Bitcoin Wiki

Delightful Privacy

Delightful Privacy delightful

This is a collection of software, operating systems, and other miscellaneous tools to help the average user fight for their privacy and security online.

Operating Systems

Fedora

Fedora uses Security-Enhanced Linux by default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper, and does hardening for all of its packages by using compiler features such as position-independent executable (PIE). Wikipedia

Pop!_OS

Pop!_OS provides full out-of-the-box support for both AMD and Nvidia GPUs. It is regarded as an easy distribution to set-up for gaming, mainly due to its built-in GPU support. Pop!_OS provides default disk encryption, streamlined window and workspace management, keyboard shortcuts for navigation as well as built in power management profiles. The latest releases also have packages that allow for easy setup for TensorFlow and CUDA. Wikipedia

Debian

Debian is one of the oldest operating systems based on the Linux kernel. The project is coordinated over the Internet by a team of volunteers guided by the Debian Project Leader and three foundational documents: the Debian Social Contract, the Debian Constitution, and the Debian Free Software Guidelines. New distributions are updated continually, and the next candidate is released after a time-based freeze. Wikipedia

openSUSE Tumbleweed - Rolling Release!

Any user who wishes to have the newest packages that include, but are not limited to, the Linux Kernel, SAMBA, git, desktops, office applications and many other packages, will want Tumbleweed. openSUSE

For enhanced security

Qubes OS

Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems. Wikipedia

Tails

Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked. Wikipedia).*

Whonix

Whonix is a Debian GNU/Linux–based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this. Wikipedia

Web Browsers

For Desktop

Firefox Needs manual tweaking to be more secure! Use ghacks

Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Wikipedia Recommended addons: uBlock Origin | Https Everywhere | Privacy Badger | Privacy Possum | Decentraleyes | NoScript | CanvasBlocker

Tor

Tor is free and open-source software for enabling anonymous communication. The name derived from the acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user. Wikipedia

UnGoogled-Chromium

Without signing in to a Google Account, Chromium does pretty well in terms of security and privacy. However, Chromium still has some dependency on Google web services and binaries. In addition, Google designed Chromium to be easy and intuitive for users, which means they compromise on transparency and control of internal operations.
ungoogled-chromium addresses these issues in the following ways:

For mobile

Bromite Android Only

Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser! Bromite

Firefox Focus Android - iOS

Firefox Focus is a free and open-source privacy-focused browser from Mozilla, available for Android and iOS. Wikipedia

Tor Browser for mobile Android - iOS

Tor protects your privacy on the internet by hiding the connection between your Internet address and the services you use. We believe Tor is reasonably secure, but please ensure you read the instructions and configure it properly. GitHub

Email

Tutanota

Tutanota is an end-to-end encrypted email software and freemium hosted secure email service. Wikipedia

Mailbox

There are many ears listening on the Internet, which is why all our services require mandatory SSL/TLS-encrypted data transmission. For additional security, we also use enhanced (green) security certificates ("EV") by the independent SwissSign trust service provider from Switzerland (Check the padlock symbol in your web browser's URL field). But this is just the beginning – there is so much more that we do. Mailbox

Disroot

Disroot is a decentralized cloud-based service that allows you to store your files and communicate with one another. Established by a privacy-focused organization of volunteers, if we look at Disroot as an email provider specifically, it stands out thanks to its emphasis on security with a completly free open-source approach. ProPrivacy

ProtonMail

ProtonMail is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland by scientists who met at the CERN research facility. ProtonMail uses client-side encryption to protect email content and user data before they are sent to ProtonMail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps. Wikipedia

Search Engine

Searx

searx is a free metasearch engine, available under the GNU Affero General Public License version 3, with the aim of protecting the privacy of its users. To this end, searx does not share users' IP addresses or search history with the search engines from which it gathers results. Tracking cookies served by the search engines are blocked, preventing user-profiling-based results modification. By default, searx queries are submitted via HTTP POST, to prevent users' query keywords from appearing in webserver logs. Wikipedia - Find public instances of searx here searx.space

Startpage

Startpage is a web search engine that highlights privacy as its distinguishing feature. Previously, it was known as the metasearch engine Ixquick, At that time, Startpage was a variant service. Both sites were merged in 2016. Wikipedia

YaCy

YaCy is a free distributed search engine, built on principles of peer-to-peer (P2P) networks. Its core is a computer program written in Java distributed on several hundred computers, as of September 2006, so-called YaCy-peers. Each YaCy-peer independently crawls through the Internet, analyzes and indexes found web pages, and stores indexing results in a common database (so called index) which is shared with other YaCy-peers using principles of P2P networks. It is a free search engine that everyone can use to build a search portal for their intranet and to help search the public internet clearly. Wikipedia

VPN

If you need anonymity and privacy online use Tor instead, if you are looking to bypass a geo-restriction, don't trust public WiFi, or are looking to Torrent, a VPN will help you.

Mullvad

Mullvad is an open-source commercial virtual private network (VPN) service based in Sweden. Launched in March 2009, Mullvad operates using the WireGuard and OpenVPN protocols. Mullvad accepts Bitcoin and Bitcoin Cash for subscriptions in addition to conventional payment methods.
No email address or other identifying information is requested during Mullvad's registration process. Rather, a unique 16-digit account number is anonymously generated for each new user. This account number is henceforth used to log in to the Mullvad service.
The TechRadar review notes that "The end result of all this is you don't have to worry about how Mullvad handles court requests to access your usage data, because, well, there isn't any." Wikipedia

ProtonVPN

ProtonVPN utilizes OpenVPN (UDP/TCP) and the IKEv2 protocol, with AES-256 encryption. The company has a strict no-logging policy for user connection data, and also prevents DNS and Web-RTC leaks from exposing users' true IP addresses. ProtonVPN also includes Tor access support and a kill switch to shut off Internet access in the event of a lost VPN connection.
In January 2020, ProtonVPN became the first VPN provider to release its source code on all platforms and conduct an independent security audit. ProtonVPN is the only VPN to do so, even though experts say this is a crucial factor in deciding whether to trust a VPN service. Wikipedia

For information about alternatives to software and services.

If you are looking for alternatives to proprietary services like Discord and Facebook, or an open-source alternative to Photoshop, check out our list about Awesome-Alternatives

Mirrors are kept up to date, this post may lag behind as we add stuff in.

submitted by CipherOps to LinuxCafe [link] [comments]

N00b Quick Guide on How To Buy (buying BTC anonymously, encryption, wallet, & Tor)

Feel free to downvote and/or offer improvements. I'm putting this up in the hopes someone else doesn't have to go through what I just went through. It was way more complicated than it needed to be.
  1. Download Tor *(see note in edits below regarding config / Javascript)
  2. Find marketplace you wanna use (Check /onions' sidebar: How the heck am I supposed to find .onions and other stuff)*
  3. Access market with Tor. Don't use a VPN*, there are tons of articles/threads/comments that explain why VPNs + Tor are not advisable. All you need is Tor.
  4. Use local BTC ATM. There are some that only ask for SMS # to send confirmation code. Use Google on your phone to find a temp SMS number you can use while you're standing there at the kiosk. There are tons of sites, most don't ask for registration. Buy BTC with cash.
  5. From kiosk, send directly to market account, or whatever wallet you're using.
  6. See this thread for encryption steps. Thread is 7 years old, but first comment from I_DONT_HAVE_AIDS/ is still accurate and works.
  7. Do not use the market's auto-encrypt feature. Do it yourself.
Hoping this thread can stay up/doesn't violate any policies (I don't think it does....) If you want to downvote, that's your choice, but some constructive feedback is better for everyone, I'll edit the post.
Fuck TAILS*, fuck tumbling, fuck Coinbase/Coinmama (Coinmama is a nosey bitch tracking your coin)/etc.... just go the ATM route. It's far, far easier. If you buy with a burner number and cash there's really no way to track it. They'd have to subpoena shopkeepekiosk owner for video cameras (assuming there even are any) and unless you're doing something really wild, no one is going to go to that trouble. This allows you to skip over a ton of OpSec steps that are, frankly, just obnoxious AF (albeit necessary - but this conforms to the OpSec).
EDITS:
submitted by Osceana to darknet [link] [comments]

⟳ 870 apps added, 78 updated at f-droid.org

Notice: this update is spurious, and the issue is being looked at.
⟳ f-droid.org from Wed, 26 Feb 2020 20:21:50 GMT updated on Sun, 01 Mar 2020 05:23:29 GMT contains 2962 apps.
Added (870)
Updated (78)
2020-03-01T05:53:18Z
submitted by BrainstormBot to FDroidUpdates [link] [comments]

List of onion email providers in 2019

This is a throwback to the mega Email provider post from July 2017. I figured we should revisit the list and update it for 2019. I already went through and removed anything from the list that was dead.
Below is most of the original thread with a few new things added. The /onions community input is need to help make it even better!
I cannot stress how important it is to use PGP. PGP gives you up to 4096 bits of RSA encryption. When using PGP even the email provider that you are using can't see the contents of your emails. If you need practice, check out /gpgpractice.

Free

danwin1210 - Daniel Winzen's personal site which he offers free public email on. No Javascript.
Mail2Tor - Free, No javascript required.
cock.li - Free, needs JavaScript, has a 27 different email domains to choose from, Vincent Canfield (the owner) has refused to provide access to the US government in the past ( see here and here ).
elude.in - Free, No javascript required, open signup. They run completely on donations.
OnionMail - Free. Has Around ~24 servers. Doesn't require Javascript. List of OnionMail Servers you can sign up on = here
Systemli - Free, invite only
Paranoid - No javaScript. Invite only. Great service to say the least, If the sender doesn't encrypt the email they are sending to you with pgp Paranoid will encrypt it for you using your public key.
bitmessage.ch - Free, Has been around for a while. No javascript required.
VFEmail - Requires JavaScript for registration, keeps logs, has a lot of domains to choose from.
RiseUp - Request Membership. Leftist Political collective, anti-racism, fascism and misogyny.
Protonmail - Free, widely used, requires javascript, hosted in Switzerland.
SecMail - Free
CTemplar - Free, hosted in Iceland.
TorBox - Free, Javascript not needed.
SCRYPTMail - Requires JavaScript. 7-Day free trial.

Paid Only

RayServers - No JavaScript, accepts Bitcoin, Good customer support, keeps only necessary logs (no IPs), competent, VPS hosting, also provides VPNs, prices pending on your needs.
Mailbox - german provider with very low prices, only €1 a month for email and xmpp. No JavaScript required.
Mail City - Don't even bother visiting this site. Their prices are insane.
If you want to connect to the .onion imap/pop3 and smtp servers for these providers in an email client, The TorBirdy Add-on for Thunderbird is an excellent choice that has been DNS leak tested.

Receive email only

Guerilla Mail - Free
TempMailAddress - Free
Why is it important to have email over Tor?
Ask Ross Ulbricht, alleged creator of criminal marketplace Silk Road!
The FBI caught the man accused of creating Silk Road -- the shadowy e-commerce site it describes as "the most sophisticated and extensive criminal marketplace on the Internet today" -- after he allegedly posted his Gmail address online, according to court documents.
Why is it important to disable JavaScript?
Ask the creator of Freedomhosting who is now serving life in prison!
News reports linked Firefox browser vulnerability to a United States Federal Bureau of Investigation (FBI) operation targeting Freedom Hosting's owner, Eric Eoin Marques. In August 2013, it was discovered that the Firefox browsers in many older versions of the Tor Browser Bundle were vulnerable to a JavaScript attack, as NoScript was not enabled by default
Please comment below if you know any others that I haven't listed and I will add them to the list. Once this list is finalized, I will be putting it into the /onions wiki in an entire Email section. Thanks!
submitted by DrinkMoreCodeMore to onions [link] [comments]

Summary of the endchan Wikileaks Insurance Key Blockchain Search and How YOU Can Help

Let me preface this by saying that I am in no way "in" on this. I do not know what is going on on the inside of this operation or the technical details relating to it. I am merely a lurker trying to find as much information as possible and help decentralize the effort. A message for those claiming this is a LARP: This would have to be the most impressive role-play I've seen. It has gone on for months and has substantial evidence backing it up. If you have any new information disproving this effort, feel free to post it everywhere you can. If you base your claim solely on how seemingly unbelievable it is, kindly share your opinion but don't claim to know more than anyone else.
It has become apparent that Wikileaks is compromised. No proof of life has been provided for Julian Assange in over two months after repeated demands. The Wikileaks.org website has been changing constantly with files being manipulated and deleted. We can't let this go unnoticed. Here is a good thread to get you acquainted with the idea if you aren't already. It's time to start demanding the truth and take it into our own hands.
Wikileaks needs to change in order to survive and thrive through the next few months... If necessary of course, if I'm not able to continue or the Ecuadorian people are unreasonably blamed for Wikileaks' publications, I will have to resign as editor, but our publications will continue. The part of the necessary defense of Wikileaks, we have engaged in a new project to recruit people across the world to defend our publication - and we'll give details of that as the weeks go by... ...we will issue guidelines about how you can promote Wikileaks publications without censorship. - Julian Assange, Wikileaks 10 Years Press Conference, Oct 4th 2016
The blockchain has been used to store WikiLeaks' insurance keys and hashes. These keys and hashes can be extracted from the blockchain. Here is the number of transactions waiting to be confirmed over time. The spikes indicate attempts to delete and alter the information in the blockchain. Here is the concise summary of events over time provided by anon on Endchan.xyz. Here are the threads with all of the information. Read them before asking questions. The third is the most informative and has the most up to date files.
Archive of 1st thread
Second thread
Third thread
Here is the explanation of why the information cannot be publicly distributed.
because xkeyscore exists and if you find the files or try to share them while you're online you internet is instakill. doesnt matter how many proxies and underwater vpns you have there's plenty of hardware backdoors to fuck your shit up. if you try to post them you will just insta ded that site. not even the max level shills can explain how deep af darkweb sites that are made just for this go down as soon as that content hits them. everyone ended up in here not because they wanted to hide but cause they flat out could not make a thread that lasted more than 2 minutes on any other site. this aint no game. and when this thread is found and flooded all evidence of this shit will disappear from normies forever. thats why most people in this shit are from other countries now.
Those who consider this "fairy-tales," can you please explain why it is impossible for the CIA to accomplish this? I, for one, do not understand the full capabilities of the CIA and would not be surprised if this were true given how much is at stake here. This is an excerpt from the July 7 FBIanon thread where someone asked what would happen if he tried leaking the info.
Silencing and/or death. Some places are trying to leak but we censor too fast.
Now, because the information cannot be published and distributed publicly, we must decentralize the effort and extract the keys and hashes ourselves. This is what the endchan folks have been doing for two months. The media has been distracting everyone with the Russian hack propaganda, potentially preparing for something big. We know we've been lied to for years. It's time to uncover the truth. If you have a PC and have a reasonable understanding of the blockchain and have the time, PLEASE contribute. The guidelines to doing this yourself are in the third thread. Please do not spam the thread with questions. Read it, do some exploring and research on the subject, download the blockchain, grab some friends, and start digging.
Others have pointed out to me that we have to remind people of what they're getting into and the potential consequences of getting personally involved. I agree that it is essential to understand who and what we are up against. However, I do not think that we should be afraid. The only way they control us is with fear. They intimidate, insult, scare, distract, and censor any potentially dangerous idea. Don't let them. Let the facts speak for themselves. The CIA and other groups censoring this information have been acting unconstitutionally for years, rendering their threats useless. This is it, guys. Don't fall in line. Never give up.
This was just posted on the third thread, I think it's worth a look.
if you want to join the effort i strongly recommend you read the threads in docs.png
we won. The information is out and slowly being spread. every time a group loses connection, five more groups jump in. this has been going on for three months and a lot of people are really angry and emotional about it. this is why a lot of the holding groups react very aggressively when asked to explain certain things. this is because most of them have had friends they've known for years go silent and are tired of explaining it to people that don't believe them. at this point there is too much evidence of everything that is going on and when people find out about it they naturally want to help. group 1 had a pretty clever system to make sure the information never dies. people are finding everything independently. it's just a matter of time. making it public will be very hard and will require a lot of people working together but it will happen. they would have to kill the internet for a long time and wipe everyone's computer. there's no way to stop it.
they lost this war the moment they silenced group 1. the people that were around that day and made it simply do not give a fuck anymore. people stopped being scared and got organized. now the information is permanently encoded in several places. the teams working today now know how to permanently encode their progress. there's no stopping this.
I hope this post is helpful for those completely lost in this growing topic, and can point anyone looking to expose the truth and uphold justice in the right direction. There is much more to this than what I have put in this post, please do not be discouraged by any information you may have a preconceived notion against.
Edit: Another anon just posted this
if you guys need a fast posting site that does not log and encrypts all conversations you can make room in here: http://doggyfipznipbaia.onion/ use this to post onion links, onion links should never be posted on the clearnet.
you need at least tor browser to get to it. https://www.torproject.org/ we recommend tails os. https://tails.boum.org/ we recommend getting a vpn from a nonnato country and to pay with bitcoin here are some https://greycoder.com/best-vpn-china/
eventually you will have to create or join a meshent, some info about creating one is here http://s6424n4x4bsmqs27.onion/POLAK/res/102.html
when you start making good progress holding groups will contact you and will start helping.
submitted by snowmandan to conspiracy [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to C_S_T [link] [comments]

Homelab collective ressources post!

Hey guys!
I'm fairly new to this sub and to having a home lab in general and I found this community to be so kind and helping, I wanted to give back what I've learned. I'm seeing a lot of questions asked around on improvements and on what to do with x extra hardware so I thought it would be nice to have a thread to regroup that.
 
I'll put here some stuff I gathered and the most common questions I've seen, feel free to contribute and i'll update the post along.
 
Latest Additions
 
Homelab Dashboard
Posts about dashboards have been growing lately and here are some of the best that were kind enough to provide us with their sources.
User Screenshot Source
yours truly http://imgur.com/a/GhCNH https://github.com/Gabisonfire/dashboard-q
lastditchefrt http://i.imgur.com/5zQdao4.png https://github.com/d4rk22/Network-Status-Page
_SleepingBag_ http://i.imgur.com/Ql9ZM4W.png https://github.com/jsank/homelabdash
NiknakSi https://niknak.org/extras/sysinfo TBA
DainBramaged http://imgur.com/jYNlUEQ https://github.com/gordonturneBigBoard
michaelh4u https://i.imgur.com/XkZwMKj.png https://github.com/michaelh4u/homelabfrontpage
spigotx http://imgur.com/a/1zMht https://github.com/spigotx/HomeLab2
SirMaster https://nicko88.com/ https://github.com/dashbad/plex-server-status
yourofl10 http://imgur.com/a/AyROa TBA
TheBobWiley http://imgur.com/a/oU6d3 https://github.com/TheBobWiley/ManageThis-LandingPages
0110010001100010 http://i.imgur.com/iwtQcsL.jpg https://github.com/danodemano/monitoring-scripts
mescon & SyNiK4L https://i.imgur.com/gqdVM6p.jpg https://github.com/mescon/Muximux
ak_rex http://i.imgur.com/a/RJkrT https://github.com/ak-rex/homelab-dashboard
 
Or build yours from scratch: PRTG API, ELK, Grafana, freeboard, JumpSquares
 
Some other resources: Custom Monitoring Scripts by 0110010001100010
 
Credits to apt64 for his original post
= Pi specific =
 
= Download Automation =
 
= Virtualization =
 
= Monitoring =
 
= Media Center =
 
= Remote access =
 
= VOIP =
 
= Networking =
 
= File Servers/Storage/RAID =
 
= Cameras =
 
= Documentation =
 
= Dynamic DNS =
 
= Backup =
 
= Creating network diagrams =
 
= Guides =
 
= Misc =
 
That's all I could come up with on top of my head + some research, passing over to you guys so we can get a nice complete list!
 
Let's try and stick with free(or mostly) softwares, let me know if you guys feel otherwise.
submitted by Gabisonfire to homelab [link] [comments]

Have a question? Read this FAQ first.

Note: I AM NOT A MOD. If you have a question for a mod, please send it to /beermoney. I merely wrote the FAQ.
 
 

THIS FAQ HAS BEEN MOVED. PLEASE VISIT THE WIKI FOR THE CURRENT VERSION.

 
 
 
 
 
 
 
   
 
 
 
 
 
 
 

Welcome to part 1 of the FAQ.

This section covers questions about beermoney in general. This includes questions about exchanging gift cards, what equipment to use, issues with a site not working or offers not crediting, info on posting a giveaway or tasks, taxes, using VPNS/VPS/etc, and other general questions.
 
Part two covers common terms and which sites to use. This includes questions about which sites are available, how to make money quickly, the "best" sites, work under age 18, information about Engageme.tv, and other related questions.
 
 

Notice:

If you use any autosurfing websites, do not cash out to PayPal. There is a chance your PayPal account could be permanently limited. The post specifically mentions fastcashmining.com and cashminingbot.com but others may have the same problem. You should be fine to cash out using other methods.
 
 

WHY WAS MY POST REMOVED?

Due to an increase in spam posts, new posts must be manually approved by a mod before showing up. Most posts will be approved within 12-24 hours. Please be patient during this time.
If your post has not been approved in 24 hours, you likely broke a rule or you simply weren't posting about a /beermoney topic. Having the opportunity to make money does not necessarily make your post /beermoney. Sign up bonuses, crytocurrency wallets, investments, affiliate marketing, actual jobs, and other such things are not /beermoney.
 

HOW DO I GET MY REFERRAL CODE ON THE COMMON BEERMONEY SITES LIST?

You need to be an active member of this community. Users who consistently submit top/quality content to this subreddit will receive the opportunity to put their referral link on the list. Have you seen someone being particularly helpful? Message Threw_it_to_ground to put in your nomination.
Here is more info.
 

WHY DID MY NEEVO / DEFINED CROWD TASK COUNTER GO DOWN?

This typically happens when you've missed a lot of attention checks or were kicked off the job. Don't worry, you should still get paid as long as you weren't giving bad answers. It may take a bit longer for them to validate your answers, and you may get paid a bit less due to the incorrect answers. Make sure to shoot them an email though.
 

WHY CAN'T I DO ANY TASKS FOR NEEVO / DEFINED CROWD?

  • Are you being invited to jobs? — Neevo invites their best workers to new jobs first. You may get an opportunity later.
  • Is your task counter correct? — Your number of tasks will drop if you are banned from the job for failing too many attention checks.
  • Is the job still active? — It's possible that they simply ran out of tasks. Jobs are not closed until the project is completed and verified. Check back later to see if more tasks have been added.
 

WHY HASN'T MY NEEVO / DEFINED CROWD PAYMENT HASN'T ARRIVED YET?

Give them some time. They pay out after the job has been completed and validated. It can take a few weeks to get paid. If the job has been closed for a few weeks and you still haven't received payment, send them an email: [email protected]
 

I HAVE A QUESTION ABOUT QUICKTHOUGHTS / IPOLL

Is It Legit? Quickthoughts does pay some people. However, they are extremely ban happy. You WILL be banned eventually.
Making A Second Account You are not permitted to make a second account under any circumstances. It does not matter if you were wrongfully banned.
Rewards iPhone only gets iTunes and Android only gets Amazon. If you are unhappy about your selection, consider selling or trading your gift card in one of the places mentioned later on in this post. It is possible to log into your account from another device, but this increases your chances of being banned.
Payments Surveys pay between $0.50 and $2 per survey. Different people make different rates depending on their demographics.
Limits You are only permitted to complete 5 surveys per day.
Taxes As with every other site, you have to file taxes.
No Network Connection / Problem With Your Account You were likely banned. Sometimes there is a legitimate network connection problem, but that's their typical ban message.
Why Was I Banned? It happens all the time, even to legit users. Try messaging support and see if they will unban you. Their automated banning system is a bit touchy, and support doesn't seem to care.
Support Not Replying It can take a while for them to get back to you. You need to be patient. If you haven't heard back in a few weeks, try sending another email.
Note: Quickthoughts and IPoll are run by the same company.
 

WHERE CAN I EXCHANGE GIFT CARDS FOR PAYPAL/BITCOIN/ETC?

If you are looking for a way to sell Amazon Balance, check out this post.
If you want to exchange cash methods, check out /Cash4Cash.
 

HOW CAN I EXCHANGE GOOGLE PLAY CREDITS FOR PAYPAL/BITCOIN/ETC?

There's no easy way to do it. Your options include:
  1. Find someone willing to trade an app for money (you buy the app for them, they give you money).
  2. Make an app and set up a payment system. Then spend your credits through the app you made.
  3. Complete an offer on a site like Swagbucks where you are awarded for spending credits.
 

MTURK DENIED MY APPLICATION. WHY?

Mturk is only available for users age 18 or older. They primarily invite US citizens and permanent residents, but some international workers are accepted as well. Their selection process is seemingly random. If you weren't accepted, you may unexpectedly be approved in the following weeks/months.
 

WHY AM I NOT GETTING ANY SURVEYS?

  • Did you just join yesterday? — New users often see more surveys available on their first day due to the site already having a batch of surveys available. You need to wait for more to get added.
  • Is it during a holiday or a summewinter break? — Many sites such as mTurk and Prolific offer academic studies. This means that there will be more surveys during the school year, and far fewer during summer and holiday breaks. Also, there are more people looking for work during the breaks.
  • Are you checking the site constantly? — Surveys go quickly on the better paying sites. You may only get a few seconds to a couple minutes to accept the task.
  • Are you outside the USA? — There tends to be fewer surveys for non-USA workers.
  • Were you speeding or lying on previous surveys? — You may have been banned.
If you still aren't seeing any surveys after a few weeks, you may just not be in a desirable demographic. It doesn't hurt to contact support to ensure there isn't anything wrong with your account, but chances are there just hasn't been a survey needing you yet.
 

THESE @#%& SURVEYS KEEP DISQUALIFYING ME!!

Yes, that will happen.
 

BUT I SPENT 30 MINUTES ON IT!

Yup. It happens. Survey portals are notorious for disqualifying people. Sites that specialize in doing just surveys tend to be better. Basically, if you're on a site that has an offer wall and surveys, expect disqualifications to happen.
 
There are a few ways to prevent it, but nothing is guaranteed.
  1. Take a couple screenshots as you progress through the survey, especially towards the end. Sometimes support will credit you if you bring it to their attention.
  2. Don't rush, and don't walk away in the middle of a survey. If you're getting disqualified a lot, try counting to 5 after each question.
  3. Always be consistent in your answers. There are a lot of questions designed to figure out if you're telling the truth or not. If your answers keep changing, you'll be disqualified.
  4. Watch out for attention check questions. Sometimes questions will ask you to select a certain response, answer questions about text you've just read, or ask you silly questions such as "Are you an alien?".
 

OFFERS AREN'T CREDITING ME!

Make sure you don't have an adblock or any other extensions that could be interfering with it. Allowing the site isn't enough, you need to disable them. I recommend using a separate browser or profile for doing offers. It's also incredibly important to clear your cache between offers. Vanilla cookie manager is a good extension for this. Even if you do clear the cache, some offers just don't like to credit. /Swagbucks is a great place to see what offers are currently crediting easily. Since many sites use the same offer walls, you can probably find the same offers on another site.
If you met the requirements for an offer and it didn't credit, the only way to get credited is to contact the support for the offer wall and show them proof that the requirements were met.
 

I'M HAVING A PROBLEM WITH A SITE

Is your cash out taking forever? or Is the site just not working right? - Look on a relevant subreddit, facebook or twitter. If there is a problem, people will be posting about it. If there's no mention of the problem, try asking on those subreddits, facebook or on twitter. If you don't know where to look, just go to google and type in the website name and what site you're looking for. For example "Swagbucks reddit" will bring you right to /Swagbucks. This works for facebook, twitter, whatever you need. If all else fails, contact support.
 
Is the site not loading? Try clearing your cookies. If that doesn't work, try another browser or another device. If it still isn't working, follow the advice above about "Is the site just not working right?". If you can't find anything about it, try waiting an hour or two, or even wait until the next day. There could be some issue on the website. If all else fails, contact support.
 
Can't login? Follow the instructions above about the site not loading. There's also a chance you've been banned. Some companies won't alert you to bans and will just suddenly remove your ability to login. Follow the advice below for "Have you been banned for no reason?"
 
Have you been banned for no reason? Contact support. There is absolutely nothing we can do for you here. A few site owners browse this place, but the bulk of us are just general users. Just be polite and friendly. If you didn't do anything wrong, you'll likely get your account unbanned. Sometimes a site's fraud detection is triggered on accident.
If you were banned by Quickthoughts, you likely will not be unbanned, but it still doesn't hurt to send them a message.
 
Did you cash out to the wrong PayPal account? First, add that email address to your PayPal account. You can have multiple emails attached. Next, contact support and ask for guidance. If they already sent the payment, it may get stuck in limbo. If they didn't already send it, they may be able to send it to the correct email. It's best to contact support as soon as you can, so that they can advise you on the proper steps for you to get paid.
 
Having another problem? You're best off just contacting support. Most of the people here are general users. If you need individualized help, contact support.
 

I CONTACTED SUPPORT AND GOT AN AUTOMATED REPLY. WHAT NOW?

If you get a reply and it doesn't answer your question, then send a polite reply. Make sure to restate what you said in the previous email. Don't just copy and paste; they may have misunderstood what you needed the first time. Keep it short and to the point.
Under no circumstances should you yell, swear, or be rude to the staff. Remember, you are asking for their help. Being rude will only get you longer wait times, more copy and pasted responses, and potentially banned. Support is more likely to help those who are polite, so say hello and thank you with each email.
 

HOW DO I TRACK MY EARNINGS?

Most people use a spreadsheet. Here are a few options: One | Two | Three
If you're interested in making your own spreadsheet, here are a few ideas: One | Two
 

WHAT EQUIPMENT SHOULD I USE?

Routers/access points Many people recommend /Ubiquiti I used a cheap TP-link which worked well for up to around 15 devices.
Phones/Tablets At the bare minimum, you want a dual core with Android 4.4.2. I highly recommend getting at least Android 5.0, as many apps will not work with lower spec devices. A few places to check out would be Walmart, Best Buy, Tracfone, Straight Talk, and Amazon. Sales are fairly random, so keep your eye out. You can also get devices on eBay and C7Recycle but do take note that these are often used/refurbished devices and they may not last as long. Sometimes it's cheaper in the long run to just buy new devices.
Laptops Look on ebay or craigslist. Buying used will usually get you a better price than buying new. You want at least a dual core with 4GB of RAM, but a quad core with 8GB of RAM will do you much better.
Powered USB Hubs Many people like these. Never cheap out on your USB hubs - get a quality brand hub or stick with the OEM chargers.
Various Extensions Check out this post. - Although, I disagree about the auto refresher and adblock. Both of those can get you banned by many beermoney sites. FRQc is also great. Just set it to "auto low" and all of the flash videos will load faster.
Check out /BeermoneyHomeNetwork for help with configurations. The posts are old, but the info is solid. It's just one of those things that doesn't change.
 

DO I HAVE TO FILE TAXES?

Short answer: Yes.
Long answer: It doesn't matter if you get PayPal, Cryptocurrency, Gift Cards, physical items, or whatever else. It is all considered income because you are earning it in exchange for a service. In the USA, once you earn $400 in self employment you are required to file taxes. If you earn $600 or more with any individual site in a year, you should receive a 1099 from them. Even if you don't make $600, or don't get the form, you're still supposed to report any amount you earn. There are a few circumstances in which someone doesn't need to file taxes, and if you think you would be in one of those circumstance, you should speak to a certified tax consultant.
Here's more information.
 

WHEN SHOULD I CASH OUT?

Always cash out as soon as possible, unless there is some sort of discount for saving up your points. You never know when you might get banned or a website might go away. Building up your points is just increasing how much you have to lose. The points are not yours until the money is in your possession.
 

HOW DO I TELL IF SOMETHING IS LEGIT OR A SCAM?

If a post is at least 48 hours old or made by a user with flair beside their name, it is likely legit. Known scams get removed pretty quickly. GPT sites are more likely to be a scam than any other type of site posted here. If you are worried about being scammed, I highly recommend sticking to the more well known sites in this FAQ and the Common Beermoney Sites List. You can also ask the poster for proof that they were paid by a site. If they can't prove they've been paid, they are only looking for referrals. I don't recommend signing up on sites when the user can't provide payment proof.
 

Here's a few things to look out for:

  1. If they send you a check and ask you to return part of the money, it is a scam. The check will bounce, and you will be out the money. If an employer needs you to buy something, they will either buy it with a company card, or ask you to send a receipt for a refund. If they've already sent the check, you can give it to your local police department if you want. Just block all communication from them.
  2. They pay a ridiculous amount of money or claim to pay "the most". Very few surveys pay more than $10/hour. You won't get more than about a penny to click links. Videos rarely pay more than a couple pennies. This is about the maximum, and it's very common to make half this rate or lower. If the site is claiming to pay so much more than anywhere else, it's a scam.
  3. You get an offer or interview from a site or job you didn't apply for. Be especially cautious if they want to do the interview over google hangouts.
  4. You are being asked to work for free as a "sample", or you are asked to install a program and wait to be accepted at a later date.
  5. They have a high minimum cash out amount (above $25). Many sites have $1-10 minimums.
  6. You are required to refer people to get paid.
  7. You have to spend money to use the program. Even if it is an "optional" fee, be careful. This includes "training fees".
  8. They don't disclose what type of work you're going to do. Sometimes job listings need to be vague for non-disclosure reasons, but you should always be able to get a general description of the work you will perform.
  9. The website or post is full of grammar errors. An error here or there is bound to happen, but any legit site is going to put in effort to look good.
  10. It's never been mentioned on this subreddit and/or you can't find reviews on google. Unless it's a completely new service, you should be able to find something about it somewhere.
  11. Most importantly - does it feel too good to be true? Does it feel sketchy? Is there something that is just off, but you can't put your finger on it? Trust your instinct, and come here to find out if anyone else has heard of the site. Do a search first, and if you can't find anything, then make a post about it.
There are exceptions to most of these, but these are some things to be on the lookout for. Here are a few more safety tips.
Also, never trust what a blog says. They are trying to get your referral link, so they will pretend the site is better than it is. If you see the site on /beermoney, look in the comments. If the poster is making outrageous claims, usually someone will leave a comment about it.
 

I WANT TO DO A GIVEAWAY FOR EVERYONE HERE. AM I ALLOWED TO DO THAT?

Giveaways without any stipulations or endorsements are permitted. If you intend to promote a site/link/etc or require users to sign up somewhere or complete a task, you must get moderator approval prior to posting. Failing to do so may result in a ban. Due to an incident users are no longer allowed to simply host their own giveaways. When in doubt, message the mods.
 

I WANT TO PAY PEOPLE TO DO A TASK FOR ME. CAN I MAKE A POST ON HERE?

Depends. What type of task are you offering?
When in doubt, message the moderators and ask if it's allowed.
 

HOW DO I GET REFERRALS?

  • Invite your friends and teach them how to use the sites.
  • Advertise on social media.
  • Find a new website that has paid you and hasn't been discussed here (search first!) then advertise it here (with lots of info and payment proof!)
  • Consistently submit top/quality content to this subreddit for the opportunity to have your referral put on the Common Beermoney Sites List.
  • Pay for referrals (make sure the site allows it first!).
  • Join a referral chain.
 

DO I NEED TO USE MY REAL INFO? (name/address/birth date)

Absolutely. You need to have correct info on the sites that pay you. Lying about anything can cause a whole lot of trouble, including getting your account banned.
 

BUT WON'T I GET SPAM MAIL?

From The Website Paying You? It's highly unlikely that the sites that pay you will waste their money sending you spam mail. You may get something for verification, but that's about it.
From The Surveys? It's very rare unless they are sending a payment, a product for testing, or they are requesting a follow-up. Most surveys won't even ask for this info, and on the rare occasion they do, it's typically to avoid repeat submissions.
From The Offers? Sometimes. Most of them won't send you anything even if they say they will. Charities, credit cards, banks, and other similar services will spam you non-stop though.
In Your E-mail? Absolutely. Make sure to use a separate e-mail for beermoney work, especially if you're going to be doing offers.
 

THIS SITE NEEDS A PHONE NUMBER FOR VERIFICATION. CAN YOU HELP ME?

Free OptionsGoogle Voice | List of free services | Ask a family member or friend
Paid services/phoneverification | List of paid services
 

CAN I USE A VPN, VPS, OR OTHER SOFTWARE TO PRETEND I'M FROM ANOTHER COUNTRY?

No. You can get banned for doing this. Usually they ban you right after you redeem your first reward. The location is restricted for a reason.
 

CAN I USE AN EMULATOR OR A VIRTUAL MACHINE?

No. Third party software is not allowed, and you can be banned for it.
 

IS BEERMONEY DEAD/DYING?

No. Don't listen to the trolls. Beermoney changes over time. Some methods are less lucrative now than in the past. Some are more lucrative. Some have less sites offering the service, and some have more. Passive methods are on the decline, but beermoney is more than just passive methods.
 

WHY ARE MY COMMENTS/POSTS BEING DOWNVOTED?

Every post will get a few downvotes. You can't please everyone. If you get down to -5 or lower, you might want to take a look at what you're typing. Beermoney users in general are more likely to upvote than to downvote, so either you're breaking a rule, spreading false info, or you're just being rude.
 
If you saw something in this FAQ that you think is wrong, is confusing, or you think needs more information, please let me know and I will look over it.
 

Have another question? Check the FAQ part 2 or try searching first!

You can use the reddit search bar, https://www.redditsearch.io/, or even a google search with "beermoney" in it to find lots of useful information.

Here's more info on how to use the searches.

submitted by Mikazah to beermoney [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracy [link] [comments]

Deep Web/Dark Web Vigilante Nightmare

A little backstory when this happened; I was 22 years old and had just graduated from college with a bachelors degree in computer programming and was feeling like a hot shot. I moved into a nice little studio apartment which was actually a motel room at one point, before the apartment company took over and did renovations. The area was nice, with lots of trees, beautiful views and a small river that ran behind the apartments. Being situated 10 miles outside of the city, meant that there were not that many people who frequented our area, but I was glad of that, as it would be nice to have some peace and quiet to focus on my programming and web design skills.

I remember hearing everyone in high school and college rambling about being on the Deep or Dark Web as you may say, the uses are actually quite interchangeable, however, they also are 2 very different parts of the internet as a whole. You have the Clearnet, that can be accessed by anyone with an internet connection and search engine such as Google, then you have the Deep Web, which is the greater part of the internet that is hidden and cannot be accessed without a special program or browser such as Tor, and finally part of and inside of the Deep Web, you have the Dark Web or even Dark Net where most of the horrific stories you hear about take place.

Hearing all of these stories from either friends, or from reading them online over the years intrigued me and set me on the career path that, at the time, I thought I truly wanted. Now, not so much. My goal was simple, to create a program that would run without the use of a script, that would actually be disguised as a picture file. If someone opened the file, then my program would execute and be able to look directly into the computer systems full log records and would be able to sniff out the original IP address of the affected computer, as well as any personal information such as names, birthdays, credit card numbers, etc.

Now I know what you are thinking, I was definitely up to no good in creating a program like this, but you would be completely wrong. After hearing of some of the truly horrifying people that hide on the Dark Web, and seeing as many of the stories end with those same people never getting caught, I could not fathom why nobody made a program to catch these people. I worked out how I could catch these people, think like, and to pretend to be one of those people.

When I had finally compiled the program, compressed it down to less than 1mb and disguised it like a picture file I planned to use, I was ready to test it out. I pulled out my old junky laptop that I used for school. The thing was a pure piece of shit, and the perfect test bed for anything that I created. I connected the laptop to the internet and created a test email and sent the file. I had to test different methods of delivery, so I also used a private dropbox so I could test email delivery and opening, direct placement from a flash drive, and the big one that I was counting on, downloading the file and opening it from the internet outside of email programs.

When all 3 methods worked and started sending the plethora of data to my main laptop in the form of updated notepads, I jumped for joy. I thought to myself,

So, basic IP and personal information sniffing works, what about if they are pros, using multiple VPNs and the like?

I installed 2 separate VPN programs on my test laptop, and even connected to a proxy server through them to test the results. They still came back the same just showing the additional IP addresses from the VPN. I was now ready to hunt these people. My studying in school paid off having allowed me the knowledge to be able to create this amazing tool. I would make my own show like Chris Hansen's “To Catch a Predator” but mine would be called, “To Catch a Webber”. Yes my ego was extremely high at the time,, but I could not celebrate, not until I knew that it 100% worked without a doubt against a third party.

This is when things really began to get interesting. I had Tor and the Hidden Wiki opened up, my VPN fully configured and I was ready to go. I wanted to get to the Dark Web and most people find it by clicking something randomly. I selected a random site from the Hidden Wiki to begin my journey. Just a basic news board, mainly spreading support to those who are oppressed around the world. I clicked on another link and it took my to a blank page. I waited a few seconds and still nothing so I went back and tried another link.

This one took me to some jewelry site. After reading some, I noticed the end of each ad boasted that the jewelry was stolen from graves fresh and old with some being claimed to be thousands of years old. Like most sites on the Deep and Dark Web, bitcoin was the currency in use on the website. I saw enough there and was about to go back and try another link when a chatbox popped up with the generic name “Admin” followed by a message.

“Hello! Welcome to our site, everything here is 100% authentic, antique and unique! Is there anything specific you are looking for today?”

I must admit, I wasn’t caught off guard at all, with normal online stores, this is pretty standard protocol. I typed out my reply confidently,

“You know I was actually just looking at your selection. So much to choose from, it’s a little overwhelming and I am just mainly browsing.”

Within literally 5 seconds I had a reply from the Admin,

“We look forward to seeing your purchase! Please let us know if we can assist you further!”

Ok, now that seriously took me back. They told me they look forward to seeing my purchase? Fuck that I clicked out without even replying. I had double checked my setup and I was still 100% anonymous, my VPN was still working so that eased my paranoia. I clicked another link and this time I was taken to a black web page with white text in the center. I could not read the text, in fact, when I looked closer, it didn’t even look like any real writing at all. I clicked it and a box popped up asking for what I am assuming was login info. Obviously I didn’t have that, but oddly enough, yet another chatbox popped up and I just see,

“I got you.”

Info started being entered into the first box. The next screen I see is white with what appeared to be a directory to many different areas. The chatbox appeared again and read,

“Enjoy and behave.”

I had no clue who that was, or where to even start in the directory. I know there are so many horrible people hiding on the Dark Web, but I wanted to stop the killers more than anything else. I heard so many stories of Red Rooms and people being kidnapped and used for others pleasure and dying horrific deaths and I had to help stop that, I was on a mission. I clicked a random link and the page slowly loaded. There were 3 pictures displayed, a storm, a green pasture in sunlight, and a knife. Obviously I clicked on the knife and was loaded into the Dark Web equivalent of a sick and sadistic instagram of death.

I saw one picture of an older guy laying on a couch with a gag in his mouth titled, Vomit Death. A small description said the poster thought it would be funny to watch their friend drown in their own drunken vomit. They went on to brag about how the gag relieved them of any legal responsibility in the death because it was deemed a stupid drunken game. I wanted to nail that fucker, but continued on.

Another image was of a young girl, probably early 20’s hanging from a tree with the title, At Death I Part. The small description read,

“You wanted ‘til death do us part, now you have it and I’m free.”

This one confused me then and still does now for a couple reasons. Was this a suicide or a murder and who posted it? The next picture I saw really caught my eye. It looked like one of the pieces of jewelry I had looked at on the jewelry site. A bracelet, in fact the very one, the exact one that prompted the chat log to pop up. At this point I knew better than to click on it, but I was also arrogant in my ego and had full confidence in my program. I clicked the picture. This time there was a small handwritten note in the picture,

“Hello! We need your business, you did not make a purchase.”

After reading that and feeling my heart practically stop, I was then automatically redirected back to the jewelry site and looking at the same damn bracelet. Immediately the chatbox popped up with the Admin and read,

“We knew you would be back to make your purchase!”

I did not even know what to say before they added,

“The site you were just on is also run by us, we helped you login so you could get a small taste of our different varieties of content. Access is subscription based, and you pay for access by buying our jewelry. Furthermore, if you do not make a purchase, then we will restrict further and future access to our sites as well as release your browsing habits to your family and friends. You have 10 minutes to decide.”

I simply replied,

“Searching is not a crime, I did not find much value in your other websites, I have seen better and I don’t wear jewelry so, sorry, no sale.”

I felt like a smug bastard knowing they couldn’t know who I am personally or even track me, but the reply I got shocked me,

“Whatever sites contain the content you viewed is all under us. You don’t know what you are getting in to or how big our business is. Simply make a small purchase and we can move on.”

I get aggressive sales tactics, but this takes the cake in being intertwined with blackmail and extortion. I wouldn’t have it and replied,

“I refuse to be blackmailed or extorted by people or entities claiming to have false information on me. Unlike you people, I have proof of a better site that does not strong arm their users, you cannot provide any information to me, about me, like I’m sure you can others and you know this.”

Admin typed back,

“You have no proof, you are probably some kid acting out. Tell you what, show me your proof and I will show you mine.”

Arrogant and with the time I had been waiting for having arrived, I uploaded the image to a secure site and messaged them when it was done. I did not get a reply right away, but after about 3 minutes I knew they opened the image thus executing the hidden program because I started getting a plethora of log updates. This happened for about 5 minutes before the logs stopped updating and another 5 minutes before the Admin finally came back and said,

“I thought you had proof of a better site than ours James. Truly I am disappointed but not surprised, no site tops what we provide as a whole. And you do not even understand how deep things go. As for the picture of your cat, very sneaky, but you did not consider your 1 serious flaw, that anyone with knowledge of how your little toy works, can reverse engineer it, dismantle it, and can find where the information is being sent to. You are in a very nice, secluded area, and easily traceable, unlike me, who is operating under many different aliases, stolen identities and on throwaway laptops. I can be mobile in a matter of seconds, gone without a trace. Let me share a couple things with you to help you make the wise choice in your situation. Our image site of the deceased that you saw and clicked through, well, some of those people are people who become an issue, and their jewelry, one of the millions of pieces we have available currently on top of what we have collected over the years. Now, are you going to make your purchase?”

My jaw hit the floor. I was fucking speechless and this lunatic was absolutely right. I did not account for being back-traced through my own program because of my arrogance. Not to mention the fact that if they were really using multiple identities, tracking down the perp just isn’t going to happen. I couldn’t reply, I was frozen in fear when another bit of text popped up in the chatbox,

“James, I know you are still there. Just make a purchase James, and we both disappear afterward and have no further contact. I don’t want to send my associates to you, you haven’t truly insulted us yet, just make a purchase and this can all be done. Don’t spit in the face of our work.”

I slammed my laptop to the ground and started stomping it out like the scene in Office Space where they beat the shit out of a printer. Pieces were flying all over the place and it was just an unrecognizable pile of metal and bits. I was on a month to month lease at the time and moved out the next day to another place in the city. It was more expensive and the location sucked, but knowing I had lots of others around me constantly made me feel safe and still does. That was 3 years ago and I am still living in the place I moved to after this happened. I have since stuck to web design and have stayed far away from the Deep and Dark Web. Nothing has come of this that I know of, but they could still be out there, watching and waiting, and then I may become part of their content...

To be Narrated soon on YouTube @ Nightmare Storytime!
submitted by Nightmare_Storytime to nosleep [link] [comments]

What is Bitcoin? Bitcoin Explained Simply for Dummies ... 'Fake Bitcoin' - How this Woman Scammed the World, then ... SURVIVING ONLY USING BITCOIN FOR 24 HOURS (Does it work ... Best Bitcoin Exchange Rick Reacts: Bloodbath? No, just another Wednesday in Cryptocurrency

VPNs werden immer beliebter, um sich beim Surfen zu schützen, die IP-Adresse zu verschleiern oder Geoblockaden zu überwinden. Doch die besten VPN-Dienste kosten Geld. Wer ein kostenloses VPN ... Cypherpunk's History [] Before the mailing list []. Until about the 1970s, cryptography was mainly practiced in secret by military or spy agencies. However, that changed when two publications brought it out of the closet into public awareness: the US government publication of the Data Encryption Standard (DES), a block cipher which became very widely used; and the first publicly available work ... Bitcoin is a decentralized digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: transaction management and money issuance are carried out collectively by the network. The original Bitcoin software by Satoshi Nakamoto was released under the MIT license. . Most client software, derived or "from ... Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics. A large percentage of Bitcoin ... Lethean is decentralized (peer-2-peer) VPN project with commercial gateway backed by the blockchain.Lethean itself is the fuel and operating currency for this decentralized VPN. It is based on the CryptoNote technology and uses the exclusive CryptoNight v8 algorithm.. Following development and integration of VPN capabilities into the wallet Lethean ledger will allow any network user to act as ...

[index] [215] [31104] [30648] [3990] [30908] [32256] [17332] [31137] [36783] [20341]

What is Bitcoin? Bitcoin Explained Simply for Dummies ...

Hi everyone! Hope you enjoy this episode. We've been super curious about the power of cryptocurrencies so Matt and Thomas decided to test its capacities... B... Bitcoin’s emergence as a global digital currency has been as revolutionary as it has been erratic. But while fledgling investors obsess over every fluctuatio... Start trading Bitcoin and cryptocurrency here: http://bit.ly/2Vptr2X Bitcoin is the first decentralized digital currency. All Bitcoin transactions are docume... Exploring the revolutionary Bitcoin digital currency. It doesn't need banks or to be printed. It can be transferred in a second to anywhere in the world. Wit... Bitcoin für Anfänger einfach erklärt! [auf Deutsch] Bitcoin-Börse (erhalte 10€ in BTC) https://finanzfluss.de/go/bitcoin-boerse *📱 Sicheres Bitcoin-Wallet...

#