Bitcoin Earn Bitcoin Earn Bitcoin Free Bitcoin Mining

Bob The Magic Custodian



Summary: Everyone knows that when you give your assets to someone else, they always keep them safe. If this is true for individuals, it is certainly true for businesses.
Custodians always tell the truth and manage funds properly. They won't have any interest in taking the assets as an exchange operator would. Auditors tell the truth and can't be misled. That's because organizations that are regulated are incapable of lying and don't make mistakes.

First, some background. Here is a summary of how custodians make us more secure:

Previously, we might give Alice our crypto assets to hold. There were risks:

But "no worries", Alice has a custodian named Bob. Bob is dressed in a nice suit. He knows some politicians. And he drives a Porsche. "So you have nothing to worry about!". And look at all the benefits we get:
See - all problems are solved! All we have to worry about now is:
It's pretty simple. Before we had to trust Alice. Now we only have to trust Alice, Bob, and all the ways in which they communicate. Just think of how much more secure we are!

"On top of that", Bob assures us, "we're using a special wallet structure". Bob shows Alice a diagram. "We've broken the balance up and store it in lots of smaller wallets. That way", he assures her, "a thief can't take it all at once". And he points to a historic case where a large sum was taken "because it was stored in a single wallet... how stupid".
"Very early on, we used to have all the crypto in one wallet", he said, "and then one Christmas a hacker came and took it all. We call him the Grinch. Now we individually wrap each crypto and stick it under a binary search tree. The Grinch has never been back since."

"As well", Bob continues, "even if someone were to get in, we've got insurance. It covers all thefts and even coercion, collusion, and misplaced keys - only subject to the policy terms and conditions." And with that, he pulls out a phone-book sized contract and slams it on the desk with a thud. "Yep", he continues, "we're paying top dollar for one of the best policies in the country!"
"Can I read it?' Alice asks. "Sure," Bob says, "just as soon as our legal team is done with it. They're almost through the first chapter." He pauses, then continues. "And can you believe that sales guy Mike? He has the same year Porsche as me. I mean, what are the odds?"

"Do you use multi-sig?", Alice asks. "Absolutely!" Bob replies. "All our engineers are fully trained in multi-sig. Whenever we want to set up a new wallet, we generate 2 separate keys in an air-gapped process and store them in this proprietary system here. Look, it even requires the biometric signature from one of our team members to initiate any withdrawal." He demonstrates by pressing his thumb into the display. "We use a third-party cloud validation API to match the thumbprint and authorize each withdrawal. The keys are also backed up daily to an off-site third-party."
"Wow that's really impressive," Alice says, "but what if we need access for a withdrawal outside of office hours?" "Well that's no issue", Bob says, "just send us an email, call, or text message and we always have someone on staff to help out. Just another part of our strong commitment to all our customers!"

"What about Proof of Reserve?", Alice asks. "Of course", Bob replies, "though rather than publish any blockchain addresses or signed transaction, for privacy we just do a SHA256 refactoring of the inverse hash modulus for each UTXO nonce and combine the smart contract coefficient consensus in our hyperledger lightning node. But it's really simple to use." He pushes a button and a large green checkmark appears on a screen. "See - the algorithm ran through and reserves are proven."
"Wow", Alice says, "you really know your stuff! And that is easy to use! What about fiat balances?" "Yeah, we have an auditor too", Bob replies, "Been using him for a long time so we have quite a strong relationship going! We have special books we give him every year and he's very efficient! Checks the fiat, crypto, and everything all at once!"

"We used to have a nice offline multi-sig setup we've been using without issue for the past 5 years, but I think we'll move all our funds over to your facility," Alice says. "Awesome", Bob replies, "Thanks so much! This is perfect timing too - my Porsche got a dent on it this morning. We have the paperwork right over here." "Great!", Alice replies.
And with that, Alice gets out her pen and Bob gets the contract. "Don't worry", he says, "you can take your crypto-assets back anytime you like - just subject to our cancellation policy. Our annual management fees are also super low and we don't adjust them often".

How many holes have to exist for your funds to get stolen?
Just one.

Why are we taking a powerful offline multi-sig setup, widely used globally in hundreds of different/lacking regulatory environments with 0 breaches to date, and circumventing it by a demonstrably weak third party layer? And paying a great expense to do so?
If you go through the list of breaches in the past 2 years to highly credible organizations, you go through the list of major corporate frauds (only the ones we know about), you go through the list of all the times platforms have lost funds, you go through the list of times and ways that people have lost their crypto from identity theft, hot wallet exploits, extortion, etc... and then you go through this custodian with a fine-tooth comb and truly believe they have value to add far beyond what you could, sticking your funds in a wallet (or set of wallets) they control exclusively is the absolute worst possible way to take advantage of that security.

The best way to add security for crypto-assets is to make a stronger multi-sig. With one custodian, what you are doing is giving them your cryptocurrency and hoping they're honest, competent, and flawlessly secure. It's no different than storing it on a really secure exchange. Maybe the insurance will cover you. Didn't work for Bitpay in 2015. Didn't work for Yapizon in 2017. Insurance has never paid a claim in the entire history of cryptocurrency. But maybe you'll get lucky. Maybe your exact scenario will buck the trend and be what they're willing to cover. After the large deductible and hopefully without a long and expensive court battle.

And you want to advertise this increase in risk, the lapse of judgement, an accident waiting to happen, as though it's some kind of benefit to customers ("Free institutional-grade storage for your digital assets.")? And then some people are writing to the OSC that custodians should be mandatory for all funds on every exchange platform? That this somehow will make Canadians as a whole more secure or better protected compared with standard air-gapped multi-sig? On what planet?

Most of the problems in Canada stemmed from one thing - a lack of transparency. If Canadians had known what a joke Quadriga was - it wouldn't have grown to lose $400m from hard-working Canadians from coast to coast to coast. And Gerald Cotten would be in jail, not wherever he is now (at best, rotting peacefully). EZ-BTC and mister Dave Smilie would have been a tiny little scam to his friends, not a multi-million dollar fraud. Einstein would have got their act together or been shut down BEFORE losing millions and millions more in people's funds generously donated to criminals. MapleChange wouldn't have even been a thing. And maybe we'd know a little more about CoinTradeNewNote - like how much was lost in there. Almost all of the major losses with cryptocurrency exchanges involve deception with unbacked funds.
So it's great to see transparency reports from BitBuy and ShakePay where someone independently verified the backing. The only thing we don't have is:
It's not complicated to validate cryptocurrency assets. They need to exist, they need to be spendable, and they need to cover the total balances. There are plenty of credible people and firms across the country that have the capacity to reasonably perform this validation. Having more frequent checks by different, independent, parties who publish transparent reports is far more valuable than an annual check by a single "more credible/official" party who does the exact same basic checks and may or may not publish anything. Here's an example set of requirements that could be mandated:
There are ways to structure audits such that neither crypto assets nor customer information are ever put at risk, and both can still be properly validated and publicly verifiable. There are also ways to structure audits such that they are completely reasonable for small platforms and don't inhibit innovation in any way. By making the process as reasonable as possible, we can completely eliminate any reason/excuse that an honest platform would have for not being audited. That is arguable far more important than any incremental improvement we might get from mandating "the best of the best" accountants. Right now we have nothing mandated and tons of Canadians using offshore exchanges with no oversight whatsoever.

Transparency does not prove crypto assets are safe. CoinTradeNewNote, Flexcoin ($600k), and Canadian Bitcoins ($100k) are examples where crypto-assets were breached from platforms in Canada. All of them were online wallets and used no multi-sig as far as any records show. This is consistent with what we see globally - air-gapped multi-sig wallets have an impeccable record, while other schemes tend to suffer breach after breach. We don't actually know how much CoinTrader lost because there was no visibility. Rather than publishing details of what happened, the co-founder of CoinTrader silently moved on to found another platform - the "most trusted way to buy and sell crypto" - a site that has no information whatsoever (that I could find) on the storage practices and a FAQ advising that “[t]rading cryptocurrency is completely safe” and that having your own wallet is “entirely up to you! You can certainly keep cryptocurrency, or fiat, or both, on the app.” Doesn't sound like much was learned here, which is really sad to see.
It's not that complicated or unreasonable to set up a proper hardware wallet. Multi-sig can be learned in a single course. Something the equivalent complexity of a driver's license test could prevent all the cold storage exploits we've seen to date - even globally. Platform operators have a key advantage in detecting and preventing fraud - they know their customers far better than any custodian ever would. The best job that custodians can do is to find high integrity individuals and train them to form even better wallet signatories. Rather than mandating that all platforms expose themselves to arbitrary third party risks, regulations should center around ensuring that all signatories are background-checked, properly trained, and using proper procedures. We also need to make sure that signatories are empowered with rights and responsibilities to reject and report fraud. They need to know that they can safely challenge and delay a transaction - even if it turns out they made a mistake. We need to have an environment where mistakes are brought to the surface and dealt with. Not one where firms and people feel the need to hide what happened. In addition to a knowledge-based test, an auditor can privately interview each signatory to make sure they're not in coercive situations, and we should make sure they can freely and anonymously report any issues without threat of retaliation.
A proper multi-sig has each signature held by a separate person and is governed by policies and mutual decisions instead of a hierarchy. It includes at least one redundant signature. For best results, 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.

History has demonstrated over and over again the risk of hot wallets even to highly credible organizations. Nonetheless, many platforms have hot wallets for convenience. While such losses are generally compensated by platforms without issue (for example Poloniex, Bitstamp, Bitfinex, Gatecoin, Coincheck, Bithumb, Zaif, CoinBene, Binance, Bitrue, Bitpoint, Upbit, VinDAX, and now KuCoin), the public tends to focus more on cases that didn't end well. Regardless of what systems are employed, there is always some level of risk. For that reason, most members of the public would prefer to see third party insurance.
Rather than trying to convince third party profit-seekers to provide comprehensive insurance and then relying on an expensive and slow legal system to enforce against whatever legal loopholes they manage to find each and every time something goes wrong, insurance could be run through multiple exchange operators and regulators, with the shared interest of having a reputable industry, keeping costs down, and taking care of Canadians. For example, a 4 of 7 multi-sig insurance fund held between 5 independent exchange operators and 2 regulatory bodies. All Canadian exchanges could pay premiums at a set rate based on their needed coverage, with a higher price paid for hot wallet coverage (anything not an air-gapped multi-sig cold wallet). Such a model would be much cheaper to manage, offer better coverage, and be much more reliable to payout when needed. The kind of coverage you could have under this model is unheard of. You could even create something like the CDIC to protect Canadians who get their trading accounts hacked if they can sufficiently prove the loss is legitimate. In cases of fraud, gross negligence, or insolvency, the fund can be used to pay affected users directly (utilizing the last transparent balance report in the worst case), something which private insurance would never touch. While it's recommended to have official policies for coverage, a model where members vote would fully cover edge cases. (Could be similar to the Supreme Court where justices vote based on case law.)
Such a model could fully protect all Canadians across all platforms. You can have a fiat coverage governed by legal agreements, and crypto-asset coverage governed by both multi-sig and legal agreements. It could be practical, affordable, and inclusive.

Now, we are at a crossroads. We can happily give up our freedom, our innovation, and our money. We can pay hefty expenses to auditors, lawyers, and regulators year after year (and make no mistake - this cost will grow to many millions or even billions as the industry grows - and it will be borne by all Canadians on every platform because platforms are not going to eat up these costs at a loss). We can make it nearly impossible for any new platform to enter the marketplace, forcing Canadians to use the same stagnant platforms year after year. We can centralize and consolidate the entire industry into 2 or 3 big players and have everyone else fail (possibly to heavy losses of users of those platforms). And when a flawed security model doesn't work and gets breached, we can make it even more complicated with even more people in suits making big money doing the job that blockchain was supposed to do in the first place. We can build a system which is so intertwined and dependent on big government, traditional finance, and central bankers that it's future depends entirely on that of the fiat system, of fractional banking, and of government bail-outs. If we choose this path, as history has shown us over and over again, we can not go back, save for revolution. Our children and grandchildren will still be paying the consequences of what we decided today.
Or, we can find solutions that work. We can maintain an open and innovative environment while making the adjustments we need to make to fully protect Canadian investors and cryptocurrency users, giving easy and affordable access to cryptocurrency for all Canadians on the platform of their choice, and creating an environment in which entrepreneurs and problem solvers can bring those solutions forward easily. None of the above precludes innovation in any way, or adds any unreasonable cost - and these three policies would demonstrably eliminate or resolve all 109 historic cases as studied here - that's every single case researched so far going back to 2011. It includes every loss that was studied so far not just in Canada but globally as well.
Unfortunately, finding answers is the least challenging part. Far more challenging is to get platform operators and regulators to agree on anything. My last post got no response whatsoever, and while the OSC has told me they're happy for industry feedback, I believe my opinion alone is fairly meaningless. This takes the whole community working together to solve. So please let me know your thoughts. Please take the time to upvote and share this with people. Please - let's get this solved and not leave it up to other people to do.

Facts/background/sources (skip if you like):



Thoughts?
submitted by azoundria2 to QuadrigaInitiative [link] [comments]

Market Pullback, Halved Rewards for Miners, Is the LTC Halving the End or the Beginning?

Market Pullback, Halved Rewards for Miners, Is the LTC Halving the End or the Beginning?


The mining of the block 1,680,000 at 18:16 (UTC +8) on August 5 marked the second LTC halving was successful, slashing the block rewards for miners from 25 LTC to 12.5 LTC. On the day of halving, the price of LTC once surged to $106.63 with the biggest rise of 16.4% and fell gradually after the halving.
The first halving of LTC, which was born in 2011, took place on August 28, 2015. Six months before the second halving, the market trend was roughly the same as the first halving, price surge driven by the reduction in production was more concentrated in the first few months. From February to June this year, LTC rose from 32 US dollars to the highest $145.8, an increase of 355%, leading an upward movement of the market.
Views on LTC’s trend varies
In response to the impact of this LTC halving, many insiders have expressed their views:
Bullish:
1) Production cuts will change the market supply of Litecoin. Assuming the demand growth rate remains the same, the demand could be driven higher on the wave of hypes and FOMO. Once the supply growth rate declines, the price will rise in theory.
2) When the first halving happened in 2015, the cryptocurrency sphere was in the bear market. Four years later, public recognition and technological development have been completely different, the cryptocurrency sparked a market rally, therefore, the bullish trend was expectable after the halving.
3) Bitcoin's production cut expectation may also bring in the market ahead of time, driving the LTC to continue to rise.
4) After LTC production reduction, the supply and demand greatly adjusted. Since the inflation rate has been reduced from 8% to 4%, miners and holders will be reluctant to sell, and thus, the market will remain a long-term and positive momentum.
Of course, some hold the opposite attitude:
1) The bullish has already cashed in. Looking at the halving in 2015, the market broke out three months ahead of schedule, and the unit price rose from $1.3 to the highest $8.96. Then the price fell and dropped to $2.95 on the day of the production cut. However, from the beginning of 2019, the price of LTC has increased five times. As the saying goes, "too much water drowned the miller", therefore, bearish will follow the extreme bullish.
2) Investors who have enjoyed the earnings of this LTC halving will make a plan for the halving of BTC next year. According to the law of halving starts 3-6 months ahead of the scheduled time, it is expected that more funds will be gradually shifted from Litecoin and other digital currencies to bitcoin, which may cause the price decline of BTC.
In the investment market, price rises and falls are mixed blessing, so are the digital market. It’s hopeless to realize high profits through the trick of buy-low and sell-high in digital currency trading. However, with contract trading, such as the contract series of 58COIN, investors can make profits no matter long or short the position, and gain expanded earnings by using leverages. At present, Litecoin existed in the three major contract categories of 58COIN, namely the standard contract, USDT contract, and delivery contract. Also, 58COIN covers other popular cryptocurrency contracts, providing free choices to investors.
Short-Term Earnings after Halving is Depressing
Compared with the optimistic expectations of the secondary market, Litecoin's production reduction will cause "injuries" to miners in the short term. "After halving, the overall income of the miners should be reduced by half, and the overall profit will be reduced to 10% to 30%. If the price does not rise, the mining earnings will become very pessimistic," an industry source said.
The above-mentioned person pointed out that the current miners are mainly Antminer L3+ and L3++, of which the power consumption of L3+ is 800W, daily consumption is 19.2 kWh, and the total earnings is 0.008 LTC, equivalent to about 5.7 Yuan. If the electricity cost is 0.26 Yuan on average, it will account for more than 87% of the income. After halving the output, the mined LTC will basically cover the electricity cost. L3+ may “not worth a cent” because of the decline in energy efficiency.
In the face of possible adverse effect on the miners by halving, Li Qiwei said in the recent review that some miners may turn off the machines, but the difficulty of mining will be re-adjusted in a few days and everything will back to normal. Industry insiders also reminded investors who are interested in mining that the hashrate will have new changes after the halving, and direct purchasing of coins is a more secure option.
LTC Halving Make Way for BTC Halving
Charles Li, the previous Google engineer, created Litecoin eight years ago. In principle, the production mechanism of LTC is the same as that of Bitcoin, which was then dubbed the altcoin of BTC. Compared with Bitcoin, LTC has a shorter block generation time with an average of 2.5 minutes, and a higher total supply of 84 million.
Bitcoin vs. Litecoin


Litecoin has long been considered a “test-pillow” for Bitcoin, on which many innovative technologies are first deployed, whether being the isolation test or the lightning network, LTC always “take the lead”. Some people believe that this halving of Litecoin is a rehearsal of Bitcoin halving next year.
In short, due to the increasing correlation between digital currencies, the path of LTC and other cryptocurrencies depends a lot on Bitcoin.
Around May 20, 2020
Website: https://ww.58coin.com/
Facebook: https://www.facebook.com/coin.58COIN
Twitter: https://twitter.com/58_coin
Telegram: https://t.me/official58
submitted by 58CoinExchange to u/58CoinExchange [link] [comments]

How to get rich quick from the cyptocurrency hype

In the 1920s Charles Ponzi pulled a "Ponzi scheme" that cost his investors $20 million and served 14 years in prison. 100 years later thousands of scammers defraud naive investors of billions of dollars through the cryptocurrency hype legally.
Satoshi Nakamoto had the chance of being the number 1 scam artist, but since he didn't sell any bitcoins or raised any money he missed out on getting rich.
Here is a list of get-rich-quick cryptocurrency schemes:

1. The "Buterin scheme"

The Buterin scheme is the most advanced and sophisticated crypto scam, but the reward is in the billions. All you have to do is say about your blockchain being more "technologically advanced" then the previous blockchain, hype it with fancy buzzwords that no one understands and sell the premined tokens in an ICO. Don't forget to keep a good part of the premined tokens for the long con. Now that you have money from the ICO you can hire some developers to work on your project and a troll factory to shill your crypto while you dump your premined tokens. Your work will be made easier by the level 1 investors who will want to dump the tokens on level 2 investors. Partnerships with Microsoft or IBM and a meeting with Trump or Putin will certainly put your crypto in the top 10.
The number of premined tokens in the Buterin scheme was 12 millions ETH which was about $15 billions at the mania peak. After seeing the successful Buterin money making scheme, every second chinese or russian crypto developer are trying to do this trick, most successfully being EOS which raised $4 billions.

2. Pump and Dump

All you have to do for this scheme is acquire a large amount of tokens fro a low price, then buy more of it on exchanges to raise the price quick and also hire trolls to shill the tokens on Reddit, Twitter, Facebook, TV or any other place you can, and then sell the tokens for a massive profit. John McAffee or websites such as Pornhub can help you greatly in this scam. You can learn a lot from the masterminds behind Bitcoin Cash, Nano or Verge.

3. The ICO scam

Same as the Buterin scheme, only that your blockchain idea is so dumb that it would be a waste of money to hire developers to work on it, so you take the money from the ICO and pretend that you are working on the project while enjoying the millionaire life on the seaside. You can get a whitepaper and a roadmap for as low as $10! Facebook, Google ads and internet trolls will be your friends in this scheme.

4. The inside info

Do you work at a big exchange that is about to list a new token? Or do you work at the SEC and they are about to approve a new ETF? Don't forget to buy and sell the token for at least a 10% profit in a single day!

5. Market manipulation

Do you have access to news companies and also afford to hire internet trolls? If the answer is yes, you can have a permanent stable income from crypto. All you have to do is to short (or long) a crypto, than release the FUD (or shills). Did some celebrity say a bad word about that crypto sometimes in 2015? Now is the perfect time to release this as news and post on Reddit! Easy money, and perfectly legal!

6. The Cryptokitties scheme

Are you smart enough to create a fancy collectible Ethereum game? That's good, but the website ads will not bring you any money from the 200 daily users. In order to create a market of cat images, all you have to do is create hundreds of different accounts that sell cat images to each other for exorbitant prices creating the illusion of value in those Kitties. The noobs will see the trades and buy from the FOMO. Not too bad to sell cat images for $100 000!

7. The smart contract Ponzi scheme

Another scheme is to create a disguised ponzi smart contract such as POWH3D or FOMO3D. The referral system and the greed of the players will guarantee doubling the money for the first players (developers).

8. Hack a smart contract

Since "code is law" and there is no internet police to stop the other scammers, you can find poorly written contracts with money and hack it. An example is POWH contract where hackers found a vulnerability and withdrew $ 1 million of ETH, and their identity has never been revealed, as per usual.

9. The Bitconnect scam

I forgot about Bitconnect, but that scheme is a so obvious scam that it is not even disguised as a legit product. It is almost identical with the Ponzi scheme, but unlike Charles Ponzi the Bitconnect founder is enjoying his millionaire life right now, so I would certainly recommend a Bitconnect scheme vs classic Ponzi scheme.

10. The "Bitcoin Fork" scam

Make a Bitcoin fork using the code other people worked on and the Bitcoin brand, mine stealthily or premine a developer fund, and then sell your coins to the noobs that are fooled by the Bitcoin name. Bitcoin Gold, Bitcoin Diamond and dozens of other did this scheme.

11. The Stablecoin scam

Create a USD alternative crypto (aka Tether) and sell it for crypto on exchanges that cannot cash out to USD. Since the stable coins were created out of thin air, you now have free Bitcoins which can be sold for real USD because the number of USDT holders will never reach 0 and will keep growing.

12. The Bitmain scam

Own a company that holds a monopoly on cryptocurrency miners, secretly produce miners and mine with them for months/years and then put them on sale for stupid investors when a new batch of more efficient "money making machines" are ready. In that way you are able to earn money from your outdated products and keep the illusion of decentralized mining.
English is not my first language, so bee free to edit or proofread this list.
submitted by InterdisciplinaryHum to Buttcoin [link] [comments]

High Risk: changelly steals my 3.3BTC ($30k USD)

I wish to start this by saying, that I am seriously sorry for anyone
here in this sub reddit that got tricked into the same trap.
Before that, I would have never thought that an "automated" exchange trade could fail so bad
that it would even influence my own health.
For me it is like destroying all my future plans and dreams at the same time since I will never be able to
make this amount of btc back.
Like most of us here I have started using changelly this year because of the low fees and high limits.
What I did not know at this time, was that they have been keeping an close on all my transactions from the beginning this year.
I have been testing and experiencing various services, but changelly is the only one who
is not near what they appear to be. On their website they claim to be this automatic, fast, reliable and instant
robotic exchange, but in reality they are sitting right in front of it, selecting their next victims.
At the day I got scammed by them, they have first let me exchange 0.4 bitcoin to monero, a few moments later 1 bitcoin to monero and finally a few minutes later at my 3.3 bitcoin to monero exchange on 28th of march they have decided to keep my money since then.
Tomorrow I will complete 30 sleepless nights.
http://prntscr.com/jawqnw
(their website messed up the transaction history order)
These guys does not warn you or anything, you cannot simple decided to stop using their service before or after they claim your coins.
You can also not get a refund like on any other exchange. After they have decided to steal your coins into their profits, you will face impossible questions and delays. You have to imagine, after using the same wallet since last year and many of the coins already went through their exchange service, they still force you to proof that you are the "real" owner of it.
My own mistake was that I trusted them by exchanging 3.3 btc that they are stealing without a doubt.
I send it for exchanging and not for them to hold it. they are holding them as hostage against my will.
Without a warning about KYC or similar on higher amount they do not process you transaction
and force you todo an impossible KYC, which makes you feel like a real criminal.
I would like to mention that I have sent them my selfie holding my id with an reasonable explanation of the initial source.
But still all they did after they stopped responding is that they kept asking for another impossible thing or two and another selfie and continue treating me like an terrorist.
Let me tell you that Im still 18 and I wished never to have shared my face in combination
with my btc holdings. In this case you cant even complain in the future since this company, changelly, have no address or number.
One thing in this process which makes changelly a 100% NO GO for anyone should be the fact that
compared to other exchanger like shapeshift they do not return your money.
Yes, exactly after several attempts trying to get them to return it to the initial wallet,
they "hold" your crypto, which is another way of claiming them.
We all know, if you hold your crypto, you own your crypto.
"No deposit storage and instant money exchange." is what they claim in their FAQ but it is a complete lie as you know now.
Why not simple return the funds and close the accounts like any other normal service?
Why should I start revealing my family member which have gifted me 4k$ usd worth in btc back in 2015??
Stop this madness and give people the choice to quit your service!!
I am talking about no fiat involved, only crypto to crypto, gifted bitcoin back from 2015.
If this is not a trick to steal my btc what is this then? a fine robbery in front of my face!
4 total weeks of asking them to send it back should tell you their real intentions with their service.
this will not be one these reddit posts where you will see me saying "oh nice thanks they sent it back", you will all see....
I highly recommend everyone to stop using changelly now or in future, if you plan to keep your coins.
There are several working alternatives, that does not collect your private informations or steal any your hard earned coins.
Please do not forget that they have zero risk exposure and are only doing this to gain more profits for themselves.
thank you changelly for making my life worse.
submitted by dinamonokokoko to Changelly [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Countering Selfish Mining in Blockchains

arXiv:1811.09943
Date: 2018-12-17
Author(s): Muhammad Saad, Laurent Njilla, Charles Kamhoua, Aziz Mohaisen

Link to Paper


Abstract
Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block rewards. In this paper, we explore a new form of selfish mining attack that guarantees high rewards with low cost. We show the feasibility of this attack facilitated by recent developments in blockchain technology opening new attack avenues. By outlining the limitations of existing countermeasures, we highlight a need for new defense strategies to counter this attack, and leverage key system parameters in blockchain applications to propose an algorithm that enforces fair mining. We use the expected transaction confirmation height and block publishing height to detect selfish mining behavior and develop a network-wide defense mechanism to disincentivize selfish miners. Our design involves a simple modifications to transactions' data structure in order to obtain a "truth state" used to catch the selfish miners and prevent honest miners from losing block rewards.

References
[1] K. Baqer, D. Y. Huang, D. McCoy, and N. Weaver, “Stressing out: Bitcoin "stress testing",” in Financial Cryptography and Data Security - FC, Feb 2016, pp. 3–18. [Online]. Available: https://doi.org/10.1007/978-3-662-53357-4_1
[2] M. Bastiaan, “Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin,” 2015. [Online]. Available: https://goo.gl/nJsMzV
[3] K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Gollamudi, G. Gonthier, N. Kobeissi, N. Kulatova, A. Rastogi, T. Sibut-Pinote, N. Swamy, and S. Z. Béguelin, “Formal verification of smart contracts: Short paper,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), Austria, Oct. 2016, pp. 91–96.
[4] B. Community, “bitcoinfees.earn.com,” Jun 2018. [Online]. Available: https://bitcoinfees.earn.com/
[5] G. Danezis and S. Meiklejohn, “Centrally banked cryptocurrencies,” in Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2016. [Online]. Available: http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/centrally-banked-cryptocurrencies.pdf
[6] M. M. Eljazzar, M. A. Amr, S. S. Kassem, and M. Ezzat, “Merging supply chain and blockchain technologies,” Computing Research Repository (CoRR), vol. abs/1804.04149, 2018. [Online]. Available: https://goo.gl/5wMVJS
[7] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Financial Cryptography and Data Security. Springer, 2014, pp. 436–454.
[8] R. Guo, H. Shi, Q. Zhao, and D. Zheng, “Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems,” IEEE Access, vol. 6, pp. 11 676–11 686, 2018. [Online]. Available: https://doi.org/10.1109/ACCESS.2018.2801266
[9] E. Heilman, “One weird trick to stop selfish miners: Fresh bitcoins, A solution for the honest miner (poster abstract),” in Financial Cryptography and Data Security - FC Workshops Christ Church, Barbdos, Mar 2014, pp. 161–162. [Online]. Available: https://doi.org/10.1007/978-3-662-44774-1_12
[10] E. F. Jesus, V. R. L. Chicarino, C. V. N. de Albuquerque, and A. A. de A. Rocha, “A survey of how to use blockchain to secure internet of things and the stalker attack,” Security and Communication Networks, vol. 2018, pp. 9 675 050:1–9 675 050:27, 2018. [Online]. Available: https://doi.org/10.1155/2018/9675050
[11] A. E. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” IACR Cryptology ePrint Archive, vol. 2015, p. 675, 2015. [Online]. Available: http://eprint.iacr.org/2015/675
[12] Y. Kwon, D. Kim, Y. Son, E. Vasserman, and Y. Kim, “Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin,” in Proceeding of ACM CCS, Dallas, TX, Oct.–Nov. 2017, pp. 195–209. [Online]. Available: http://doi.acm.org/10.1145/3133956.3134019
[13] L. Mauri, S. Cimato, and E. Damiani, “A comparative analysis of current cryptocurrencies,” International Conference on Information Systems Security and Privacy, ICISSP , Funchal, Portugal, Jan. 2018, pp. 127–138. [Online]. Available: https://doi.org/10.5220/0006648801270138
[14] Nicehash, “Largest crypto-mining marketplace.” [Online]. Available: https://www.nicehash.com/
[15] D. Rakic, “Blockchain technology in healthcare,” in International Conference on Information and Communication Technologies for Ageing Well and e-Health, Funchal, Portugal, March 2018. [Online]. Available: https://doi.org/10.5220/0006531600130020
[16] M. Saad and A. Mohaisen, “Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions,” in IEEE Conference on Computer Communications INFOCOM Workshops, HI, USA, April 2018, pp. 704–709. [Online]. Available: https://tinyurl.com/yb4o6b8b
[17] M. Saad, M. T. Thai, and A. Mohaisen, “POSTER: deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization,” in Proceedings of Asia Conference on Computer and Communications Security, ASIACCS, Incheon, Republic of Korea, Jun 2018, pp. 809–811. [Online]. Available: https://goo.gl/4kgiCM
[18] P. K. Sharma, S. Singh, Y. Jeong, and J. H. Park, “Distblocknet: A distributed blockchains-based secure SDN architecture for iot networks,” IEEE Communications Magazine, vol. 55, no. 9, pp. 78–85, 2017. [Online]. Available: https://goo.gl/UBv1Sf
[19] S. Solat and M. Potop-Butucaru, “Zeroblock: Preventing selfish mining in bitcoin,” CoRR, vol. abs/1605.02435, 2016. [Online]. Available: http://arxiv.org/abs/1605.02435
submitted by dj-gutz to myrXiv [link] [comments]

Living through the long decline

If you've paid attention and understand how to read between the lines, you might have noticed that our society has reached its peak. Generally speaking, things aren't going to get much better than they are today. In fact, most of the luxury we've grown accustomed to will disappear. You might get faster internet speeds, your telephone might learn some new tricks, but that's about all you can realistically expect to get.
We should count our blessings in fact, if we survive through the coming decades without people dying of hunger in first world nations. In many third world nations, that prospect is already unavoidable. The UN has declared the worst humanitarian catastrophe since world war II, because numerous nations throughout Africa face unprecedented famines, brought on by political instability, eroding soils, expanding populations and a rapidly changing climate.
You might have noticed that all these gleeful predictions that the whole world would soon cease to reproduce out of its own volition because girls are sent to school have so far ceased to apply to Africa. With every new revision of its population prospects, the United Nations target for 2100 creeps up. This is all due to Africans, who simply can't be made to agree that reproduction is a 20th century relic and the future lies in taking care of cats and dogs as you spend until your mid thirties finishing your Phd.
When it comes to Europe, there are two possible courses. Europe could embark on an isolationist course, trying to fence off its borders and ensure that the people who managed to kickstart the industrial revolution manage to survive through its hangover as well. This would require a switch towards a continent dominated by far right parties that hardly have a clue in regards to the kind of climatic catastrophe we have to prepare for.
The established European parties seem unlikely to drastically change course in regards to their political position on the growing migration waves that Erdogan and other dictators now happily use to slap freebies out of them like a giant piñata. They harbor the vision that every individual is a unique person with his own human rights that have to be enforced, ignoring the fact that we can only enforce the concept of human rights we came up with ourselves because we live in an era of abundance that is now drawing to an end.
During the refugee wave of 2015, mayors in the Netherlands proclaimed that "nobody sleeps on the streets" in the Netherlands, as they hurried to find shelter for all the newcomers. Well, they're about to face much worse. If you think you can sustain a world where nobody will have to sleep on the streets, reality is about to hit you in the face like a brick wall. Even the United States has tent cities filled to the brim with regular middle class professionals who fell on bad luck.
What I would like to know is what these European politicians who nearly annihilated our civilization in 2015 plan to do in the years ahead as the refugee crisis continues to expand. In 2015, we saw a fake dichotomy between "real refugees" and "economic migrants", the prior facing death in political violence, the latter seeking opportunities abroad. The idea was that the prior deserve a ticket to paradise, whereas the latter need to pull themselves up by their bootstraps. Well, in the years ahead, you'll notice these lines begin to blur further.
The economic migrants we speak of, are the same type of people living in overpopulated nations where people are dying of hunger. Before the industrial revolution, Niger sustained around 3 million people. Today it hosts 18 million, by 2100 it's expected to house 210 million people. If we discover economic migrants fleeing our way, it will be because the local economy will consist of the exchange of mud cookies and bullets. Europe will eventually figure out that it will have to choose between becoming a giant battered women shelter for sub-Saharan Africa, or accepting that its traditional vision of human rights will have to be abandoned.
If you wonder how I can be so sure of a catastrophe that lies ahead, consider that we house 7.5 billion people today on our planet and expect to have nearly 10 billion by 2050. Meanwhile, the capacity for feeding them is shrinking. In the past 40 years, we've lost a third of our arable land to soil erosion. Historically, this has brought multiple civilizations to their end. In the years ahead, the problem will get worse. In the Middle East, 550 million people are said to live inside “the margin of what is physically possible”. Guess where they'll be headed when the mercury smashes through said margin, which could happen in a few decades.
Similarly, a billion people worldwide depend to some degree on the coral reefs for nutrition. I don't know if you've noticed how the coral reefs are doing lately, but they won't be here anymore in a few decades. The temperature rise over the past 250 years has been mostly helpful to our civilization and increased yields, but except perhaps for some very Northern latitudes, we're now moving beyond the optimal range for agriculture, at a speed that vastly exceeds the changes we've so far experienced.
It would be catastrophic enough on its own if this were the only problem we faced, as these problems have historically brought down most civilizations. We face a different situation however, as we're also dependent for our way of life on non-renewable resources. Without oil, coal and natural gas, this party comes to an end. The fact that you can theoretically produce these resources on your own through photosynthesis doesn't get you very far when you're already struggling to feed everyone.
What's necessary is that you look at these problems with some degree of realism. This will be beneficial to you yourself. You might tell yourself: "I'm better off not knowing about all of these doom scenarios." Well, that's where you would be wrong. To start with, if you have options, you'd try to move away from a city like Los Angeles and relocate instead to a city like Invercargill, New Zealand. Most of us don't have such options of course, we're stuck right where we live today. If you live in the type of place where the death of a criminal at the hands of the police is enough to start a riot, any place would be preferable to that in the years ahead, when the government will place its priorities on encouraging the survival of those who can contribute to society over those who make a living by massaging your guilt feelings.
But what if you're poor? Even then, there are advantages to knowing that business as usual will not continue. Let's say you have a seventeen year old son who's planning to go to college to study something that's supposed to start paying off by the time he's in his late forties. Well, you might wish to make it clear to him that the world thirty years from now will hardly look like the world that economists and politicians plan for. If you're sacrificing earnings now, in exchange for earnings thirty years from now that will be taxed highly because the government will need the money to keep people from starving, how does this benefit you? You might wish to recommend learning a trade to your son instead.
Similarly, if you're in your twenties today and face the prospect of retiring at the age of 72, as I do, what point is there realistically speaking to saving for retirement? Do you think I'm seriously going to save a dime so that I get to spend it by the time I'm 72? Do you think I seriously trust the money will still be there? I have a pleasant job, but I'm not putting anything away for my eventual retirement. I trust that today's generations will empty the retirement funds before I'll ever get to stake a claim to them. In addition, realistically speaking I may simply never live to be 72. Ask yourself how many years you have left until retirement and ask yourself how the world will look by then. There is hardly a difference between the poor and the middle class today, how do you expect it to look in the future?
I'm well aware that generations that preceded me have had the same thoughts. Survivalists in the 90's must have thought the world would be in flames by now. Boomers who didn't bother saving for retirement because they figured Jesus would have returned by now are starting to sweat as they realize they didn't prepare for old age. The thing is however, that the failure of a prediction doesn't prohibit its predicted outcome from being correct. I can look at a 400 pound man and predict he'll have a heart attack in the next ten years. If it turns out ten years later I was wrong, that doesn't mean his risk of suffering a heart attack has dropped to zero.
What you're going to notice sooner or later is that we have not just failed to live up to the scientific accomplishments hoped for by our ancestors, we're going to fail to sustain the accomplishments they made. Consider for example, our discovery of antibiotics. You'll notice soon enough that these antibiotics will cease to work. We're similarly reaching the point where many of the pesticides we depend on will cease to work. We have a very limited range of fungicides and we're starting to face the question of whether we want to sacrifice yields or lives.
There will be real catastrophic collapses, of the type you see predicted by angry guys with blogs. I'm sure we will see places rendered uninhabitable by nuclear disasters, dams failing that kill tens of thousands of people in first world countries and render hundreds of thousands more homeless, I'm sure we'll see lasting power outages, or even dramatic civil wars between migrants and indigenous people. What happened in Japan was supposed to be impossible too, according to nuclear engineers. "If you were sitting on top of the plants' chimney when they were venting, you should probably give up smoking to return to your former life expectancy." Remember this old line by any chance? Those are the words of Josef Oehmen, an MIT scientist and they were parroted everywhere, until they were hurriedly scrubbed from the Internet. As is surprisingly often the case, the ALL CAPS rantings by basement-dwellers with tin-foil hats were closer to the truth than the soothing words of what we imagine to be credible experts.
I could dig up similar soothing commentary here on Reddit if I wanted, but I trust that you yourself remember the time when the narrative had not yet switched to of course you shouldn't build these wonderful inventions of ours near fault lines. I expect that genetic engineering will have its own Fukushima moment eventually when it triggers the kind of irreversible damage to our ecosystem that was supposed to be impossible, which will be followed by similar science-loving intellectuals on Reddit who will insist that those responsible were simply doing it wrong. The dramatic unanimous insistence by anonymous commentators on the Internet who seem to have no dog in the fight that vaccines and genetic engineering are safe is perhaps the biggest reason there is to worry about their safety.
In all likelihood however, places that suffer a dramatic collapse of the type seen in Syria or Fukushima will be in the minority. What the majority of you will live through is a slow grind, as the type of standard of living we can sustain begins to decline. Look at the Netherlands today and you will see prominent former politicians choose euthanasia with their wives, because their health is declining and they realize how terrible conditions in our modern nursing homes are. You can expect that euthanasia is going to be one of the new normals in our society, not because people suffer deeply, but because they realize we don't have the wealth available to us to guarantee them dignified lives when they become disabled.
Another trend you'll notice is that there will be no real genuine incentive to work for a lot of you. If you're not part of the ruling class and don't have some job as a code-monkey, you will work primarily out of status concerns. In the Netherlands and many other European nations, being a single mother on welfare earns you roughly as much money as working most full-time jobs would. The main reason more people don't apply for welfare is the fact that they discourage people capable of working from receiving welfare benefits, in addition to the public humiliation commonly used to encourage people to find something to do. Unless you're part of the small elite, it won't matter much whether you spend your day in a cubicle or watching tel sell commercials instead.
So how do you cope with this prospect? Well, if the middle class will be the same as the lower class, you could strife even harder to become part of the upper class that will prove to be the main target of the lynch mob. We all dream of having a mansion where we can live by ourselves without any neighbors, but those mansions are like an advertisement board encouraging criminals to break into your house and keep you hostage. If you don't plan on having your whole family carry guns with them continually, don't bother aiming for the stars. Aristocrats are beheaded, the poor starve in famines, but average people inherit the future.
Wiser than hoping to become part of the 0.1% is to accept the prospect that lies ahead of us and trying to make the best of it. Again, if you live in the kind of city where people riot whenever a criminal is put out of his misery, your priority should lie with getting out of there. Find a community of people who look and behave similar to you and settle down there. This is bigger than just ethnicity, social class matters as well. If you work as a bearded hipster with your own microbrewery, go live around other overeducated special snowflakes. You don't want to stand out from the crowd and you don't want your neighbors to pretend not to notice when you're starving or chained to a chair by criminals.
If you're part of an ethnic minority, you'll similarly want to live around others belonging to your community. If you notice the mentality is starting to look very grim, you'll want to work on getting out of the country. Three years before the Kristallnacht, Germany implemented laws defining who's a Jew and who Jews are allowed to marry. Hindsight is 20-20, but when you notice such tendencies emerge it's time to get out, as it's only downhill from that point on.
This ties into another grim reality, which is that if you're a Syrian or a Nigerian it makes perfect rational sense to try to flee to Europe, as the third world will suffer a dramatic population contraction. Europeans however will do what makes perfect sense for them, which is to try to prohibit you from entering their continent. The simple process of group polarization will likely lead even those nationalist parties who today see themselves as moderate and rational to implement policies that would horrify us today. Humans in an era of abundance are much nicer to each other than they are in an era of scarcity.
Perhaps equally useful advice is to plan for a lifestyle that is nomadic. The work I do allows me to live essentially anywhere. If I felt the need, I could theoretically move to Eastern Europe and keep the same income while cutting my cost of living by 50%. More likely, I would try to move to an impoverished rural region of my own country. I always have some Bitcoin I can hold onto as well, in case everything goes to hell in a hand basket.
If you decided to get a mortgage, so that you could build up assets that will make you rich thirty of forty years from now, my opinion would be that your decision was not very wise. Besides the fact that real estate may very well be in a bubble, you have to understand that the government will tax anything it can tax. It can't tax off-shore bank accounts, so it will happily tax your property instead. Look at Detroit, a failed community that has the second highest property taxes in the United States, to understand what will happen. By virtue of the fact that you own property, you become a cow to milk.
One important factor to consider is that a mortgage can have the effect of tying you to a piece of land. That's perhaps the worst problem you can be dealing with if your community faces social meltdown. If I have a mortgage that's higher than the value of the property I own and I need to pay a tax when I wish to buy a different house, how will I ever leave the place I'm stuck in? In Groningen here in the Netherlands, we have thousands of people who are stuck living in houses falling apart due to earthquakes. These people have mortgages and live in houses nobody wants to buy any longer, so they're stuck living in houses they fear could collapse any moment and unable to move elsewhere.
As we continue pumping up gas, the earthquakes they suffer will merely get worse. These people would have been much better off renting a house instead. Situations like these will be very common in my country as the sea level rises. Consider this: Almere is a city roughly 5 meter beneath sea level. The soil is expected to sink by roughly another half meter by 2050, while the sea can be expected to rise by anywhere up to half a meter by then. If you plan on buying a house there, I've got a bridge to sell you with it.
The ultimate form of nomadism is perhaps to buy a boat and to live on your boat. As babyboomers watch their pensions dry up, these boats might very well become quite affordable. A boat allows you to leave, regardless of where you live. Hurricane incoming? You leave. Some "youth" got shot after robbing a gas station? Time to set sail. The local dam is about to spil over? Time to leave. Some guy in a white coat on TV announces that there's "no reason to panic"? You leave immediately. This is the best option available to you that I can imagine.
Of course in the real world, you don't control everything. There's a lot of random chance involved when it comes to your survival odds for the years ahead, although the odds are generally stacked against you if you live in Niger or Uganda and in your favor if you live in Denmark or New Zealand. It's not going to go wrong simultaneously everywhere. It should be clear that it already went wrong in Syria and Yemen. These places will soon be joined by large parts of Africa, which will trigger unprecedented waves of migrants. Places like Japan and New Zealand may very well get through the coming decades unscathed. For the rest of us, that's unlikely to be the case.
submitted by iuseupyourusernames to accountt1234 [link] [comments]

How to Earn Free Bitcoin in 2020 Live Demo🔥 Best Free ... Bitcoin earn free mining site 😱 unlimited earning tricks ... Earn Free Bitcoin Daily 0.001 A Day - Quickly Earning ... New Bitcoin Tricks Earning Site  2020  PTC  Mining ... Earn Free Bitcoin Daily 0.00055 A Day - Quickly Earning ...

It's free. All you need to start earning is a Bitcoin address for receiving payments. We don't collect any of your personal information—not even your email address. Since: 2015: Alexa Rank: 7.4k: Min Claim: 0.00000001 BTC: Max Claim: 0.00005 BTC: Revisit Duration: 15 Minutes: Ref Commission: 50%: Min Withdraw: 0.0005 BTC : Payments via: BTC Wallet/Coinpot: Earning Methods: Free Claim, Offers & Surveys: You can use the above best Bitcoin earning websites to earn Bitcoins from any country such as India, US, UK, etc.. So these are the BTC earning sites and ... Bitcoin: Steht der Ausbruch aus dem langen Seitwärtstrend kurz bevor? So sieht die Lage momentan aus 22.07.20, 13:00 onvista Learn Tips and Tricks on Free Bitcoin, Earning Bitcoin Online easily, Create bitcoin miner and earn bitcoin online. Earn Online Tricks Make Money without investments. Get-Bitcoin Earning Blockchain… Daily $1000 Austrian Peoples… Get-Digital Cryptocurrency Earning Method… Today Make money online..$100 United States Doller…

[index] [574] [30700] [804] [45109] [45803] [3373] [42496] [40048] [45406] [20451]

How to Earn Free Bitcoin in 2020 Live Demo🔥 Best Free ...

💰 My #1 Recommendation To Make Money Online - Click Here Now ️ http://LifeWithoutLimits.co 💰 Claim Your FREE Bitcoin / Crypto Here: ️ http://bit.ly/EarnFre... Coinpot. Make money online and I will teach you how to earn free bitcoins for beginners! 7 websites to claim free bitcoin fast with additional no lose tricks... 🤑🔥 New Bitcoin earning app unlimited trick Earn 200rs unlimited times fully hack trick Website link:- https://get-bitco.in/?r=kxd85yv4rm join our telegram ... WEBSITE LINK https://www.captainbitcoin.io/landing/ld9I86LVhKq WHATSAPP GROUP LINK https://chat.whatsapp.com/KvKWIWUPmanLWrtaTR4DxJ Earn Free Bitcoin Daily 0.00055 BTC A Day - Earning Trick, Earn Money Online, Without Investment, ETH Online earning Join link https://www.coinpayu.com/?r=Mu...

#