MoneyPak - Bitcoin Wiki

BitPaks.com Bitcoin to MoneyPak exchange needs help testing!

All, I'm currently working on https://www.bitpaks.com and need some help testing. If you'd like to help test please go to https://www.bitpaks.com/test.php and make a purchase. It'd be greatly appreciated!
submitted by BitPaks to Bitcoin [link] [comments]

Add USD to your "moneypak loadable debit card" by spending bitcoins, get 5% more $USD$ over the BTC spent. Yes, if you have a debit card that can receive MP's, it is now a BTC loadable debit card.

Add USD to your submitted by MoneypakTrader to Bitcoin [link] [comments]

Legit places to buy bitcoin with credit card or moneypak(or similar)?

It seems like one by one all the good sites that allow credit card purchases are having issues.
There are a few places I've been unable to determine the legitimacy of like CEO.IX . They have multiple problems on their mining side, but I have seen no complaints about simply buying bitcoin from them with CC.
Can anyone point me in the right direction? I'm fine jumping through some verification hoops like sending videos of myself holding my cards, but I'm tired of doing it for a company that only allows a tiny amount of money to be used.
submitted by Halsfield to BitcoinBeginners [link] [comments]

New Bitcoin to Gift Card/MoneyPak/Western Union service!

New Bitcoin to Gift Card/MoneyPak/Western Union service! submitted by money4btc to Bitcoin [link] [comments]

I have a 35$ moneypak, what is the easiest a d safest way to get bitcoin for it without getting ripped off?

I want it to be instant also if possible. I don't have much money and I'm doing this to test the waters. If anyone wants to send me $30 in bitcoin on faith that I will send the moneypak #'s I will do that, but I doubt anybody will. Also, side note: I know bitbrothers do not accept moneypak yet, but what do you guys think of them?
submitted by bitcoononthemoon to BitcoinBeginners [link] [comments]

Who is a trustworthy vendor on SR to buy a $100 bitcoins with MoneyPak?

I have a $100 moneypak and would like to make a fast purchase of coins but need to know who is trustworthy UPDATE BTC Boss is the man! I paid 100$ for exactly $100 worth of coin absolutely no fees!! Check him out
submitted by Lulzboats to SilkRoad [link] [comments]

Someone contacted me to Buy Bitcoins with MoneyPak. Is this generally a bad idea?

EDIT: Thanks for the feedback, thanks for confirming my fears before I let the lust of greed overtake my common sense END EDIT
I received a message today and talked to this guy on the phone. Everything seemed very familiar to an old email scam:
I'm sitting on hundreds of thousands of dollars in moneypak and I need to buy about $10k of BTC daily. I'm willing to pay a premium. My partners and I just want to buy as many BTC before it hits $1000.
I tell this guy that I only deal in cash because I don't know much about moneypak and I've heard that they can be reversed and I don't want to risk it.
He continues to push, but I told him I needed to research before I agree to anything.
So this is a HUGE risk right? I mean, is there any way to ensure that MoneyPak has no possibility of reversal?
submitted by iammagicmike to Bitcoin [link] [comments]

How safe is using Moneypak to sell bitcoins?

What is the safest way to cash a Moneypak number? Is it possible to load funds into a Moneypak card from a credit card? (if this is possible, a buyer could just issue a chargeback right?).
submitted by RetPallylol to Bitcoin [link] [comments]

Reliable place to buy Bitcoin with either Credit Card or Moneypak/Reloadit/etc ?

It seems like one by one all the good sites that allow credit card purchases are having issues.
There are a few places I've been unable to determine the legitimacy of like CEO.IX . They have multiple problems on their mining side, but I have seen no complaints about simply buying bitcoin from them with CC.
Can anyone point me in the right direction? I'm fine jumping through some verification hoops like sending videos of myself holding my cards, but I'm tired of doing it for a company that only allows a tiny amount of money to be used.
submitted by Halsfield to Bitcoin [link] [comments]

[H] PayPal, Bitcoins, MoneyPak, etc. [W] TI3 Ticket. Last-minute, looking to see if anyone still has a ticket.

I understand that this is highly unlikely, but if anyone still has a TI3 ticket or KNOWS SOMEBODY who has a TI3 ticket I'd like to make a request to purchase it.
Price is of course negotiable.
My schedule has been freed up very recently and I'd like to see if I have a chance at getting a VERY last-minute ticket.
Add me on Steam, comment here, whatever you wish.
submitted by Saimouer to Dota2Trade [link] [comments]

A Fast, Simple Way To Cash Out Bitcoin to Paypal: Exchange Service KoukanExchange.com Enables Anyone To Exchange Bitcoins For MoneyPak Codes Quickly And Securely

A Fast, Simple Way To Cash Out Bitcoin to Paypal: Exchange Service KoukanExchange.com Enables Anyone To Exchange Bitcoins For MoneyPak Codes Quickly And Securely submitted by BitcoinPRBuzzcom to Bitcoin [link] [comments]

MONEYPAK & UKASH TO BITCOIN EXCHANGE

Are you new? looking for an easy way to purchase bitcoins with low rates ? check out our website we havent had much trades as we are only new but hopefully it willl build over time.
mp2btc.co.nr
submitted by MP2BTC to BitcoinBeginners [link] [comments]

CryptoLocker Ransomware: Forcing users to pay random with MoneyPak or Bitcoin.

submitted by bitcomsec to bitcoinsec [link] [comments]

MoneyPak to Bitcoin Exchange--Anyone hear of these guys?

submitted by James3232 to Bitcoin [link] [comments]

How to Buy Bitcoins with MoneyPak

How to Buy Bitcoins with MoneyPak submitted by vlarocca to Bitcoin [link] [comments]

Bitcoin payments for advertisements? My service allows spending bitcoins to receive moneypaks (with 5% bonus), kinda like btcpak except we pay you extra instead of charging a fee. Is reddit going to allow bitcoins to pay for advertising any time soon?

submitted by MoneypakTrader to advertising [link] [comments]

Any advice on a moneypak to Bitcoin exchange?

First, I am willing to pay extra to not use my bank account.
Any advice for a trusted vendor?
Are there standard operating procedures I should follow given that I am new to the Road?
submitted by Karma_hates_me to SilkRoad [link] [comments]

Proper Care & Feeding of your CryptoLocker Infection: A rundown on what we know.

This article is no longer being maintained, please see the new version here. Thanks.
tl;dr: I hope you have backups. It's legit, it really encrypts. It can jump across mapped network drives and encrypt anything with write access, and infection isn't dependent on being a local admin or UAC state. Most antiviruses do not catch it until the damage is done. The timer is real and your opportunity to pay them goes away when it lapses. You can pay them with a GreenDot MoneyPak or 2 Bitcoins, attempt to restore a previous version using ShadowExplorer, go to a backup, or be SOL.
Vectors: In order of likelihood, the vectors of infection have been:
  • Email attachments: A commonly reported subject is Payroll Report. The attachment, most of the time, is a zip with a PDF inside, which is actually an executable.
  • PCs that are unwitting members of the Zeus botnet have had the virus pushed to them directly.
  • There is currently one report of an infection through Java, using the .jnlp file as a dropper to load the executable.
Variants: The current variant demands $300 via GreenDot MoneyPak or 2 BTC. I will not attempt to thoroughly monitor the price of bitcoins for this thread, use Mt. Gox for the current exchange rate. Currently the MoneyPak is the cheaper option, but last week Bitcoins were. Two variants, including a $100 variant and a $300 that did not offer Bitcoin, are defunct.
Payload: The virus stores a public RSA 2048-bit key in the local registry, and goes to a C&C server for a private key which is never stored. The technical nuts and bolts have been covered by Fabian from Emsisoft here. It will use a mix of RSA 2048-bit and AES 256-bit encryption on files matching these masks:
*.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.eps, *.ai, *.indd, *.cdr, ????????.jpg, ????????.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c, *.pdf, *.tif
This list of file masks may be incomplete. Trust this list at your peril. When in doubt, CryptoLocker will show you what files it has encrypted by clicking the relevant link in the virus's message.
It will access mapped network drives that the current user has write access to and encrypt those. It will not attack server shares, only mapped drives. Current reports are unclear as to how much permission is needed for the virus to encrypt a mapped drive, and if you have clarification or can test in a VM please notify me via message.
By the time the notification pops up, it's already encrypted everything. It's silent until the job is done.
Many antiviruses have been reported as not catching the virus until it's too late, including MSE, Trend Micro WFBS, Eset, GFI Vipre, and Kaspersky. They can further complicate matters by reverting registry changes and removing the executables, leaving the files behind without a public or private key. Releasing the files from quarantine does work, as does releasing the registry keys added and downloading another sample of the virus.
Windows XP through 8 have all reported infections.
What's notable about this virus, and this is going to lead to a lot of tough decisions, is that paying them to decrypt the files actually does work, so long as their C&C server is up. They verify the money transfer manually and then push a notification for the infected machine to call home for the private key again, which it uses to decrypt. It takes a long time to decrypt, at the rate of roughly 5GB/hr based on forum reports. The virus uses the registry to maintain a list of files and paths, so not moving the files around is vital to decryption if you are paying them.
Also notable is that the timer it gives you to pay them does appear to be legitimate, as multiple users have reported that once the timer ran out, the program uninstalled itself. Reinfecting the machine does not bring a new timer. I was not able to verify the uninstallation of the program after the timer ran out, it appears to be dependent on internet access.
Due to the nature of the encryption, brute-forcing a decrypt is essentially impossible for now.
Removal: Removing the virus itself is trivial, but no antivirus product (or any product, for that matter), will be able to decrypt the files until the private key is found.
File Recovery: There are only a handful of options for recovering encrypted files, and they all rely on either having System Restore/VSS turned on or having a backup disconnected from the infected machine. Cloud backup solutions without versioning are no good against this as they will commit the encrypted files to the cloud.
I had a Carbonite employee message me regarding my earlier statement that Carbonite is no good against this virus. It turns out that versioning is included in all Carbonite plans and support all agent OSes except Mac OS X which is outside the scope of this thread anyway. They have the ability to do a mass reversion of files, but you must call tech support and upon mentioning CryptoLocker you will be escalated to a tier 3 tech. They do not mention this ability on the site due to the potential for damage a mass reversion could do if done inadvertently. These are my own findings, independent of what the employee told me. Crashplan and other versioning-based backup solutions such as SonicWALL CDP should also work fine provided the backups are running normally.
Using the "Previous Versions" tab of the file properties is a cheap test, and has had mixed results. Using ShadowExplorer on Vista-8 will give you a much easier graphical frontend for restoring large amounts of files at once (though this will not help with mapped drives, you'd need to run it on the server in that case). Undelete software doesn't work as it encrypts the files in place on the hard drive, there is no copying going on. The big takeaway is that cold-storage backups are good, and they will make this whole process laughably easy to resolve.
Prevention: As this post has attracted many home users, I'll put at the top that MalwareBytes Pro, Avast! Free and Avast! Pro (defs 131016-0 16.10.2013 or later) will prevent the virus from running.
For sysadmins in a domain environment, one way to prevent this and many other viruses is to set up software restriction policies (SRPs) to disallow the executing of .exe files from AppData/Roaming. Grinler explains how to set up the policy here.
Visual example. The rule covering %AppData%\*\*.exe is necessary for the current variant. The SRP will apply to domain admins after either the GP timer hits or a reboot, gpupdate /force does not enforce it immediately. There is almost no collateral damage to the SRP. Dropbox and Chrome are not effected. Spotify may be affected, not sure. I don't use it.
Making shares read-only will mitigate the risk of having sensitive data on the server encrypted.
Forecast: The reports of infections have risen from ~1,300 google results for cryptolocker to over 150,000 in a month. This virus is really ugly, really efficient, and really hard to stop until it's too late. It's also very successful in getting people to pay, which funds the creation of a new variant that plugs what few holes have been found. I don't like where this is headed.
Some edits below are now redundant, but many contain useful information.
9/17 EDIT: All 9/17 edits are now covered under Prevention.
10/10 EDIT: Google matches for CryptoLocker are up 40% in the last week, and I'm getting 5-10 new posts a day on this thread, so I thought I'd update it with some interesting finds from fellow Redditors.
  • soulscore reports that setting the BIOS clock back in time added time to his cryptolocker ransom. Confirmed that the timer extends with the machine offline, but that may be cosmetic and I don't like your chances of this actually helping if your timer runs out on the server side.
  • Spinal33 reports that AV companies are catching up with CryptoLocker and are blocking websites that are spawned in the virus's domain generation algorithm. This effectively means that some people are locked out of the ability to even pay the ransom. (Technically they could, but the virus couldn't call home.)
  • Malwarebytes is claiming that MBAM Pro will catch CryptoLocker. If someone wants to test them on it, be my guest. Confirmed
  • CANT_ARGUE_DAT_LOGIC gave some insight on the method the virus uses when choosing what to infect. It simply goes through folders alphabetically and encrypts all files that match the filemasks towards the top of this post. If you are lucky enough to catch it in the act of encrypting and pull the network connection, the CryptoLocker message will pop up immediately and the countdown will begin. Helpful in determining what will need to be taken into account for decryption.
EDIT 2: We had a customer that ignored our warning email get infected so I will have my hands on an infected PC today, hope to have some useful info to bring back.
10/10 MEGA EDIT: I now have an active CryptoLocker specimen on my bench. I want to run down some things I've found:
  • On WinXP at least, the nested SRP rule is necessary to prevent infection. The path rule needs to be %AppData%\*\*.exe
  • An alternate link to the virus sample is http://gktibioivpqbot.net/1002.exe
  • Once the program runs it spawns two more executables with random names in %userprofile%. Adding a SRP to cover %userprofile%\*.exe may be desired, though this will prevent GoToMyPC from running at a bare minimum.
  • This user was a local administrator, and CryptoLocker was able to encrypt files in other user's directories, though it did not spawn the executables anywhere but the user that triggered the infection. When logged in under a different account there is no indication that a timer is running.
  • The environment has server shares but no mapped drives and the shared data was not touched, even though a desktop shortcut would've taken the virus to a share. I suspect that will be covered in the next iteration.
  • The list of masks above does not appear to be totally complete. PDF files were encrypted and were not originally part of the set of file masks. That is the only exception I noticed, everything else follows the list. Conveniently (/s), CryptoLocker has a button you can click that shows the list of files it's encrypted.
  • The current ransom is $300 by MoneyPak or 2BTC, which at the time of writing would be $280 and change.
  • Fabian reported that registry data is stored at HKCU/Software/CryptoLocker. I cannot glean the meaning of the DWORD values on files but I do notice they are unique, likely salts for the individual files. I'm curious what purpose that would serve if the private key was revealed as the salts would be useless.
  • I have confirmed the message soulscore left that setting the BIOS timer back a few hours adds an equal amount of time. No telling whether that will work once it has a network connection and can see the C&C server, though.
  • The virus walked right through an up-to-date version of GFI Vipre. It appears AV companies either consider the risk too low to update definitions or, more likely, they're having trouble creating heuristic patterns that don't cause a lot of collateral damage.
10/11 EDIT: I ran Daphne on the infected PC to get a better idea of what might be going on. lsass.exe is running like crazy. Computer's had it's CPU pegged all day. I noticed the primary executable running from %AppData% has a switch on the end of the run command, which in my case is /w000000EC. No idea what that means.
10/15 EDIT: I just wanted to thank all the redditors that have submitted information on this. I have some interesting new developments that I'll be editing in full tomorrow.
10/18 EDIT: Hello arstechnica! Please read through comments before posting a question as there's a very good chance it's been answered.
New developments since 10/15:
  • We have confirmation that both Malwarebytes Antimalware Pro and Avast Free and Pro will stop CryptoLocker from running. My personal choice of the two is MBAM Pro but research on your own, AV Comparatives is a wonderful resource.
  • We have reports of a new vector of infection, Java. This is hardly surprising as Zeus was already being transmitted in this fashion, but Maybe_Forged reports contracting the virus with a honeypot VM in this manner.
  • zfs_balla made a hell of a first post on reddit, giving us a lot of insight to the behavior of the decryption process, and answered a frequently-asked question. I'm paraphrasing below.
A file encrypted twice and decrypted once is still garbage.
The waiting for payment confirmation screen stayed up for 16 days before a decryption began, so don't lose hope if it's been up a while.
The DWORD values in the registry have no bearing on decryption. Renaming an encrypted file to one on the list in the registry will decrypt it. However, I would presume this would only work for files that the virus encrypted on that machine as the public key is different with every infection.
Adding any new matching files to somewhere the virus has access will cause them to be encrypted, even at the "waiting for payment confirmation" screen. Be careful.
Hitting "Cancel" on a file that can't be found doesn't cancel the entire decryption, just that file.
EDIT 2: I've rewritten the bulk of this post so people don't have to slog through edits for important information.
10/21 EDIT: Two noteworthy edits. One is regarding Carbonite, which is apparently a viable backup option for this, it is covered under File Recovery. The other is regarding a piece of software called CryptoPrevent. I have not tried it, but according to the developer's website it blocks %localappdata%\*.exe and %localappdata%\*\*.exe which is not necessary for the current variant and will inflict quite a bit of collateral damage. I have no reason right now to doubt the legitimacy of the program, but be aware of the tradeoffs going in.
I'm now at the 15000 character limit. Wat do?
submitted by bluesoul to sysadmin [link] [comments]

CryptoLocker Recap: A new guide to the bleepingest virus of 2013.

As the previous post, "Proper Care & Feeding of your CryptoLocker Infection: A rundown on what we know," has hit the 500 comment mark and the 15,000 character limit on self-posts, I'm going to break down the collected information into individual comments so I have a potential 10000 characters for each topic. There is a cleaner FAQ-style article about CryptoLocker on BleepingComputer.
Special thanks to the following users who contributed to this post:
I will be keeping a tl;dr recap of what we know in this post, updating it as new developments arise.
tl;dr: CryptoLocker encrypts a set of file masks on a local PC and any mapped network drives with 2048-bit RSA encryption, which is uncrackable for quite a while yet. WinXP through Win8 are vulnerable, and infection isn't dependent on being a local admin or having UAC on or off. MalwareBytes Pro and Avast stop the virus from running. Sysadmins in a domain should create this Software Restriction Policy which has very little downside (you need both rules). The timer it presents is real and you cannot pay them once it expires. You can pay them with a GreenDot MoneyPak or 2 Bitcoins, attempt to restore a previous version using ShadowExplorer, go to a backup (including versioning-based cloud backups), or be SOL.
EDIT: I will be updating individual comments through the evening to flesh out areas I had to leave bare due to character limitations or lack of info when they were originally written.
EDIT 2: There are reports and screenshots regarding a variant that sits in AppData/Local instead of Roaming. This is a huge development and I would really appreciate a message with a link to a sample of this variant if it does indeed exist. A current link to the known variant that sits in Roaming would also be appreciated.
10/24/13 EDIT: Please upvote How You Can Help for visibility. If you can contribute in any of those fashions it will help all of us a lot.
11/11/13 EDIT: Thanks to everyone that submitted samples. The latest '0388' variant can be found at http://bluesoul.me/files/0388.zip which is password protected, password is "infected". Please see Prevention for updated SRPs.
submitted by bluesoul to sysadmin [link] [comments]

In response to the "I got scammed" thread, IamA /r/dota2trade mod. Ask me anything about trading safely, the item economy, or whatever.

I created /dota2trade last year as a spiritual sister subreddit to /tf2trade, where I am also a moderator. I have been around the block more than a few times, so I am happy to answer any questions about the greater Valve economy and how to navigate it.
Here is the safe trading guide I wrote somewhat recently. It outlines some of the best safe trading practices for Paypal and Moneypak trades. It's not perfect, and it does not address other methods of payment, such as Western Union, Bitcoin, or bank transfers/wires, but the principles are the same.
Also, please welcome fellow moderator, madmatticus71! He is here to help answer questions.
submitted by musical_hog to DotA2 [link] [comments]

/u/nter Rep Profile

rep profile #4
https://www.reddit.com/BitMarket/comments/7hv3nc/wtb_btc_with_paypal/dqu4qa1/
https://www.reddit.com/Cash4Cash/comments/7g180z/h_155_paypall_w_bitcoin_90/dqg3esc/?context=1
https://www.reddit.com/Cash4Cash/comments/7fkduh/h_paypal_w_btc/dqck6na/
https://www.reddit.com/Cash4Cash/comments/7f3jvd/h_70_paypal_w_65_circle_pay_or_65_square_cash/dq9cjlf/
https://www.reddit.com/BitcoinBeginners/comments/78sweh/purchasing_bitcoin_under_18/dq7bnn9/
https://www.reddit.com/BitMarket/comments/7e6kl2/wtb_using_paypal/dq4swe3/
https://www.reddit.com/BitMarket/comments/7ce7cx/wtb_around_100_in_bitcoin/dq0xoey/
https://www.reddit.com/Cash4Cash/comments/7dh63x/h_150_paypal_w_btc/dpxrp1f/
https://www.reddit.com/Cash4Cash/comments/7cufvh357_paypal_balance_verified_account_can_provide/dpx2ams/
https://www.reddit.com/slavelaboucomments/7c41b9/task_need_a_walmart_egiftcard/dpry39t/
https://www.reddit.com/Cash4Cash/comments/7c6jys/h_220_paypal_w_200_btc/dpnnp4l/
https://www.reddit.com/Cash4Cash/comments/7bydk5/h_283_paypal_w_270_squarecash_or_btc/dpm6ng0/
https://www.reddit.com/Cash4Cash/comments/7btoe7/h_20_paypal_w_19_google_wallet/dpkwpt5/
https://www.reddit.com/Cash4Cash/comments/7bfy5d/h_10_paypal_w_9_google_wallet/dphpgsg/
https://www.reddit.com/Cash4Cash/comments/7b49j0/h_paypal_w_90_btc_eth_possibly_other_alt_coin/dpf3lhs/
https://www.reddit.com/Bitcoin/comments/7acdpn/how_can_i_buy_bitcoin_if_i_am_under_18/dpeltmz/
https://www.reddit.com/BitMarket/comments/7b06he/wtb200_bitcoin/dpeffe9/?context=1
https://www.reddit.com/BitMarket/comments/7anzjn/wtb_bitcoin/dpbhmuk/
https://www.reddit.com/BitMarket/comments/78hoj8/wtb_bitcoin_for_cash_app_funds/doy8ng2/
https://www.reddit.com/Bitcoin/comments/78c3xq/how_do_i_purchase_bitcoin_with_paypal/dow609z/
https://www.reddit.com/Cash4Cash/comments/78nkrv/h_50_visa_gift_card_w_btc_preferably_45/dov6j0z/
https://www.reddit.com/BitMarket/comments/77wk56/wts_90_amazon_gift_code_for_0013_btc/dopr6nh/
https://www.reddit.com/Bitcoin/comments/767p1j/any_idea_how_to_buy_bitcoin_in_a_state_that/dopnqud/
https://www.reddit.com/BitMarket/comments/76w40m/wtb_cryptos_with_paypal/doj4ff5/
https://www.reddit.com/BitMarket/comments/76w40m/wtb_cryptos_with_paypal/dohgypc/
https://www.reddit.com/Cash4Cash/comments/7619c5/h_45_paypal_w_btc/doaihr4/
https://www.reddit.com/Cash4Cash/comments/74k98w/h125_paypal_w_110_squarecash/dnyyeks/
https://www.reddit.com/BitMarket/comments/743z0s/wtb_002_75_btc_with_paypal/dnveeat/
https://www.reddit.com/Cash4Cash/comments/70ulg9/h_120_paypal_w_btc_or_ltc_equivalent_interest/dn6el4u/
https://www.reddit.com/Paypaltobitcoin/comments/70m571/quick_transaction_00631_btc_2256/dn48tsd/
https://www.reddit.com/giftcards/comments/6zw782/anyone_selling_amazon_gift_cards/dmzbfv4/
https://www.reddit.com/Bitcoin/comments/6zxeu0/what_is_the_best_way_to_buy_bitcoin_with_a/dmz8kod/
https://www.reddit.com/borrow/comments/6ztvb6/meta_swap_squarecash_for_paypal/dmyg44c/
https://www.reddit.com/BitMarket/comments/6yjr21/wtb_100_usd_for_like_95_usd_worth_of_btc/dmw4e7z/
https://www.reddit.com/Bitcoin/comments/6zfyec/buying_low_quantities_of_bitcoin/dmw043y/
https://www.reddit.com/CryptoTrade/comments/6ynijs/wtb_005_btc_for_250_paypal/dmsje20/
https://www.reddit.com/Bitcoin/comments/6wkrii/buying_bitcoin_with_paypal/dmc1zrh/
https://www.reddit.com/redditbay/comments/6tvna3/trading_300_visa_prepaid_gift_card_for_09_eth_odlo91by/?context=1
https://www.reddit.com/GCtrade/comments/6tn870/w_15_bitcoin_h_20_paypal/dllz1ra/
https://www.reddit.com/Bitcoin/comments/6snz20/purchasing_small_amounts/dleuf5d/
https://www.reddit.com/BitMarket/comments/6smts1/wtb_35usd_in_btc_via_paypal/dldz3ve/
https://www.reddit.com/BitcoinBeginners/comments/6sb8mt/help_me_with_bitcoin_please/dldyw4y/
https://www.reddit.com/giftcardexchange/comments/6pwv8a/h_90_moneypak_w_xbox_gold_movie_credit_amazon_gc/dl4xy4d/
https://www.reddit.com/BitMarket/comments/6qziuu/wtb_75_in_bitcoin_can_pay_instantly_on_venmo/dl1jb1d/
https://www.reddit.com/BitcoinBeginners/comments/6qdl1d/im_a_us_citizen_in_africa_for_a_while_how_to_buy/dkytoc6/
https://www.reddit.com/Bitcoin/comments/6q6vi6/i_need_to_buy_bitcoin_fast_with_paypal/dkv8mv1/
https://www.reddit.com/GCtrade/comments/6pxlvx/h_american_express_gc_250_w_paypal_240/dkt8378/
https://www.reddit.com/slavelaboucomments/6ozbl4/task_ship_me_a_knife_from_elemental_knives/dkm2685/
https://www.reddit.com/BitMarket/comments/6oioz3/wtb_bitcoin/dkhnefc/
https://www.reddit.com/Bitcoin/comments/6nmi5q/where_to_buy_with_paypaldebit_card_and_no/dkgnt40/
https://www.reddit.com/BitMarket/comments/6o5ek4/wtb_bitcoin/dkew60d/
https://www.reddit.com/BitMarket/comments/6njk9x/wtb_50_in_bitcoin_h_60_pp/dk9xsnb/
https://www.reddit.com/BitMarket/comments/6nfhum/wtb_up_to_100_in_bitcoin/dk92zhx/
https://www.reddit.com/Bitcoin/comments/6m7fha/where_to_buy_25_worth_of_btc/dk5ifrg/?context=1
https://www.reddit.com/slavelaboucomments/6mk0d1/task_need_someone_to_purchase_humble_monthly_as_a/dk28l3v/?context=1
https://www.reddit.com/Bitcoin/comments/6d0358/is_there_anywhere_left_where_i_can_still_buy/diu0q4k/
submitted by nter to SLRep [link] [comments]

Cult of Turtle - 38 lessons for safe Bitcoin trading from #bitcoin-otc IRC

intro

#bitcoin-otc is a trading channel on the Freenode IRC server that has existed since 2011 and is still around today. It's been a well known hub among Bitcoin traders, buyers and sellers and the chatroom has helped facilitate tens of thousands of trades across its lifespan.
Across its lengthy existence, many important lessons in safe trading have been learned by its members. One of its members has compiled a great deal of wealth into a document known as "Cult of Turtle", which contains 38 of the most valuable tips you could keep in mind when trading.
The list has been around for years now, and has been proven time and time again to be extremely accurate. (and tounge-in-cheek partly)
I've left all of the tips and original phrasing to preserve the original feeling of the guide - but for Reddit's benefit, I've highlighted the most relevant ones that are also extremely applicable when trading on Reddit or elsewhere. (and omitted several less relevant ones)
Hopefully this wealth of knowledge will help improve your resiliency to scams and scammers. :)

Cult of Turtle - 38 lessons for safe Bitcoin trading from #bitcoin-otc IRC

2. Never trade with someone who doesn’t have a long and good AND RECENT trade history (check ;;gettrust, ;;events).
5. Never lend bitcoins. you will probably never see them again. As Coolio- used to say “Loans are a gift”.
8. Don’t talk about your money, worth, or wealth
9. Don’t leave large sums in shared or online wallets (or other online games or services)
11. If someone is scammer tagged, don’t give them the benefit of the doubt. it might feel weird to consider someone guilty until proven innocent, but it will save your coins.
12. High yield investment programs (HYIP) or loans are pretty much always scams. think about it. if it sounds too good to be true…
13. Never let someone control your computer (teamviewer scams). Don’t install anything suspicious on your computer (trojans, viruses). Ideally have a clean dedicated computer for your transactions. Wipe that computer regularly.
14. There are no tricks to avoid chargebacks on paypal, credit cards, moneypak, dwolla, banks, etc. some services might be harder to chargeback, but nothing is immune.
15. People with good reps can turn bad or get in a bad spot. having a good rep does not mean they will never scam.
16. Break up large transactions into smaller ones, preferably with multiple people
18. Don’t trust someone who can’t speak proper English or your language of choice. this may sound classist, but your money is on the line; trade with professionals or reputable people
22. Don’t trust fast talkers, sweet talkers, smooth talkers. don’t be swayed by emotion or inability to think. a good deal is rarely time sensitive.
23. If someone gets agitated when you ask questions, they were probably trying to scam you
25. Many people offer escrow. use it. BUT ONLY IF YOU TRUST THE PERSON OFFERING ESCROW.
27. Don’t trust gamblers, addicts, or people who are constantly broke
30. Someone buying just to build ratings is suspicious. this goes for the OTC, btcjam, or anywhere else. beware.
31. Don’t use paypal. come on. people tell you this all the time. and for a reason. it’s easy to get scammed by people using paypal. and it’s easy for paypal to freeze your assets and hold your money for 180 days. [same applies for ebay]
32. You will eventually hear someone say “come on, it’s not like I’m going to scam someone for just $___”. yes. someone would scam for that amount. don’t fall for it
34. People with non-random X ending their name are highly likely to be a scammer have you ever noticed that everyone with names ending in a random x is highly likely to be a scammer? freefox <– non-random thetruthx <— random also, framing x’s are not so random xFBASTAGEx <– not so random
35. Unsolicited messages/spam/requests to trade are almost always scams.
36. Trust your gut. if someone gives you a bad vibe, there’s probably a reason. be safe rather than sorry
38. Nobody listens to turtle
You can find the full source on one of the mirrors: http://pi.littlebird-design.com/bitcoin/cult-of-turtle/ (or http://www.cultofturtle.com but seems like that ones hosting expired)
Which tips from this list are your favourite, have helped you prevent scams, or are completely new to you? Comment below and share your insight with others. :)
Cheers!
submitted by homm88 to RedditTradingTalk [link] [comments]

How to Buy Bitcoin with Debit or Credit Card Turn Bitcoins into Pak Rupee, Pakistan's Instant Bitcoins Exchange How to exchange bitcoin to moneypak instant How To Earn Bitcoins In Pakistan Free - Best Method 2018 ... Ukash to Bitcoin, MoneyPak to Perfect Money, Buyemoney.com

Purchase Bitcoin from thousands of trusted vendors who prefer to be paid using your MoneyPak. View available offers & get your BTC in a matter of minutes. MoneyPak is a stored-value card ("cash top-up card") provided by Green Dot Corporation. It's typically purchased with cash at a retailer, then used to fund prepaid debit cards or on-line wallet services like PayPal or Serve.A handful of MoneyPak partners also accept MoneyPak funds as same-day payments for their services; these include credit cards, bank accounts, digital wallets, online ... MoneyPak can be reloaded instantaneously at over a thousand retailers. MoneyPak is also a popular over-the-counter method of payment for buying and selling bitcoin instantly and securely. If you are buying or trading bitcoin in high volumes with MoneyPak our recommendation is to use Paxful for your trading needs. make money from Bitcoin in 2020. Once you’ve downloaded it register on it It’s free of charge once you’ve registered on it. Then You are registered then you’ll see there’s an option that says deposit money Click on that option to deposit the money follow the instructions in it’s very very straightforward. Sell Bitcoin for MoneyPak at Paxful: it’s easy, safe, and available 24/7. Choose the best offer and start trading now!

[index] [18586] [27687] [48826] [36771] [4616] [28370] [17076] [15914] [10561] [9030]

How to Buy Bitcoin with Debit or Credit Card

How To Earn Bitcoins In Pakistan Free - Best Method 2018 Earning BTC how to earn bitcoin free in pakistan earn bitcoin in pakistan how to earn bitcoin in... Buyemoney.com is offering a complete marketplace for users to buy and sell their e-products, exchanging vouchers of Ukash, Paysafecard, iTunes, UGC, The site... Created with Magisto (http://www.magisto.com). Magically turn your everyday videos into beautifully edited movies, perfect for sharing. It's free, quick, and easy as pie! http://bitcoinexchanger.pw/exchange-bitcoin-to-moneypak.php How to exchange bitcoin to moneypak instant exchange bitcoin to moneypak, exchange bitcoin, excha... This video is unavailable. Watch Queue Queue. Watch Queue Queue

#