was preparing to show how malware that masquerades as a Realtek Audio Driver sits and uses system resources to mine Bitcoin for the malware author ... virus copy and paste be aware of this virus virus change when you paste a btc address i lost some money hope nobody else will lose 👇Business Inquiries [email protected] 👉While Bitcoin (BTC) has never been hacked. Bitcoin (BTC) Addresses however, get stolen all the time. A BTC...

#