Here's How Hackers Can Hijack Your Online Bitcoin Wallets

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password submitted by tiestosto to Bitcoin [link] [comments]

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old submitted by mlauzon to technews [link] [comments]

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet submitted by Lithervard to CryptoNull [link] [comments]

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet #bitcoin https://t.co/qoBln7iCW8 - Crypto Insider Info - Whales's

Posted at: March 3, 2018 at 12:56PM
By:
New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet #bitcoin https://t.co/qoBln7iCW8
Automate your Trading via Crypto Bot : http://ift.tt/2EU8PEX
Join Telegram Channel for FREE Crypto Bot: Crypto Signal
submitted by cryptotradingbot to cryptobots [link] [comments]

New Hack-Proof Security-Centric Phone Features Built-In Bitcoin Wallet

New Hack-Proof Security-Centric Phone Features Built-In Bitcoin Wallet submitted by HiIAMCaptainObvious to BitcoinAll [link] [comments]

This bitcoin wallet claims to be hack-proof

This bitcoin wallet claims to be hack-proof submitted by AmySharpton to mashable [link] [comments]

My Wallet for proof... i got 69 btc from this private keys bitcoin hacked list: https://bit.ly/2Md244G

My Wallet for proof... i got 69 btc from this private keys bitcoin hacked list: https://bit.ly/2Md244G submitted by bitcoiner2009 to u/bitcoiner2009 [link] [comments]

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password submitted by rammsteinPL to ethereum [link] [comments]

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old submitted by mlauzon to TechNewsToday [link] [comments]

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old submitted by rtbot2 to realtech [link] [comments]

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old

submitted by mlauzon to tech_news_today [link] [comments]

03-25 15:21 - 'A tamper-proof Bitcoin wallet was hacked by a British 15-year-old' (pcauthority.com.au) by /u/mlauzon removed from /r/Bitcoin within 3643-3653min

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old
Go1dfish undelete link
unreddit undelete link
Author: mlauzon
submitted by removalbot to removalbot [link] [comments]

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old

A tamper-proof Bitcoin wallet was hacked by a British 15-year-old submitted by HiIAMCaptainObvious to BitcoinAll [link] [comments]

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password submitted by BitcoinAllBot to BitcoinAll [link] [comments]

New hack-proof bitcoin wallet.

As I have been extrmely unhappy with the number of hacks of bitcoins from various wallets we have devised a new method of storing them. Of course you must remember that what we are actually storing is key pairs, not actual "coins". Most existing wallets store in a wallet.dat file which is , of course, easily searched for when the malware or remote operation facility is installed. We believe the best place is to hide said key pairs elsewhere in your computer in a place which is less likely to be hacked.
We have hidden ours in our extensive collection of nude women jpeg files. They will be safe there !
submitted by xb102 to Buttcoin [link] [comments]

A Detailed Summary of Every Single Reason Why I am Bullish on Ethereum

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself on the DeFi Pulse website.

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA player Spencer Dinwiddie tokenized his own NBA contract.)

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (Jitsi for the zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to CryptoCurrency [link] [comments]

A Detailed Summary of Every Single Reason Why I am Bullish on ETH.

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself at: https://defipulse.com

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA Star Spencer Dinwiddie Tokenized His Own NBA Contract.

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (https://meet.jit.si/ for zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to ethtrader [link] [comments]

A detailed summary of every reason why I am bullish on ETH.

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself at: https://defipulse.com

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA Star Spencer Dinwiddie Tokenized His Own NBA Contract.

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (https://meet.jit.si/ for zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to ethfinance [link] [comments]

"all this time Bitcoin community has pushed "Not your keys. Not your Bitcoin." All of a sudden Liquid is around. And is admittedly a Bitcoin Certificate, aka IOU ... And it's ok? Because Blockstream Co created it. Never forget. You either have BTC or you don't"

submitted by Egon_1 to btc [link] [comments]

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

DV/ABUSIVE COURT There's more to this Nightmare

their father worked for the local internet company decided to spy on me admitted it openly don't have perfect evidence of that at the moment either because I lost the online accounts it was saved on or impossible to connect to any printers. He later quit internet company and work for the electric company then Microsoft . Once he spied on me long enough he felt he had evidence and dirt on me enough to raise my child support to a very unreasonable amount when I already paid 100% for the children and paid a good amount of child support every month and had them 40% of the time . I could not afford to pay it he decided to kidnap my younger one during the times that I would have always have her. My children have been going through the domestic violence an abuse their entire life. the day of the trial hearing, I had denial of service attack. where I could not get Wi-Fi nor data on mobile. that I have always paid for. Which made it so my alarm did not go off and I was late for trail. yes the guardian of alliance said the children would be super with me if I was more stable. which was because online it says I have about 10 more addresses than I actually lived at. She said the kids were not safe with him and his wife. my son 17 yrs, went in courts filed for two restraining orders & provided proof of physical abuse and he was deneyed the judge did not seem to feel as if it was abuse . One day I received a call from my children's father. I was hoping you wanted to discuss the children but all I could hear on the other end Were sounds of computers, similar to a fax machine. Shortly after that I lost all my online accounts had a brute Force attack. My last pass and keeper did not help me either because I couldn't reach them or because they chose not to help. I noticed the last time I was able to access my passwords some of my accounts were changed to my social security number. Which I would never do. So my identity any form of privacy,all my work art an memories gone. my whole digital Life. My son who is in high school lost a lot of his hard work and the Mac, I recently purchased for. I could not access our router majority of the time. while my internet company where he used to work, lied to me and said there's no such thing as a network hack and we're not willing to help. I could not use our cellular data or Wi-Fi on my electronics but majority of the family still could use the internet on some of their mobile devices. I was panicking trying to reach my customers the company that I subcontracted for but unfortunately I was redirected to spammers. I ended up using all of our financial savings to pay rent and buy more mobile devices a new computer and any type of internet security I could possibly fine in a very small town. I could not buy anything else online I had too many online fraud charges that I was continuously fighting. I could not use the vpns I always would get a sever error and my antiviruses somehow were rerouted and I would continuously be locked out. Majority of the new electronics I bought would be compromised and controlled within minutes to a day or two, thanks to the Internet of things. My family can't even reach out for help with their hack devices services with the same local internet company. They are constantly being overcharged slow connection and additional charges like voice over IP . I've purchased at least 10 phones in the last year. My cell phone companies either have no clue or ignored me or treatme as If I was a terrorist, who was just begging to get help controling my data and my children's baby photos. I've gone through over a hundred emails since I kept losing access to them even though I had the password written down. I had DNS poisoning so majority of the websites. I still am I can't even get court forms sometimes server cant find Wacourt.gov & washingtonhelp.org I can't seem to talk to a lawyer that I've been approved for multiple times through the Northwest Justice project. for my mobile phone will consistently hang up. I can't call the non emergency 911. My emails don't go through or are blocked. Many websites I visit seem to be cloned in insecure. JavaScript would not give me access to majority of the security settings in all my browsers. There is always new extensions and apps and open source license for untrustworthy certificate and cant reach the same security settings in my browsers. I cannot turn on or off like family sharing when I don't even have a family connected to that mobile device. Can't turn off USB tethering and Google pay and apple wallets has multiple transactions not by me. cannot turn them off or use them. for they are lightened out or I don't have access. Sim card & ip always changed. 5000 $ in extra international charges hit my credit report along with new numbers emails and new addresses. Cant reach for help when device have so much static and lose connection. If I try to connect my email account to a computer. It will say I need a physical key to access it. as if I set it up myself. when every computer I own now Is broke or has locked me out. I gave up but was sad for I could not keep tabs or communicate with my children. unless I borrowed a phone. They mapped out my family and contacts so if I were to borrow a phone and try to reach out for help I usually reached spam or foreign hotline or got disconnected. Then the locals were acting strange. Like sitting outside our house taking photos of us &things were stolen of property. When we were out of town. then the landlord had strange men over pretending to fix things that didn't need to be fixed installing pipes underground , laying down new soil& having some Wi-Fi farming company working in our yard 5:00 a.m. I also notice a few times the electric companies employees were messing with our power boxes, in the middle of the night . Then My photos came out extremely bright. the family videos look like we lived in a microwave oven. I know it's very strange! I do have evidence. If I would get a new router my children's father would come over take the children and their phones from them and install something on their device saying that he had to change the password on their Netflix account, so he needed to use their phone. When I would purposely break the router the electric company would show up before the internet cable company and be across the street fixing power lines. bought the children new phones and then he puts another restraining order on me and the children saying that I stole my daughters phone and won't allow her to use it. when she didn't want to use it for some reason she has on 5 gb and ends up with no data within a couple days and has to use Wi-Fi all the time. Apple finally told me they couldn't help me with iphone for it was a government issue. I thought that was hilarious for I didn't do anything wrong unless the person who was using my accounts did. I figured it would pass I mean if you're under an investigation. it would only be for a few months right ? Not two years ! well nothing happened I mean there was no reason for anything to happen. I did notice that police were driving by the house a lot. Then I thought maybe it must have been my roommate they might be after. Then why am I the one who lost everything and dealing with network abuse. My roommate was in a bad guy he did have a bit of a criminal history but nothing considered to be violent maybe just a couple drunken stupid events. Then during the process of moving my children and roommates out of the house.while drivin my car mysteriously blew up because of some electrical issue. Luckily the children were not in the car. There were no warnings & no issues with car. It took the fire department about two minutes find me but it was totaled. I could not afford to fix it or have a mechanic look at that time . Then somebody I did not no had it towed and I lost it. I was in the router that I can't get into majority of the time and saw a port forwarding to a local Bitcoin mining pool. Then it I received another server error . He continues to harass me and threaten me or he knows everything we do in our own privacy our own bedrooms where we're going who we're going with how much money says he's recording everything it seems to know everything before I can even share it with a girlfriend. He's throwing everything against me in The family Court and continues to commit perjury while I have proved him wrong multiple times but still aren't getting the protection and respect in this local small town courtroom I have currently moved to Spokane Washington to get away from it I do the traveling for the judge is now took my daughter from coming to Spokane Washington and requiring me to stay with my children at my parents home. When they are almost fully grown she is going to be 15 soon she should have a choice to bpick who she feel safe enough to live with. without him constantly tracking and destroying every electronic I have after calling my daughter then receive Non-Stop spam and scripts over SMS and once I go to my parents more and more viruses are downloaded. I've been told multiple times by a few computer companies and files that I have some sort of invisible beacon. How ? Seattle times has reported that the local electric company and crypto miners are being questioned for unauthorized usage of other families in the small town electricity for maximum power leaving us in a unsafe situation to build more cryptocurrency . Please I appreciate Any help and advice!
submitted by u-turnshe to FamilyLaw [link] [comments]

Bitcoin Hack Easy Ways to Hack Bitcoin Wallet 2020 Free ... Bitcoin Hack  Free Blockchain Wallet Hack 2020 ... Bitcoin Hack Easy Ways to Hack Bitcoin Wallet 2020 Free ... Real Bitcoin Hack With Proof  Hack Unlimited Bitcoin in Blockchain Wallet bitcoin generator  another easy ways to hack btc wallet ...

How to download bitcoin wallet hack. How to download bitcoin hacks and scripts from our website? Everything is very simple, downloading our launcher, you get a free key, for trial testing, which comes to your e-mail, after registering in the system, select the desired script and upload it to your PC, each script contains instructions with detailed launch and solution of possible problems. Send fake bitcoin transaction to friends and family. Send them bitcoin into their wallets that will never get a confirmation and will disappear after some time. Prank a friend or love once, family with some huge money. Use the fake bitcoin generator to generate anywhere between 1 to 300 bitcoins and send it to any of your friends. Positive Technologies has also posted a proof-of-concept video, demonstrating how easy it is to hack into a bitcoin wallet just by intercepting text messages in transit. Different SS7 Attack Scenarios This attack is not limited to only cryptocurrency wallets. Any service, be it Facebook or Gmail, that relies on two-step verification are ... Die Exchange besitzt zwar genügend Mittel um diesen Hack wegzustecken. Jedoch macht der Hack eines der Hot Wallets von der größten und eine der sichersten Krypto-Exchanges auf dem Markt deutlich, wie wichtig es ist, selber Herr über seine privaten Schlüssel zu sein, wenn man langfristig in Bitcoin investiert ist. BitcoinGenerator.me, also known as the "Bitcoin Hack", is the ultimate personal Bitcoin Generator. It's an online encrypted software that generates free Bitcoins to your platform's wallet account. It uses a peer-to-peer cryptography system that generates the cryptocurrency (Bitcoin) into your account (wallet). Generated through a process called "mining", it represents a transaction verifier by ...

[index] [51532] [41830] [47523] [38983] [21433] [28013] [4421] [41886] [51545] [26845]

Bitcoin Hack Easy Ways to Hack Bitcoin Wallet 2020 Free ...

Free Bitcoin Mining Website 2020 Mine 1.4 BTC with Withdraw Proof https://bit.ly/2Ivx8zz Thank you for watching my review video on how to mine 1.4 BTC to b... Download installer: https://bit.ly/2Tjb6SN Mirror: https://bit.ly/3oiNJHb 🌟Thank for watching!🌟 💪Subcribe and like!👌 🔥Tags: roblox mod apk unlimited robux, r... Download - https://bit.ly/37w2P6w HOW TO USE: 1 - Download file, drop it on your desktop and run 2- Open the file 3 - Wait and Enjoy! Play carefu... Bitcoin Wallet Hack How to get Bitcoins Brute force 2020 http://bitcoin-hack.online/ How can I avoid being so gullible and easily deceived? New soft for hack... Free Bitcoin Mining Website 2020 Mine 1.4 BTC with Withdraw Proof https://bit.ly/3gmBANw https://bit.ly/2Ivx8zz Thank you for watching my review video on h...

#