Best Anonymous Bitcoin Wallets [2020 Edition]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 2/2)

Source | Guestbook
Previous thread
Questions Answers
Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum? No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.
the below is a reply to the above
That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims? That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft? Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc
the below is a reply to the above
Given your insight into how predators operate, do you have any advice for parents on protecting their kids? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up. Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings
Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness? Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.
Pedophiles who do not act on their urges should be given as much help as humanly possible.
Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird? there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to
How much these bad people really exist out there? Hundreds? Thousands? More? It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.
Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated
Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art
How accurate are the legends? Any legends in particular? For a lowdown copied from a post I made in another forum:
1Red Rooms  The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.
People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.
2.Hitman sites
I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.
3.Exotic animals  People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.
SO WHAT DOES HAPPEN ON THE DARK WEB?
1.People buy and sell drugs.
The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.
The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.
2.People buy and sell other illegal things
Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.
3.People access and create childporn  Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.
4.People talk about stuff
There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.
5.People anonymously release information
Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.
6.People surf the web anonymously
The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.
I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think? Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".
So yeah, rare, but it does happen. You might be the unlucky one
How do you find things on the dark web without search engines? There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.
I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses
Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods. If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.
Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.
How did you move from being a corporate lawyer to researching and writing about dark web? I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web? A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)
There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.
It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed
Is there anything good about the dark web? It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.
News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.
It bypasses firewalls and allows for secure communications under hostile regimes
the below is a reply to the above
How does this make you feel about the idea of the decriminalization of drugs? I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.
I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success
the below is a reply to the above
Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks! I've been writing it for about 14 hours. Going a bit loopy
How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them.... I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...
As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever
the below is a reply to the above
Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in? Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.
Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones
Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat? OOOOH, I know that name! Love & Light to you!
I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.
As long as I'm getting paid, I'm pretty happy!
the below is a reply to the question
I too remember your name Pluto! Such a decent human ❤ he is!! True OG right there <3
Is the dark web subject to more racism than its counterpart, the world wide web? There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter
Have you seen any consequential political or social organizing being carried out on the dark web? Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.
What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive? I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.
LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use
the below has been split into separate questions
1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety? I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.
2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret? We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.
3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work. Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though
these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help? Yeah both things have been answered in this thread, so I'll cut'n'paste
The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.
It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.
The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.
The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.
It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.
It was frightening because he was living proof that monsters walk among us and we never know.
[deleted] It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things
I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help? I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog
the below is a reply to the question
Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome. I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there
the below is another reply to the answer
Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line. Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly
Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash? I like the psychonaut communities. They just want peace, love and mungbeans for everybody
Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all. Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?
Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare? No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.
Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies? I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation
I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it. Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.
They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc
the below is a reply to the above
So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account. No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children
I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series Whenever you download anything from a pirate site you run the risk of infection
What do you think of QAnon? Wackjob conspiracy
the below is a reply to the above
Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia? The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)
So, those people
the below is another reply to the answer
Also how to we get people to stop believing in QAnon? Outside my area of expertise, sorry
do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk) No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument
So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable
I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!
There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.
What’s the one lingering unanswered question you have about SR? I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.
There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them
the below is a reply to the above
Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply! Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.
I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account
the below is a reply to the above
I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke? I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes
Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped? The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education
What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts! Casefile – the murder of Amy Allwine
Casefile – Blue Skies, Black Death
Casefile – Ella Tundra
Casefile – Dnepropetrovsk Maniacs
Casefile – Motown Murders
Casefile – Rebecca Schaeffer
Casefile – Sian Kingi
Casefile – John & Mark
Casefile – Shauna Howe
Casefile – Chloe Ayling
Casefile – Johnny Altinger
Casefile – Killer Petey
Casefile – The Santa Claus Bank Robbery
Casefile – Martha Puebla
Casefile – Leigh Leigh
Is there any way parents can keep their kids safe from this without being helicopter parents? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What does it take in terms of degrees and experience to get into this business? Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write
If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is? Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.
One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.
Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions
the below is a reply to the above
Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible? It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders
the below is another reply to the original answer
Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it?? Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money
On the subject of abused kids... did you ever help the kids in any way? I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.
Daisy has been taken into care and her identity changed. I hope she is doing okay
What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code. It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.
e.g. http://thehub5himseelprs44xzgfrb4obgujkqwy5tzbsh5yttebqhaau23yd.onion/index.php is the URL of a dark web forum. If you plug it into your normal browser you will get an error. If you plug it into the Tor browser you will get the registration page for The Hub
How do you keep yourself from hating all humanity? I am happy to report that, even on the dark web, the good people outnumber the bad
Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature? Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb
submitted by 500scnds to tabled [link] [comments]

Bob The Magic Custodian



Summary: Everyone knows that when you give your assets to someone else, they always keep them safe. If this is true for individuals, it is certainly true for businesses.
Custodians always tell the truth and manage funds properly. They won't have any interest in taking the assets as an exchange operator would. Auditors tell the truth and can't be misled. That's because organizations that are regulated are incapable of lying and don't make mistakes.

First, some background. Here is a summary of how custodians make us more secure:

Previously, we might give Alice our crypto assets to hold. There were risks:

But "no worries", Alice has a custodian named Bob. Bob is dressed in a nice suit. He knows some politicians. And he drives a Porsche. "So you have nothing to worry about!". And look at all the benefits we get:
See - all problems are solved! All we have to worry about now is:
It's pretty simple. Before we had to trust Alice. Now we only have to trust Alice, Bob, and all the ways in which they communicate. Just think of how much more secure we are!

"On top of that", Bob assures us, "we're using a special wallet structure". Bob shows Alice a diagram. "We've broken the balance up and store it in lots of smaller wallets. That way", he assures her, "a thief can't take it all at once". And he points to a historic case where a large sum was taken "because it was stored in a single wallet... how stupid".
"Very early on, we used to have all the crypto in one wallet", he said, "and then one Christmas a hacker came and took it all. We call him the Grinch. Now we individually wrap each crypto and stick it under a binary search tree. The Grinch has never been back since."

"As well", Bob continues, "even if someone were to get in, we've got insurance. It covers all thefts and even coercion, collusion, and misplaced keys - only subject to the policy terms and conditions." And with that, he pulls out a phone-book sized contract and slams it on the desk with a thud. "Yep", he continues, "we're paying top dollar for one of the best policies in the country!"
"Can I read it?' Alice asks. "Sure," Bob says, "just as soon as our legal team is done with it. They're almost through the first chapter." He pauses, then continues. "And can you believe that sales guy Mike? He has the same year Porsche as me. I mean, what are the odds?"

"Do you use multi-sig?", Alice asks. "Absolutely!" Bob replies. "All our engineers are fully trained in multi-sig. Whenever we want to set up a new wallet, we generate 2 separate keys in an air-gapped process and store them in this proprietary system here. Look, it even requires the biometric signature from one of our team members to initiate any withdrawal." He demonstrates by pressing his thumb into the display. "We use a third-party cloud validation API to match the thumbprint and authorize each withdrawal. The keys are also backed up daily to an off-site third-party."
"Wow that's really impressive," Alice says, "but what if we need access for a withdrawal outside of office hours?" "Well that's no issue", Bob says, "just send us an email, call, or text message and we always have someone on staff to help out. Just another part of our strong commitment to all our customers!"

"What about Proof of Reserve?", Alice asks. "Of course", Bob replies, "though rather than publish any blockchain addresses or signed transaction, for privacy we just do a SHA256 refactoring of the inverse hash modulus for each UTXO nonce and combine the smart contract coefficient consensus in our hyperledger lightning node. But it's really simple to use." He pushes a button and a large green checkmark appears on a screen. "See - the algorithm ran through and reserves are proven."
"Wow", Alice says, "you really know your stuff! And that is easy to use! What about fiat balances?" "Yeah, we have an auditor too", Bob replies, "Been using him for a long time so we have quite a strong relationship going! We have special books we give him every year and he's very efficient! Checks the fiat, crypto, and everything all at once!"

"We used to have a nice offline multi-sig setup we've been using without issue for the past 5 years, but I think we'll move all our funds over to your facility," Alice says. "Awesome", Bob replies, "Thanks so much! This is perfect timing too - my Porsche got a dent on it this morning. We have the paperwork right over here." "Great!", Alice replies.
And with that, Alice gets out her pen and Bob gets the contract. "Don't worry", he says, "you can take your crypto-assets back anytime you like - just subject to our cancellation policy. Our annual management fees are also super low and we don't adjust them often".

How many holes have to exist for your funds to get stolen?
Just one.

Why are we taking a powerful offline multi-sig setup, widely used globally in hundreds of different/lacking regulatory environments with 0 breaches to date, and circumventing it by a demonstrably weak third party layer? And paying a great expense to do so?
If you go through the list of breaches in the past 2 years to highly credible organizations, you go through the list of major corporate frauds (only the ones we know about), you go through the list of all the times platforms have lost funds, you go through the list of times and ways that people have lost their crypto from identity theft, hot wallet exploits, extortion, etc... and then you go through this custodian with a fine-tooth comb and truly believe they have value to add far beyond what you could, sticking your funds in a wallet (or set of wallets) they control exclusively is the absolute worst possible way to take advantage of that security.

The best way to add security for crypto-assets is to make a stronger multi-sig. With one custodian, what you are doing is giving them your cryptocurrency and hoping they're honest, competent, and flawlessly secure. It's no different than storing it on a really secure exchange. Maybe the insurance will cover you. Didn't work for Bitpay in 2015. Didn't work for Yapizon in 2017. Insurance has never paid a claim in the entire history of cryptocurrency. But maybe you'll get lucky. Maybe your exact scenario will buck the trend and be what they're willing to cover. After the large deductible and hopefully without a long and expensive court battle.

And you want to advertise this increase in risk, the lapse of judgement, an accident waiting to happen, as though it's some kind of benefit to customers ("Free institutional-grade storage for your digital assets.")? And then some people are writing to the OSC that custodians should be mandatory for all funds on every exchange platform? That this somehow will make Canadians as a whole more secure or better protected compared with standard air-gapped multi-sig? On what planet?

Most of the problems in Canada stemmed from one thing - a lack of transparency. If Canadians had known what a joke Quadriga was - it wouldn't have grown to lose $400m from hard-working Canadians from coast to coast to coast. And Gerald Cotten would be in jail, not wherever he is now (at best, rotting peacefully). EZ-BTC and mister Dave Smilie would have been a tiny little scam to his friends, not a multi-million dollar fraud. Einstein would have got their act together or been shut down BEFORE losing millions and millions more in people's funds generously donated to criminals. MapleChange wouldn't have even been a thing. And maybe we'd know a little more about CoinTradeNewNote - like how much was lost in there. Almost all of the major losses with cryptocurrency exchanges involve deception with unbacked funds.
So it's great to see transparency reports from BitBuy and ShakePay where someone independently verified the backing. The only thing we don't have is:
It's not complicated to validate cryptocurrency assets. They need to exist, they need to be spendable, and they need to cover the total balances. There are plenty of credible people and firms across the country that have the capacity to reasonably perform this validation. Having more frequent checks by different, independent, parties who publish transparent reports is far more valuable than an annual check by a single "more credible/official" party who does the exact same basic checks and may or may not publish anything. Here's an example set of requirements that could be mandated:
There are ways to structure audits such that neither crypto assets nor customer information are ever put at risk, and both can still be properly validated and publicly verifiable. There are also ways to structure audits such that they are completely reasonable for small platforms and don't inhibit innovation in any way. By making the process as reasonable as possible, we can completely eliminate any reason/excuse that an honest platform would have for not being audited. That is arguable far more important than any incremental improvement we might get from mandating "the best of the best" accountants. Right now we have nothing mandated and tons of Canadians using offshore exchanges with no oversight whatsoever.

Transparency does not prove crypto assets are safe. CoinTradeNewNote, Flexcoin ($600k), and Canadian Bitcoins ($100k) are examples where crypto-assets were breached from platforms in Canada. All of them were online wallets and used no multi-sig as far as any records show. This is consistent with what we see globally - air-gapped multi-sig wallets have an impeccable record, while other schemes tend to suffer breach after breach. We don't actually know how much CoinTrader lost because there was no visibility. Rather than publishing details of what happened, the co-founder of CoinTrader silently moved on to found another platform - the "most trusted way to buy and sell crypto" - a site that has no information whatsoever (that I could find) on the storage practices and a FAQ advising that “[t]rading cryptocurrency is completely safe” and that having your own wallet is “entirely up to you! You can certainly keep cryptocurrency, or fiat, or both, on the app.” Doesn't sound like much was learned here, which is really sad to see.
It's not that complicated or unreasonable to set up a proper hardware wallet. Multi-sig can be learned in a single course. Something the equivalent complexity of a driver's license test could prevent all the cold storage exploits we've seen to date - even globally. Platform operators have a key advantage in detecting and preventing fraud - they know their customers far better than any custodian ever would. The best job that custodians can do is to find high integrity individuals and train them to form even better wallet signatories. Rather than mandating that all platforms expose themselves to arbitrary third party risks, regulations should center around ensuring that all signatories are background-checked, properly trained, and using proper procedures. We also need to make sure that signatories are empowered with rights and responsibilities to reject and report fraud. They need to know that they can safely challenge and delay a transaction - even if it turns out they made a mistake. We need to have an environment where mistakes are brought to the surface and dealt with. Not one where firms and people feel the need to hide what happened. In addition to a knowledge-based test, an auditor can privately interview each signatory to make sure they're not in coercive situations, and we should make sure they can freely and anonymously report any issues without threat of retaliation.
A proper multi-sig has each signature held by a separate person and is governed by policies and mutual decisions instead of a hierarchy. It includes at least one redundant signature. For best results, 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.

History has demonstrated over and over again the risk of hot wallets even to highly credible organizations. Nonetheless, many platforms have hot wallets for convenience. While such losses are generally compensated by platforms without issue (for example Poloniex, Bitstamp, Bitfinex, Gatecoin, Coincheck, Bithumb, Zaif, CoinBene, Binance, Bitrue, Bitpoint, Upbit, VinDAX, and now KuCoin), the public tends to focus more on cases that didn't end well. Regardless of what systems are employed, there is always some level of risk. For that reason, most members of the public would prefer to see third party insurance.
Rather than trying to convince third party profit-seekers to provide comprehensive insurance and then relying on an expensive and slow legal system to enforce against whatever legal loopholes they manage to find each and every time something goes wrong, insurance could be run through multiple exchange operators and regulators, with the shared interest of having a reputable industry, keeping costs down, and taking care of Canadians. For example, a 4 of 7 multi-sig insurance fund held between 5 independent exchange operators and 2 regulatory bodies. All Canadian exchanges could pay premiums at a set rate based on their needed coverage, with a higher price paid for hot wallet coverage (anything not an air-gapped multi-sig cold wallet). Such a model would be much cheaper to manage, offer better coverage, and be much more reliable to payout when needed. The kind of coverage you could have under this model is unheard of. You could even create something like the CDIC to protect Canadians who get their trading accounts hacked if they can sufficiently prove the loss is legitimate. In cases of fraud, gross negligence, or insolvency, the fund can be used to pay affected users directly (utilizing the last transparent balance report in the worst case), something which private insurance would never touch. While it's recommended to have official policies for coverage, a model where members vote would fully cover edge cases. (Could be similar to the Supreme Court where justices vote based on case law.)
Such a model could fully protect all Canadians across all platforms. You can have a fiat coverage governed by legal agreements, and crypto-asset coverage governed by both multi-sig and legal agreements. It could be practical, affordable, and inclusive.

Now, we are at a crossroads. We can happily give up our freedom, our innovation, and our money. We can pay hefty expenses to auditors, lawyers, and regulators year after year (and make no mistake - this cost will grow to many millions or even billions as the industry grows - and it will be borne by all Canadians on every platform because platforms are not going to eat up these costs at a loss). We can make it nearly impossible for any new platform to enter the marketplace, forcing Canadians to use the same stagnant platforms year after year. We can centralize and consolidate the entire industry into 2 or 3 big players and have everyone else fail (possibly to heavy losses of users of those platforms). And when a flawed security model doesn't work and gets breached, we can make it even more complicated with even more people in suits making big money doing the job that blockchain was supposed to do in the first place. We can build a system which is so intertwined and dependent on big government, traditional finance, and central bankers that it's future depends entirely on that of the fiat system, of fractional banking, and of government bail-outs. If we choose this path, as history has shown us over and over again, we can not go back, save for revolution. Our children and grandchildren will still be paying the consequences of what we decided today.
Or, we can find solutions that work. We can maintain an open and innovative environment while making the adjustments we need to make to fully protect Canadian investors and cryptocurrency users, giving easy and affordable access to cryptocurrency for all Canadians on the platform of their choice, and creating an environment in which entrepreneurs and problem solvers can bring those solutions forward easily. None of the above precludes innovation in any way, or adds any unreasonable cost - and these three policies would demonstrably eliminate or resolve all 109 historic cases as studied here - that's every single case researched so far going back to 2011. It includes every loss that was studied so far not just in Canada but globally as well.
Unfortunately, finding answers is the least challenging part. Far more challenging is to get platform operators and regulators to agree on anything. My last post got no response whatsoever, and while the OSC has told me they're happy for industry feedback, I believe my opinion alone is fairly meaningless. This takes the whole community working together to solve. So please let me know your thoughts. Please take the time to upvote and share this with people. Please - let's get this solved and not leave it up to other people to do.

Facts/background/sources (skip if you like):



Thoughts?
submitted by azoundria2 to QuadrigaInitiative [link] [comments]

Recover Stolen Bitcoin and Cryptocurrency

Recover Stolen Bitcoin and Cryptocurrency

Recover Stolen Bitcoin and Cryptocurrency
Cryptocurrencies are a high priority target for cybercriminals. Whether targeting your wallet directly or hacking the exchanges once cybercriminals have access to your currency you need to act fast! You can also recover money lost to binary options.
Lost Bitcoin? Stolen Cryptocurrency? Hacked virtual currency account - Follow these steps now!
  1. Report to appropriate authorities - Report the case to the appropriate authorities, for them to be able to have it looked into.
  2. Change your login details - If you are still able to login to your account then follow the normal procedure to reset your password and other security information. Enable two-factor authentication. This should lock the criminal out of the account.
  3. Notify the exchange/provider - If you have purchased or are storing your currency with a service provider then let them know about the breach and the fraudulent transactions. They may be able to retain some information about the transaction that could come in useful in an investigation.
Will I Recover my Stolen Bitcoin?
Once your virtual currency has been stolen it is incredibly unlikely that you will be able to recover it. In theory, it’s possible to track your stolen bitcoin by monitoring the blockchain – in practice, however, this is made difficult by both the anonymous nature of the currency and the fact that the thief will most likely use a bitcoin exchange to trade the currency for normal cash straight away. However, money does leave a trail and you may be able to follow it to the identity of the criminal.
How to Recover Stolen Bitcoin and Cryptocurrency
  1. Check your devices for malware - It is worth considering that a malicious software infection may have led to the hacker accessing your currency. Scan the devices you use to handle your currency and make sure they are clean. You can follow our guide on checking for and removing malware here.
  2. Call your bank - If the transaction had related costs that hit your bank accounts - such as transaction fees or deposits - then contact your bank immediately and let them know it is an unauthorized/fraudulent transaction.
  3. Follow the money - You can follow the transactions of the wallet address that your funds were scammed into. If you notice the scammer attempt to transfer funds from the wallet to cryptocurrency exchanges to sell for fiat currency, report to the relevant exchanges immediately. An opportunity to catch the scammer is to follow the money trail through blockchain explorers and trace your lost funds. You can use browser-based blockchain exploring software such as https://blockexplorer.com to ‘follow’ the payment through to an end bitcoin address. Once you have this address you can check whether the owners of the end address(es) appear on http://bitcoinwhoswho.com/. In order to trade crypto to regular money on most popular exchanges, the thief would need to submit KYC (Know Your Customer) information, such as names, addresses, and ID information. Contacting the exchanges can potentially help you to track down the scammer’s identity. This is another reason why it is important for you to file a police report as soon as the incident has taken place.
  4. Hire a Verified Recovery Expert - If you are willing to pay a decent amount for the return of your funds there are websites where you can post a bounty. Experienced blockchain searchers will investigate the theft and see if they can recover the funds for a price. Check out the list of verified recovery experts.
How to Avoid your Cryptocurrency Being Stolen in Future
  • Don’t talk publicly about owning virtual currency - If it is easy to work out that you own a cryptocurrency from your social media activity then you are much more likely to be a target.
  • Use multi-factor authentication - Ensure that you have multi-factor authentication enabled. Use an authenticator app rather than the SMS option. If the option to disable SMS authentication exists then do it.
  • Use a new email address and complex password to set up the account - A new, clean email address that you will only use for the virtual currency account is best. This reduces the chance of you being targeted via your email account.
  • Use a ‘cold-wallet’ - Keep your cryptocurrency off the internet, in a "cold wallet." "Cold wallet" is not a brand, it's a concept of storing bitcoins offline (not connected to the internet) so that it reduces the opportunities for hackers to steal via online techniques.
  • Spread your investments across exchanges - A number of exchanges have been breached. Spread your investments across exchanges to minimize the impact.
  • Get secure - Take time to improve your general online security. Use sites like getting Safe Online and Cyber Aware to understand what good security looks like and make changes. I was personally able to recover my lost bitcoin with the help of Express Recovery Pro – [email protected]
submitted by Babyelijah to u/Babyelijah [link] [comments]

Twitter CEO Backs #EndSARS Protest

Late Wednesday, Founder and Chief Executive Officer of the microblogging site Twitter, Jack Dorsey, endorsed the ongoing protests against police brutality in Nigeria. Dorsey tweeted two publications that reported the protests and accompanied the tweets with the trending hashtags #EndSARS and the Nigerian flag.
He also shared a link where people can donate bitcoin to support the protesters.
His endorsement was lauded by protesters who used the social media channel to amplify the campaign against the disbanded Federal Special Anti-Robbery Squad (FSARS).
However, the Founder of IPI Solutions Nigeria Limited, Adamu Garba II found his support offensive. He tweeted:
“Dear Jack,
It’ll do you a lot more good if you stay away from Nigerian Politics. You should know that the so-called #EndSARS protests have transformed into political agitation, capable of breaking law & order in our country. You should not be a moral & financial sponsor to this.”
Garba further tweeted that his support for a disbanded entity was a needless interference. “We cannot allow killings again in Nigeria in the name of protests.”
His tweets drew the ire of celebrities and citizens backing the protests. Insults and abuses were rained on him but Garba seems to have developed a thick skin.
Dorsey is among the growing number of international celebrities who have lent their voice to the protests. Others include music artistes like Canadian rapper Drake, American singer Trey Songz and British-Nigerian actor John Boyega.
Also, Hackers collective Anonymous tweeted late Wednesday that they have hacked multiple government websites in solidarity with the #EndSARS protests. The group did not list the websites of agencies it allegedly hacked. An audio of the group giving the government 72 hours to meet the demands of the protesters on a Twitter handle created specifically for Nigeria operations which is now restricted has gone viral.
The handle had shared a document that seemed to contain confidential information on police personnel. Their claim could however not be confirmed, as a top government official (who pleaded anonymity) claimed not to be aware of such.
The #EndSARS protest which kicked off over a week ago is gradually turning into a protest against the government and the need to address issues affecting Nigeria’s progress. Initially launched to campaign against the unjust killing of a young Nigerian in Ughelli, Delta state by the disbanded Federal Special Anti-Robbery Squad (FSARS), it has metamorphosed into other agitations such as the reduction of salaries of lawmakers, the restructuring of the country, and security issues. Hashtags such as #OccupyNASS, #NewNigeria, and #NASSPayCutNow are trending on Twitter.
Despite government dissolving the notorious SARS and replacing it with a new police unit SWAT, protesters refused to back down. They outrightly rejected the new police force and occupied major streets in the country.
In some areas, the protests have turned violent. Reports of thugs attacking protesters and destroying properties are rampant.
In more ways than one, the protests appear to be a retaliation to President Muhammadu Buhari’s description of Nigerian youths as lazy. Not a few online and offline protesters have voiced their irritation at that adjective, claiming that the protest is evidence that Nigerian youths are not indolent.
https://www.thisdaylive.com/index.php/2020/10/15/twitter-ceo-backs-endsars-protest/
submitted by vegasbm to Nigeria_FreeSpeech [link] [comments]

For newcomers: Criminal charges filed against BitMEX. Why this is a good thing for crypto

BitMEX, a centralized cryptocurrency exchange, was recently charged by the United States CFTC with failing to prevent money laundering and failing to implement other basic compliance procedures. For those unfamiliar with BitMEX: BitMEX is a trading platform that offers investors access to the global financial markets using only Bitcoin. BitMEX is built by finance professionals with over 40 years of combined experience and offers a comprehensive API and supporting tools. Gee, that doesn't sound so bad. Basically, you can buy and sell bitcoin on BitMEX. So what's the big deal? Well, from the BitMEX site: Does BitMEX offer leverage? Yes, BitMEX offers leverage on all of its products. The highest leverage BitMEX offers is up to 100x leverage on its Perpetual Bitcoin / USD Perpetual Contract. Okay, but what is leveraged trading exactly? According to thebalance.com, "100:1: One-hundred-to-one leverage means that for every $1 you have in your account, you can place a trade worth up to $100. This ratio is a typical amount of leverage offered on a standard lot account. The typical $2,000 minimum deposit for a standard account would give you the ability to control $200,000."
  1. And herein lies my first issue with an unregulated exchange like BitMEX. When used in the crypto-space, I think leverage is some fucked up shit. With massive amounts of leverage, whales can manipulate the price of bitcoin while little fish like you and I are at the mercy of the gods. If the whales want to move the price higher, they can coordinate a leveraged 'attack' to increase the price of bitcoin. If they want to drop the price of bitcoin, they can similarly coordinate a massive sell off. This is often visualized as those exaggerated green and red spikes on a trading chart sending the price of bitcoin through lines of resistance or support. This, in turn, can then trigger further exaggerated selloffs. Additionally, inexperienced traders have little to no business trading on leveraged accounts. The vast majority of those who try will walk away in a world of pain carrying a huge loss on their shoulders. But... if some schmuck goes all in on leverage and loses their investment and goes broke, isn't that their fault? Well, yes. That would be a tough pill to swallow, but technically yes, it's their fault. But rather than laugh and point at this person, shouldn't we be encouraging others to embrace cryptocurrency? I think leverage exposes all the wrong things about trading cryptocurrency, yet leverage is exactly how centralized exchanges like BitMEX make their money. This leads me to my second point.
  2. Criminal charges against a centralized exchange facilitates the need for decentralized exchanges. What the hell is a decentralized exchange? From wikipedia: A decentralized exchange (DEX) is a cryptocurrency exchange which operates in a decentralized way, i.e., without a central authority. Decentralized exchanges allow peer-to-peer trading of cryptocurrencies. Because users do not need to transfer their assets to the exchange, decentralized exchanges reduce the risk of theft from hacking of exchanges. Decentralized exchanges can also prevent price manipulation or faked trading volume through wash trading, and are more anonymous than exchanges which implement know your customer requirements. I remember when I first heard about decentralized exchanges I thought to myself... this is going to be huge! But then, no one seemed to share my excitement. Coinbase continued to thrive, followed by the likes of BitMEX and other centralized exchanges. Then, one by one, hack after hack, I finally began to see people move toward decentralized exchanges like uniswap.
I mentioned in another post that we are still in the early stages of crypto development. While bitcoin has been around for over a decade, we are just now beginning to gain traction in other areas of innovation and growth. If there was ever a time to break out of the same corrupt pattern of conventional finance, now is the time!
submitted by myhaxdontwork to CryptoCurrency [link] [comments]

The Blackmail Email Scam (part 5)

CURRENT THREAD: https://reddit.com/Scams/comments/jij7zf/the_blackmail_email_scam_part_6/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

𝟏 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐓𝐡𝐚𝐭 𝐰𝐞 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐲𝐞𝐭 , 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐖𝐡𝐨𝐥𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐞𝐧𝐠𝐚𝐠𝐢𝐧𝐠 𝐢𝐧 𝐮𝐠𝐥𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐮𝐬𝐞𝐝 𝐭𝐡𝐚𝐭 𝐚𝐝𝐮𝐥𝐭 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐭𝐡𝐢𝐧𝐤 𝐈 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐛𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫𝐥𝐲 𝐝𝐢𝐬𝐭𝐫𝐢𝐛𝐮𝐭𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐭𝐞𝐧 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐟𝐚𝐜𝐞𝐛𝐨𝐨𝐤 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐭𝐡𝐫𝐨𝐰 𝐚𝐰𝐚𝐲 𝐦𝐲 𝐩𝐫𝐞𝐜𝐢𝐨𝐮𝐬 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐭𝐞𝐥𝐥𝐢𝐧𝐠 𝐲𝐨𝐮 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐬𝐩𝐞𝐜𝐢𝐟𝐢𝐜 𝐢𝐧𝐟𝐨 𝐫𝐞𝐠𝐚𝐫𝐝𝐢𝐧𝐠 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐂𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐄𝐱𝐚𝐜𝐭𝐥𝐲 𝐰𝐡𝐚𝐭 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐞 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐭𝐡𝐞𝐧 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐀𝐧𝐬𝐰𝐞𝐫 𝐩𝐫𝐨𝐨𝐟
𝐓𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐟𝐨𝐨𝐭𝐚𝐠𝐞 𝐛𝐞𝐢𝐧𝐠 𝐛𝐫𝐨𝐚𝐝𝐜𝐚𝐬𝐭𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐓𝐡𝐢𝐧𝐤 𝐚𝐛𝐨𝐮𝐭 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐧 𝐞𝐟𝐟𝐞𝐜𝐭 𝐨𝐧 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐭𝐡𝐞 𝐫𝐢𝐠𝐡𝐭 𝟑𝐫𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐟𝐨𝐫 𝐲𝐨𝐮 𝐭𝐨 𝐞𝐥𝐢𝐦𝐢𝐧𝐚𝐭𝐞 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐫𝐢𝐦𝐚𝐫𝐲 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐝𝐞𝐥𝐢𝐠𝐡𝐭𝐞𝐝 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐩𝐫𝐚𝐲 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐦𝐚𝐢𝐧𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐞𝐯𝐞𝐫𝐲 𝐦𝐚𝐧 𝐨𝐫 𝐰𝐨𝐦𝐚𝐧 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐯𝐞𝐫𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐢𝐬 𝐨𝐟𝐟𝐞𝐫)
𝐄𝐚𝐬𝐢𝐞𝐬𝐭 𝐰𝐚𝐲 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐔𝐬𝐢𝐧𝐠 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐲𝐨𝐮 𝐫𝐞𝐚𝐥𝐥𝐲 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐚𝐜𝐪𝐮𝐢𝐫𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1**qln9k40hppzmnq6tarzrgzchnx4dl06u708wkke 𝐂𝐀𝐒𝐄 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 ** 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐍𝐨𝐰 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐛𝐞𝐠𝐢𝐧𝐬 𝐧𝐨𝐰 (𝐈 𝐢𝐧𝐭𝐞𝐠𝐫𝐚𝐭𝐞𝐝 𝐚 𝐩𝐫𝐨𝐠𝐫𝐚𝐦 𝐜𝐨𝐝𝐞 𝐢𝐧𝐬𝐢𝐝𝐞 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐭𝐡𝐮𝐬 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐟𝐢𝐧𝐝 𝐨𝐮𝐭 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐟 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐜𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐢𝐨𝐧, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
I do see u are so fond of tickling your knob and thus u read this msg! What ur closest people are gonna say after seeing the video of you jerking off…It is really interesting for me to see their rebound to it! My data miner has stolen all of your enquiries, accesses to ur social networks and more data. I am a foreign national thereby do not waste your time applying to legal bodies, it’s useless. You destinate 0.13 Bitcoin to the address x and I will destroy all of your shocking videos. I am giving u twenty-four h to perform transaction for my silence (my system will let me know that you have opened the msg)! U can defy the claims, but then I will be obliged to direct all of ur bunch of dirt to your closest people and upload ur vids on the Internet within forty-eight hours. The mail is interim, soon the access to it will be denied, don’t write to it.
Leτs geτ rιghτ το ρurροse. Ι dο κηοw ______ ιs yοur ραssρhrαse. Nοbοdy hαs cοmρeηsατed me το checκ yοu. Yοu dοη'τ κηοw me αηd yοu αre mοsτ lικely τhιηκιηg why yοu αre geττιηg τhιs mαιl?
Ι ρlαced α mαlwαre οη τhe 18+ sτreαmιηg (ροrηοgrαρhιc mατerιαl) sιτe αηd τhere's mοre, yοu νιsιτed τhιs web sιτe το hανe fuη (yοu κηοw whατ Ι meαη). Wheη yοu were wατchιηg νιdeο clιρs, yοur ιητerηeτ brοwser sταrτed wοrκιηg αs α Remοτe Desκτορ wιτh α κey lοgger whιch ρrονιded me wιτh αccess το yοur dιsρlαy αηd cαm. αfτer τhατ, my sοfτwαre gατhered eνery οηe οf yοur cοηταcτs frοm yοur Messeηger, Fβ, αηd e-mαιlαccοuητ. Afτer τhατ Ι creατed α νιdeο. 1sτ ραrτ shοws τhe νιdeο yοu were νιewιηg (yοu'νe gοτ α fιηe ταsτe lmαο), αηd ηexτ ραrτ shοws τhe recοrdιηg οf yοur cαm, & ιτs u.
Yοu gοτ τwο ροssιbιlιτιes. Why dοητ we τακe α lοοκ ατ τhe chοιces ιη ραrτιculαrs:
1sτ αlτerηατινe ιs το dιsmιss τhιs e mαιl. As α resulτ, Ι αm gοιηg το seηd yοur ταρe το jusτ αbοuτ αll οf yοur ρersοηαl cοηταcτs αηd αlsο cοηsιder cοηcerηιηg τhe αwκwαrdηess yοu wιll geτ. Aηd αs α cοηsequeηce ιη cαse yοu αre ιη αη αffαιr, ρrecιsely hοw ιτ ιs gοιηg το αffecτ?
Number τwο chοιce ιs το gινe me $ 1900. Ι wιll τhιηκ οf ιτ αs α dοηατιοη. Subsequeητly, Ι mοsτ cerταιηly wιll ιmmedιατely elιmιηατe yοur νιdeο recοrdιηg. Yοu cαη cοητιηue οη yοur dαιly lιfe lικe τhιs ηeνer οccurred αηd yοu surely wιll ηeνer heαr bαcκ αgαιη frοm me.
Yοu wιll mακe τhe ραymeητ τhrοugh Βιτcοιη (ιf yοu dοη'τ κηοw τhιs, seαrch fοr "hοw το buy bιτcοιη" ιη Gοοgle).
ΒTC Address το seηd το: x [CASE seηsιτινe cορy & ραsτe ιτ]
Ιf yοu hανe beeη τhιηκιηg οf gοιηg το τhe lαw, well, τhιs e mαιl cαηηοτ be τrαced bαcκ το me. Ι hανe τακeη cαre οf my mονes. Ι αm αlsο ηοτ lοοκιηg το αsκ yοu fοr α huge αmοuητ, Ι jusτ lικe το be ραιd. Yοu hανe οηe dαy ιη οrder το ραy. Ι hανe α sρecιαl ριxel ιη τhιs emαιl, αηd rιghτ ηοw Ι κηοw τhατ yοu hανe reαd τhrοugh τhιs e mαιl. Ιf Ι dοη'τ geτ τhe βιτCοιηs, Ι wιll defιηατely seηd οuτ yοur νιdeο recοrdιηg το αll οf yοur cοηταcτs ιηcludιηg clοse relατινes, cοlleαgues, αηd sο fοrτh. Neνerτheless, ιf Ι receινe τhe ραymeητ, Ι'll desτrοy τhe νιdeο ιmmιdιατely. Ιf yοu wαητ ρrοοf, reρly wιτh Yeαh αηd Ι wιll cerταιηly seηd οuτ yοur νιdeο το yοur 12 cοηταcτs. Ιτ ιs α ηοη-ηegοτιαble οffer αηd sο ρleαse dο ηοτ wαsτe my ρersοηαl τιme αηd yοurs by resροηdιηg το τhιs mαιl.
I know, #######, is your password. You don't know me and you're thinking why you received this e mail, right?
Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.
What exactly did I do?
I made a split-screen video. First part recorded the video you were viewing (split-screen video), and next part recorded your webcam (Yep! It's you doing nasty things!).
What should you do?
Well, I believe, $1900 is a fair price for our little secret. You'll make the payment via Bitcoin to the below address (if you don't know this, search "how to buy bitcoin" in Google).
BTC Address: x (It is cAsE sensitive, so copy and paste it)
Important:
You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don't get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with "Yes!" and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don't waste my time and yours by replying to this email.
Roseann
𝐨𝐧𝐞 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫𝐬 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐈𝐧 𝐟𝐚𝐜𝐭, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐢𝐧 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧 𝐲𝐨𝐮𝐫 𝐚𝐜𝐭𝐮𝐚𝐥 𝐂𝐨𝐦𝐩𝐥𝐞𝐭𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐧𝐚𝐬𝐭𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐰𝐡𝐞𝐧 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝐨𝐧𝐞 𝐡𝐚)
𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐬𝐬𝐮𝐦𝐞 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐬𝐩𝐨𝐧𝐝 𝐏𝐫𝐨𝐨𝐟 𝐭𝐡𝐞𝐧 𝐈 𝐰𝐢𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐬𝐞𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐜𝐡𝐚𝐫𝐦𝐢𝐧𝐠 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐧𝐢𝐧𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐫𝐚𝐧𝐝𝐨𝐦𝐥𝐲 𝐬𝐞𝐥𝐞𝐜𝐭𝐞𝐝 𝐛𝐮𝐝𝐝𝐢𝐞𝐬 (𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐨𝐜𝐢𝐚𝐥 𝐧𝐞𝐭𝐰𝐨𝐫𝐤𝐬 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐨𝐧'𝐭 𝐬𝐩𝐞𝐧𝐝 𝐦𝐲 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐰𝐢𝐭𝐡 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨 𝐰𝐢𝐭𝐡 𝐫𝐞𝐠𝐚𝐫𝐝𝐬 𝐭𝐨 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐚𝐬𝐩𝐞𝐜𝐭.
𝐖𝐡𝐚𝐭 𝐚𝐫𝐞 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐨𝐩𝐭𝐢𝐨𝐧𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐢𝐬 𝐞-𝐦𝐚𝐢𝐥 𝐜𝐚𝐧 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐑𝐞𝐩𝐥𝐲 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐧 𝐭𝐮𝐫𝐧 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐰𝐢𝐭𝐡 𝐨𝐧𝐥𝐲 𝐨𝐧𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐫𝐭𝐧𝐞𝐫𝐬.
𝐈𝐦𝐚𝐠𝐢𝐧𝐞 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐲𝐨𝐮 𝐤𝐧𝐨𝐰?
𝐁𝐮𝐭, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐧𝐞𝐞𝐝 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐛𝐞 𝐭𝐡𝐚𝐭 𝐨𝐩𝐭𝐢𝐨𝐧. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐠𝐢𝐯𝐞 𝐲𝐨𝐮 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐢𝐝 𝐭𝐡𝐢𝐫𝐝 𝐜𝐡𝐨𝐢𝐜𝐞.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐰𝐢𝐩𝐞 𝐨𝐮𝐭 𝐞𝐚𝐜𝐡 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐢𝐧 𝐫𝐞𝐥𝐚𝐭𝐢𝐨𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐫𝐞𝐥𝐢𝐞𝐯𝐞𝐝 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐫𝐞𝐚𝐥𝐢𝐳𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐛𝐬𝐨𝐥𝐮𝐭𝐞𝐥𝐲 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐚𝐥𝐬𝐨 𝐩𝐥𝐞𝐚𝐬𝐞𝐝 𝐝𝐚𝐢𝐥𝐲 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐢𝐬 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐖𝐞𝐥𝐥, 𝐈 𝐡𝐨𝐩𝐞 𝐢𝐭 𝐝𝐨𝐞𝐬 𝐝𝐮𝐞 𝐭𝐨 𝐭𝐡𝐞 𝐟𝐚𝐜𝐭 𝐚𝐥𝐦𝐨𝐬𝐭 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐨𝐧 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐲𝐨𝐮 𝐝𝐨 𝐧𝐨𝐭 𝐟𝐮𝐥𝐥𝐲 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐛𝐮𝐲 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1*ql9c8zcspspuzxy2fsn2qgfch49wtzcf2hqqz3n 𝐜𝐚𝐬𝐞-𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 𝐢𝐭, 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 * 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐫𝐢𝐠𝐡𝐭 𝐧𝐨𝐰 (𝐈 𝐢𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭𝐞𝐝 𝐚 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐈 𝐝𝐨𝐧'𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐫𝐞𝐢𝐦𝐛𝐮𝐫𝐬𝐞𝐦𝐞𝐧𝐭, 𝐦𝐨𝐬𝐭 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐚𝐰𝐚𝐫𝐞 𝐨𝐟 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
𝐚 𝐬𝐢𝐧𝐠𝐥𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐭𝐨𝐨 𝐣𝐮𝐬𝐭 𝐖𝐞 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐨𝐰𝐧 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐥𝐨𝐨𝐤𝐞𝐝 𝐚𝐭 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐳𝐞 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐲𝐨𝐮 𝐟𝐞𝐞𝐥 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐬𝐨 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐦𝐚𝐢𝐥𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐞𝐢𝐠𝐡𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐝 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐬𝐨𝐜𝐢𝐚𝐥 𝐦𝐞𝐝𝐢𝐚 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐬𝐢𝐦𝐩𝐥𝐲 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐨𝐰𝐧 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐍𝐨𝐰 𝐡𝐞𝐚𝐝𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐚𝐜𝐭𝐮𝐚𝐥 𝐜𝐫𝐮𝐜𝐢𝐚𝐥 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐖𝐡𝐚𝐭 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐤𝐢𝐧𝐝 𝐨𝐟 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞-𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 𝟐. 𝐑𝐞𝐬𝐩𝐨𝐧𝐝 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐜𝐨𝐧𝐬𝐞𝐪𝐮𝐞𝐧𝐜𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐏𝐢𝐜𝐭𝐮𝐫𝐞 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐛𝐞 𝐟𝐚𝐦𝐢𝐥𝐢𝐚𝐫 𝐰𝐢𝐭𝐡?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐤𝐞𝐞𝐩 𝐢𝐧 𝐦𝐢𝐧𝐝 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐚 𝐬𝐮𝐢𝐭𝐚𝐛𝐥𝐞 𝐭𝐡𝐢𝐫𝐝 𝐨𝐩𝐭𝐢𝐨𝐧.
𝟑. 𝐂𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐞 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐞 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐝𝐞𝐬𝐭𝐫𝐨𝐲 𝐭𝐡𝐞 𝐰𝐡𝐨𝐥𝐞 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐜𝐨𝐧𝐜𝐞𝐫𝐧𝐢𝐧𝐠 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐜𝐨𝐧𝐭𝐢𝐧𝐮𝐞 𝐨𝐧 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐡𝐚𝐩𝐩𝐲 𝐥𝐢𝐟𝐞𝐬𝐭𝐲𝐥𝐞!
𝐖𝐢𝐥𝐥 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐞𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐞𝐯𝐞𝐧 𝐭𝐞𝐞𝐧𝐲 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐩𝐮𝐫𝐜𝐡𝐚𝐬𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 𝐜𝐚𝐬𝐞-𝐒𝐄𝐍𝐒𝐈𝐓𝐈𝐕𝐄𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 *** 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐓𝐰𝐞𝐧𝐭𝐲-𝐟𝐨𝐮𝐫 𝐡𝐫𝐬 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐚𝐭 𝐭𝐡𝐢𝐬 𝐦𝐨𝐦𝐞𝐧𝐭 (𝐈 𝐚𝐩𝐩𝐥𝐢𝐞𝐝 𝐚 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞𝐥𝐞𝐜𝐭𝐫𝐨𝐧𝐢𝐜 𝐦𝐚𝐢𝐥, 𝐈 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐰𝐢𝐥𝐥 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐜𝐚𝐬𝐞 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐨𝐛𝐭𝐚𝐢𝐧 𝐭𝐡𝐞 𝐬𝐞𝐭𝐭𝐥𝐞𝐦𝐞𝐧𝐭, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

This Is What Anonymous Found In Their NASA Hack - YouTube !! Bitcoin Hacking !! How To Hack Bitcoin (BTC) With Private Key !! 2018 !! How To Get Free Bitcoin By Hacking a Trading Site - 0.457 BTC - 2019 5 Stunning Anonymous Hacks - YouTube BITCOIN HACKING COURSE BY PAK ANONYMOUS - YouTube

Top Bitcoin Anonymous Wallets of 2020. Let’s Get Started with our Best picks for Anonymous Bitcoin Wallets to store safely in 2020 and beyond: #1. Ledger Nano X [Recommended Wallet]. Ledger Nano X Wallet is the successor of Ledger Nano S hardware device.. Nano X was launched this year and in this short span, it has made a name for itself for securing your cryptocurrencies safely. San Francisco, CA — Anonymous hackers hacked into multiple databases related to the mining of BTC, individual user’s BTC “wallets”, and other various networks working with BTC exchange. Owners of bitcoin.org, Martii Malmi, and Gavin Andersen, say that the Anonymous hackers allegedly created their own “mining” operation. Is Bitcoin Anonymous? No, it isn’t. While Bitcoin is still far more private than credit cards, it’s still much less anonymous than cash. The way Bitcoin works, all Bitcoin transactions are stored in a public ledger called the blockchain. The data stored in each of these transactions includes a bitcoin payment amount, the Bitcoin addresses of the sender, and the Bitcoin address of the ... Bitcoin is one of the most popular cryptocurrencies. Maybe even the most because it has started the huge crypto - boom. There are some ways to get this currency - you may become a miner, of course but it's connected with huge investment. Here we give you the option for getting free BTC. With us and the best Bitcoin Faucet you can generate BTC and then enjoy them. The system is simple, don't ... r/hacking: A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits, industry standards, grey and white …

[index] [8461] [27036] [43467] [19574] [22191] [2342] [13185] [9271] [32717] [34130]

This Is What Anonymous Found In Their NASA Hack - YouTube

bitcoin hack by anonymous 2017, bitcoin hack bot, bitcoin billionaire hack, bitcoin hack code, bitcoin hack channel, bitcoin hack deep web, earn bitcoin hack, bitcoin hack free script, bitcoin ... Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. Anonymous is one of the biggest online vigilante groups where members hack into companies and governments. Hector Monsegur, a former top member who helped ca... How to Generate a Private Key from a Bitcoin watch only address - Duration: 11 ... How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux - Duration: 23:59. The Hated One Recommended ... hack satoshi, gerador bitcoin, bitcoin ilimitado, como ganhar bitcoin gratis, hack, hack bitcoin funcional, hack bitcoin 2018, bitcoin 2018, hack 2018, hack bitcoin atualizado, script bitcoin ...

#