Biggest Twitter Breach: Accounts of US High-profiles

Monero: the secure, private, untraceable currency

This is the official subreddit of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
[link]

[Mystery] Where did the bitcoin go? Did I get hacked?

Hi everyone,
I'm creating this post because I'd like to hear what you guys think about what happened to me recently.
Here's the story :
I've been using cryptocurrencies for a little over a year and a half, and I'm pretty familiar with most aspects of it (trading, security, technology, etc).
Last December, I made a transaction to send some bitcoin I had on an exchange called IDAX to my Kraken account.
I logged into my Kraken account, went to deposits > XBT, and created a new deposit address.
Then, I went to IDAX and withdrew 1.06 BTC to this newly created address.
After a couple of hours monitoring Kraken and not seeing the BTC coming in, I went back to IDAX to look at the TX on blockchain.info. To my surprise, I realized the 1.06 BTC weren't sent to my Kraken address, but to another address, unknown to me.
Here's the TX showing my withdrawal from IDAX being sent to an unknown address : 16FFGnvKyBKoWB58mq85eFrou5NCCgqXQi (TX : https://www.blockchain.com/btc/tx/641c62235ea8cdb33da9ca996cbdad8f4fa72320d388fd3950efcf92e40f3fba)
At this point I kinda freaked out, as it's a lot of money, and contacted both Kraken and IDAX client support. Both told me they weren't responsible for what happened, and that the error was mine.
The thing is, I don't own this BTC address, and I had never seen it before. I didn't copy it from anywhere else, and didn't type it myself in IDAX's withdrawal form.
After monitoring the address for a few days to see if the funds would move or just stay dead in this unknown wallet, I saw activity on it. Around a week later, my 1.06 BTC were sent to another address (3QTst4kaqfvzD6qB5HEzyNuA4C2qjjMW7J), then to other addresses through different transactions (https://www.blockchain.com/btc/tx/484717cc40767a343775512b80ce72434d43fbb62aa70e07be289b33c374615f).
Now, I understand that my BTC are more than likely lost for good as IDAX claim they've sent the BTC to the address I provided. I've thought about a hack but I'm finiding it hard to believe as I'm using a Mac, which is brand new from last summer, I don't have any sketchy plugins on my browser and I barely use cracked software (the only ones being the Adobe collection and Sketch, which I've always downloaded on websites I trust). I ran a scan with my antivirus (Sophos) and it didn't find anything besides a bitcoin miner, which was normal since I have a bitcoin wallet on my computer.
What bothers me is not knowing what happened. Was my computer really hacked at some point? Am I in danger of something similar happening again? What do you guys think? I know I'll never see that BTC I've lost again but I'd really like to know what happened. Should I factory reset my computer just in case?
tl;dr : Withdrew 1.06 BTC from IDAX to Kraken. Money was sent to an unknown address while I'm sure I've pasted the right address in the withdrawal form. I'm using a Mac and antivirus didn't find anything suspicious. After 7 days, the funds were moved from that unknown address to other addresses. IDAX and Kraken claim they're not responsible for what happened. What do?
submitted by makdac to AskNetsec [link] [comments]

Did r/btc get hacked 5 minutes ago? Only a link to r/Bitcoin

Did btc get hacked 5 minutes ago? Only a link to Bitcoin submitted by hegjon to btc [link] [comments]

How did Mt Gox and Bitfnex get hacked if everyone holds their own wallet with their own personal keys? /r/Bitcoin

How did Mt Gox and Bitfnex get hacked if everyone holds their own wallet with their own personal keys? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Did r/btc get hacked 5 minutes ago? Only a link to r/Bitcoin /r/btc

Did btc get hacked 5 minutes ago? Only a link to Bitcoin /btc submitted by BitcoinAllBot to BitcoinAll [link] [comments]

[uncensored-r/Bitcoin] Did the Segwit2x website just get hacked? It wasn't like this 30 minutes ago.

The following post by ur8moms is being replicated because the post has been silently greylisted.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/7c2yc8
The original post's content was as follows:
https://i.redd.it/aqfciojzs6xz.jpg
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

[uncensored-r/Bitcoin] DID COINBASE JUST GET HACKED?

The following post by johnveitceo1 is being replicated because the post has been silently greylisted.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/7bpor3
The original post's content was as follows:
[removed]
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

Update: All Free Ross (Lyn Ulbrichts) bitcoin are safe and did NOT get stolen in recent hack.

Good news! I just heard back from Lyn Ulbricht and she gave me the statement below about the recent hack.
tl;dr all the coins are safe and not one important cent was stolen :)
We will have this amazing strong woman (Lyn Ulbricht) back on The Tatiana show to talk about it soon.
Happy new year to all the awesome bitcoiners :)
Joshua Scigala
Vaultoro CEO

Statement from Lyn,
Free Ross was hacked on December 30th, but the hackers weren’t able to steal a single cent from the Free Ross bitcoin or PayPal accounts! We can keep fighting for Ross full out.
Thank you to all of our friends who helped us fend off the hackers. This could have resulted in a very different, and devastating, outcome and your help was instrumental in our defense against the attack.
We continue our battle for Ross, having learned many lessons over the last several days. Our security has been overhauled under the guidance of experts, and we have become savvier about hacking techniques ourselves. You can be sure that we will take the strongest precautions and the best care of all the funds so many of you have donated, to make sure it is all protected and goes to free Ross.
All our accounts are now secure and you can safely donate to any of them.
We start 2017 with hope and gratitude for all the support Ross has received. Here’s to freedom in the New Year!
EDIT: There were questions asked about a TX on the 30th for 24.7 BTC that people thought went to a mixer. I asked Lyn what this TX was.
Lyn Ulbricht:
The 24.7 BTC sent on the 30th was removed from our Blockchain wallet in response to an attempt by the hackers to access that wallet. The 24.7 BTC were moved in a single transaction to the Ross Ulbricht Legal Defense Fund llc Coinbase account. There were no other BTC transactions initiated by us on that day. Those BTC are still in the Coinbase account. We asked Coinbase to freeze the entire account on that same day, since the hackers were attempting to access it also. It remains frozen at the time of this writing. Since the 30th there have been many donations sent to the 1Ross account on the blockchain, including a one BTC donation. We are extremely grateful for the continued support of the community.
submitted by Vaultoro to Bitcoin [link] [comments]

Bitcoin mentioned around Reddit: Weird process taking up 127% cpu. Did my server get hacked? /r/aws

Bitcoin mentioned around Reddit: Weird process taking up 127% cpu. Did my server get hacked? /aws submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Did I get hacked or what the hell happened here? /r/Bitcoin

Did I get hacked or what the hell happened here? /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Did i get hacked? Unconfirmed transaction after two hours. /r/Bitcoin

Did i get hacked? Unconfirmed transaction after two hours. /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Update: All Free Ross (Lyn Ulbrichts) bitcoin are safe and did NOT get stolen in recent hack. /r/Bitcoin

Update: All Free Ross (Lyn Ulbrichts) bitcoin are safe and did NOT get stolen in recent hack. /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

How does a site like twitter get hacked?

Day before yesterday twitter was hacked and many super famous accounts posted these bitcoins scams.
This is not the first time, accounts of celebrities have been hacked before, a lot. How does this happen, I imagine a company where the top minds in computer science work, couldn't let this happen. I don't mean the inner workings of the company I mean the specific technicality of these hacks.
I mean they would be smart enough to encrypt user details in db. they would block brute force attempts, disable outside plugins that causes interference, block access from routes that originate from an abnormal source, sanitization for xss, I don't know every method in the book but obviously the guys at twitter do. They MUST have covered it right!? The only way I see this happening is phishing but twitter has bought multiple look alike domains already and it's almost impossible to get so many celebrities's social media teams to fall for phishing at almost the same time!? What is going on?
I read some article on this, it said that someone from twitter was involved. Every site I have made with an account system, I wasn't able to access the site as an existing user. I encrypt everything before storing it. Isn't that the norm? How could even the CEO of twitter access the accounts without passwords, if they did the forget password thing, they still need the email. Also, the security question's answer is encrypted.
Please help a newbie understand how people can hack a site where literally the best scientists work.
submitted by BracketLess31 to webdev [link] [comments]

Why I stopped using the dark web

My story begins a few years ago I decided to use my computer skills to run a small darknet forum mainly just to share information without censorship.
At first I was extremely paranoid about my site getting hacked and having my anonymity being compromised so I went online and began to research everything that I would need to ensure my own safety.
After countless days of scouring blogs, forums and other material I decided I was ready now I didn't have any money so I couldn't just buy a VPS and host the site off shore or whatever, so I decided to use my old laptop after all I wasn't planning on running a major website.
So after setting the server up and what I thought was literally every single thing I could to do harden it against attack I put the site online, everything went great for a couple of months, donations rolled in as the the user base grew larger and larger.
After around 5 months the user base had gotten so big I had to upgrade and migrate everything to a new PC which I built just to host the forum and from there everything seemed perfect, the site was running smoothly and there were no issues with the migration until one day when I came home and noticed the PC had frozen I didn't think much to it maybe just a software bug caused it so I rebooted and that's when it was clear to me something was wrong the PC lit up and beeped a few times then shut off so I thought to myself ok so it's a hardware issue, after a few hours trying to diagnose the issue I figured it out and it turned out the ram had been corrupted I took it back to the store since it was still under warranty, the customer rep just told me it might have just been a faulty stick.
When I got home I replaced the stick of ram and had the site back up and running within a few hours, everything seemed to be perfect again I apologized to the users for the down time and everyone seemed to be happy enough.
Fast forward a few more months, the forums been up and running for a around a year and a half now this is when things started to get really weird. I finished work on a Friday, it was a gorgeous day in the middle of summer I came home had something to eat and sat down in front my PC and noticed I had a message, upon opening the message I realised that somewhere I'd messed up now don't get me wrong I'm not like Assange or anything so I don't really know why anybody would actually target me but the world is a crazy place so whatever.
The message had my details from my name, address, bank details, passwords, private emails, private messages everything from nearly every single device I owned I freaked out and immediately took the PC offline, turned my internet off but little did I know that this guy had done his research after a couple of hours pacing my room I received a text message.
"I know everything about you"
The message was sent via some type of SMS service so there was no way to trace it and then my phone rang.
"Don't talk just listen, I know everything there is to know about you all I want is 2 Bitcoin or things get worse, I'll send you a text with the wallet details"
The phone call ended just as quickly as it started, I opened my laptop up and checked my Bitcoin wallet there was enough left over from the donations just to pay this guy off and hope that would be the end of it, so I entered the guys details and sent the payment, my phone rang again.
"Thank you for complying, unfortunately someone I know really likes you."
He hung up, panicking I tried calling the number back an automated message began to play "the number you have dialled has not been recognised"
A few hours pass and I began to think to myself well maybe the last call was just him having fun and decided after a long day I'd just go to bed.
Sometime around 2am I was woken up by the sound of banging at my front door, I jumped out of bed and turned on all the lights grabbing a knife from the kitchen I walked slowly towards the window and looked out I could see someone standing by a car when they spotted me they got in and drove off I rushed to the door in hopes I might be able to get a license plate but by the time I'd opened it they'd already turned the corner as I turned I noticed an envelope on the floor I picked it up, went back inside and locked the door, closed the curtains and sat in the kitchen I placed the envelope on the counter and stared at it for around half an hour trying to muster up the courage to open it, did these guys really come to my home I thought to myself.
After the half hour was up I decided enough was enough I opened the envelope and pictures fell out onto the counter they were of me sleeping, these guys had not only been outside my house they'd been inside whilst I was sleeping the images had been edited and strange love hearts had been added next to me so now I was sufficiently freaked out, I didn't go back to sleep and when the sun broke the darkness I decided to head to the police station and tell them everything I hadn't broken any laws so I hoped they would just help me at least after hours of explaining everything to them they told me there was nothing they could do.
At this point I had never felt so alone in the world, I was scared of what this guy was planning for me, I didn't have the foggiest idea what I was supposed to do or expect so I decided to wipe everything my laptop, PC and phone I picked up everything I needed stuffed it all into a bag and decided to leave I had a couple of friends that I knew I could rely on so I called up my old buddy Marcus and we met had a few beers and I explained everything to him, he offered me a place to stay and I hoped that would be the end of it how wrong I was.
A few days later it happened again there was a knock at the door first thing in the morning, me and Marcus both went out to find another envelope on the floor, same thing pictures of me sleeping but these were in Marcus's house I started freaking out again and Marcus just said
"Ok well we need to do something maybe set a trap or something"
So we went over numerous ideas everything you could think of from cameras to baiting him and we settled on the idea of staying up during the night and locking him in the room, we filled the bed up with pillows, setup cameras and even barred the windows in the room we hid in the room next door after a few hours had passed we heard the lock rattling on the front door and we knew it was game time, we'd left the door just slightly ajar so we could see outside as he went past and the moment he went into the room we both sprung to action quickly as we could we closed the door and locked it from outside using a chair and a metal bar there was only one way he was getting out and he'd have to destroy the door we could see the silhouette of him as he paced the room quietly it was creepy as fuck, we called the police as we kept an eye on him.
At last I thought I can finish this and move on with my life just as the police arrived we noticed the guy take a gun out and place it to his head, he held a sign up which read "I love you" and he pulled the trigger, the police barged in guns drawn told us both to get the floor, we complied and shouted "he's in there" pointing at the door.
The police removed the makeshift lock and entered the room, called for an ambulance and put me and Marcus in the back of a police car.
I'd been sat in the interview room for a good couple of hours I guess whilst they carried out the investigation when a detective came in and say down in front of me opening a folder and placing pictures on the table "Do you know her" "Her?" I said looking at the pictures "no" I replied confused , he looked at me and said "this is the person who's been stalking you" and he then began to tell me they had visited her home and found a shrine with photos of me all over the place from restaurants to the gym even shopping.
He went onto tell me that she'd been the one that sent the messages, made the phone calls etc and they'd also found a diary which had some kind of future plans for me and her, she wanted me to be her husband and we'd been chatting for around a year and half from the moment I started the forum after I explained everything the detective said I was lucky to be alive, she had actually planned to drug me and kidnap me, she had even made some makeshift lock bed so I wouldn't be able to escape.
To this day I feel lucky and I haven't been on the darkweb since.
submitted by GoobleGayTennis to scarystories [link] [comments]

The Elites Twitter Accounts were not Hacked. They sent money to there breakaway civilization.

The Twitter accounts of some of the most prominent U.S. political and business leaders, from Barack Obama and Joe Biden to Jeff Bezos and Warren Buffett, were hacked Wednesday afternoon in an apparent effort to promote a Bitcoin scam. The attacks were stunning in scope and almost certainly coordinated. Others whose Twitter accounts were caught up in the security incident included Bill Gates, Elon Musk, Kanye West, Uber Technologies Inc., Apple Inc. and Michael Bloomberg, the founder and majority owner of Bloomberg News parent Bloomberg LP. The accounts sent out tweets promising to double the money of anyone sending funds via Bitcoin within 30 minutes.
So you’re telling me in a day and age where Twitter can make or break someone Anonymous Hackers Hacked Americas most powerful companies and rich people accounts and only used the “limited access” they had to scam for bitcoin? Which just so happens to be “untraceable” funds?
Ya Im not buying it. 1st of all: Its a American Presidential election year and if you hacked any Presidential accounts running for the highest office in the land you would not just use it to scam for bitcoin. A lot of people if they had access to these accounts would troll the hell out of America. My evidence for this theory is look at what happened to Trumps account. A Twitter employee who was fired before he left used his access to delete Trumps account before it was restored for like 5 minutes. He did not use it to scam for bitcoin.
One tweet can make or break the stock market. Your company or your reputation. And you use it to scam for bitcoin. Ya okay. Yet at the same time the untraceable funds that they successfully scammed out of people is going somewhere. My guess is to the Breakaway Civilization thats being built by these billionaires like Elon Musk, Bill Gates, and Warren Buffet. Musk especially has had a lot of success with his Rocket technology.
Edit: Why is this post instantly at 0 the moment I posted? I get shit for bringing politics into this sub yet I post a real conspiracy theory and instantly downvoted to 0 never to see “rising”.
submitted by Stevemagegod to conspiracy [link] [comments]

Why I stopped using the dark web

My story begins a few years ago I decided to use my computer skills to run a small darknet forum mainly just to share information without censorship.
At first I was extremely paranoid about my site getting hacked and having my anonymity being compromised so I went online and began to research everything that I would need to ensure my own safety.
After countless days of scouring blogs, forums and other material I decided I was ready now I didn't have any money so I couldn't just buy a VPS and host the site off shore or whatever, so I decided to use my old laptop after all I wasn't planning on running a major website.
So after setting the server up and what I thought was literally every single thing I could to do harden it against attack I put the site online, everything went great for a couple of months, donations rolled in as the the user base grew larger and larger.
After around 5 months the user base had gotten so big I had to upgrade and migrate everything to a new PC which I built just to host the forum and from there everything seemed perfect, the site was running smoothly and there were no issues with the migration until one day when I came home and noticed the PC had frozen I didn't think much to it maybe just a software bug caused it so I rebooted and that's when it was clear to me something was wrong the PC lit up and beeped a few times then shut off so I thought to myself ok so it's a hardware issue, after a few hours trying to diagnose the issue I figured it out and it turned out the ram had been corrupted I took it back to the store since it was still under warranty, the customer rep just told me it might have just been a faulty stick.
When I got home I replaced the stick of ram and had the site back up and running within a few hours, everything seemed to be perfect again I apologized to the users for the down time and everyone seemed to be happy enough.
Fast forward a few more months, the forums been up and running for a around a year and a half now this is when things started to get really weird. I finished work on a Friday, it was a gorgeous day in the middle of summer I came home had something to eat and sat down in front my PC and noticed I had a message, upon opening the message I realised that somewhere I'd messed up now don't get me wrong I'm not like Assange or anything so I don't really know why anybody would actually target me but the world is a crazy place so whatever.
The message had my details from my name, address, bank details, passwords, private emails, private messages everything from nearly every single device I owned I freaked out and immediately took the PC offline, turned my internet off but little did I know that this guy had done his research after a couple of hours pacing my room I received a text message.
"I know everything about you"
The message was sent via some type of SMS service so there was no way to trace it and then my phone rang.
"Don't talk just listen, I know everything there is to know about you all I want is 2 Bitcoin or things get worse, I'll send you a text with the wallet details"
The phone call ended just as quickly as it started, I opened my laptop up and checked my Bitcoin wallet there was enough left over from the donations just to pay this guy off and hope that would be the end of it, so I entered the guys details and sent the payment, my phone rang again.
"Thank you for complying, unfortunately someone I know really likes you."
He hung up, panicking I tried calling the number back an automated message began to play "the number you have dialled has not been recognised"
A few hours pass and I began to think to myself well maybe the last call was just him having fun and decided after a long day I'd just go to bed.
Sometime around 2am I was woken up by the sound of banging at my front door, I jumped out of bed and turned on all the lights grabbing a knife from the kitchen I walked slowly towards the window and looked out I could see someone standing by a car when they spotted me they got in and drove off I rushed to the door in hopes I might be able to get a license plate but by the time I'd opened it they'd already turned the corner as I turned I noticed an envelope on the floor I picked it up, went back inside and locked the door, closed the curtains and sat in the kitchen I placed the envelope on the counter and stared at it for around half an hour trying to muster up the courage to open it, did these guys really come to my home I thought to myself.
After the half hour was up I decided enough was enough I opened the envelope and pictures fell out onto the counter they were of me sleeping, these guys had not only been outside my house they'd been inside whilst I was sleeping the images had been edited and strange love hearts had been added next to me so now I was sufficiently freaked out, I didn't go back to sleep and when the sun broke the darkness I decided to head to the police station and tell them everything I hadn't broken any laws so I hoped they would just help me at least after hours of explaining everything to them they told me there was nothing they could do.
At this point I had never felt so alone in the world, I was scared of what this guy was planning for me, I didn't have the foggiest idea what I was supposed to do or expect so I decided to wipe everything my laptop, PC and phone I picked up everything I needed stuffed it all into a bag and decided to leave I had a couple of friends that I knew I could rely on so I called up my old buddy Marcus and we met had a few beers and I explained everything to him, he offered me a place to stay and I hoped that would be the end of it how wrong I was.
A few days later it happened again there was a knock at the door first thing in the morning, me and Marcus both went out to find another envelope on the floor, same thing pictures of me sleeping but these were in Marcus's house I started freaking out again and Marcus just said
"Ok well we need to do something maybe set a trap or something"
So we went over numerous ideas everything you could think of from cameras to baiting him and we settled on the idea of staying up during the night and locking him in the room, we filled the bed up with pillows, setup cameras and even barred the windows in the room we hid in the room next door after a few hours had passed we heard the lock rattling on the front door and we knew it was game time, we'd left the door just slightly ajar so we could see outside as he went past and the moment he went into the room we both sprung to action quickly as we could we closed the door and locked it from outside using a chair and a metal bar there was only one way he was getting out and he'd have to destroy the door we could see the silhouette of him as he paced the room quietly it was creepy as fuck, we called the police as we kept an eye on him.
At last I thought I can finish this and move on with my life just as the police arrived we noticed the guy take a gun out and place it to his head, he held a sign up which read "I love you" and he pulled the trigger, the police barged in guns drawn told us both to get the floor, we complied and shouted "he's in there" pointing at the door.
The police removed the makeshift lock and entered the room, called for an ambulance and put me and Marcus in the back of a police car.
I'd been sat in the interview room for a good couple of hours I guess whilst they carried out the investigation when a detective came in and say down in front of me opening a folder and placing pictures on the table "Do you know her" "Her?" I said looking at the pictures "no" I replied confused , he looked at me and said "this is the person who's been stalking you" and he then began to tell me they had visited her home and found a shrine with photos of me all over the place from restaurants to the gym even shopping.
He went onto tell me that she'd been the one that sent the messages, made the phone calls etc and they'd also found a diary which had some kind of future plans for me and her, she wanted me to be her husband and we'd been chatting for around a year and half from the moment I started the forum after I explained everything the detective said I was lucky to be alive, she had actually planned to drug me and kidnap me, she had even made some makeshift lock bed so I wouldn't be able to escape.
To this day I feel lucky and I haven't been on the darkweb since.
submitted by GoobleGayTennis to Scary [link] [comments]

Twitter getting hacked was probably the scariest thing we've experienced this year

I know what you're going to say, "how, you're over reacting". Consider this. major politicians have been hacked, celebrities, corporations. Now imagine if they hacked into trumps Twitter, or other foreign leaders. "We have declared nuclear war on x", "we are under attack from x". This could have literally ended the world. Or bare minimum extreme social distress leading to mass rioting, race wars, mass suicides. Instead they just put some bitcoin scam up. So thank whatever god you believe in that's all they wanted to do.
Social media has evolved to the point where it is an essential campaign and public relations tool. Provide real time updates the the population. Every world leader has a social media account. Whether it's for personal use or solely for official posts. Regardless, we were fucking lucky. We need better security measures put up asap. We cannot let this happen again in any measure or next time we may not get as lucky as we did with a bitcoin scam.
submitted by NoIdeaMateWhoIsIt to self [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

What If The Twitter Attack Was...From The Trump Administration?

There is another post relating to the Twitter attack, but I really wanted to take notes on those affected by the attack. I feel like this is a perfect storm of Trump’s opponents being struck down.
1) Political Opponents- Barack Obama, Joe Biden. High up members of the Democratic Party are involved here that just so happen to be some of Trump’s biggest enemies. Now to answer your question of not everyone is a democrat...
2) The Political Dodge - People like Elon Musk and Apple who definitely aren’t purely on the left. These seem to be high profile accounts that don’t really have a ton of affiliation with Trump mainly to give the hackers a larger bounty reward. This might be the money side of it, where the Trump administration hopes it can dodge the idea of it being a target of theirs as well as paying the hackers by not being able to keep track of the bitcoin when it gets moved to multiple accounts.
3) Fishiness About Bitcoin - Remember the reports came out that Donald Trump wanted to ban Bitcoin in general? Notice how many of the other accounts were giant names in cryptocurrency?
And now the biggest one of all:
4) The Biggest Screw You to Twitter - Trump has not been thrilled at all with Twitter’s handling of his tweets. Now the social media platform has a major hack on its hands and looks “weak” in Trump’s eyes.
Also notice Donald Trump’s account wasn’t hacked even though it’s probably the most looked at/controversial account on Twitter right now?
Now into Trump’s Plan: 1) Ban Crypto - This is his moment to try to convince the population that it’s time to ban Bitcoin and altcoins. 2) Weaken His Political Opponents: Make Joe Biden look “weak” and “that he can’t keep ahold of his own credentials, how can he protect all of America’s?” 3) Make Twitter Look Weak: He’s been upset with Twitter. Time to make them look like they can’t even defend their own accounts with celebrities?
Just a fun food for thought, would love to hear what other people might think of who did it!
submitted by niceguy7326 to conspiracytheories [link] [comments]

The Unofficial Cardano FAQ - V3

(if you would like to add information or see mistakes, just comment below and I will credit you)
What is Cardano? Cardano is an open source and permissionless "Third Generation" blockchain project being developed by IOHK. Development and research started in 2015, with the 1.0 mainnet launching in 2017. Cardano blockchain is currently being developed into two layers. The first one is the ledger of account values, and the second one is the reason why values are transferred from one account to the other.
  1. Cardano Settlement Layer (CSL) - The CSL acts as the ledger of account or balance ledger. This is an idea created as an improvement of bitcoin blockchain. It uses a proof-of-stake consensus algorithm known as Ouroboros to generate new blocks and confirm transactions.
  2. Cardano Computation Layer (CCL) - The CCL contains the data how values are transferred. Since the computation layer is not connected to balance ledger, users of the CCL can create customized rules (smart contracts) when evaluating transactions. (https://support.bitkub.com/hc/en-us/articles/360006678892-What-are-the-two-layers-of-Cardano-)
IOHK has the contract with an undisclosed party to develop the project until the end of 2020, at which point the community may elect another development team - on the assumption that the voting infrastructure has been completed. However CEO Charles Hoskinson has stated that they will develop the project until it is completed, and they are simply financed until the end of 2020.
Cardano was the first project built on a peer-reviewed scientific development method, resulting in dozens of research papers produced by IOHK. Among these papers is Ouroboros Genesis, proving that a Proof of Stake protocol can be just as secure as Proof of Work - which was originally developed for Bitcoin, and refined for Ethereum. This PoS protocol considerably lowers the resources cost to maintain network while still maintaining security and network speed.
Cardano as a financial infrastructure is not yet completed, With significant development to be rolled out.
What were the other two generations of blockchain? Gen 1 was Bitcoin. It exists by itself and talks to nobody but Bitcoin. It is capable of peer to peer transactions without a third party in such a way that you cannot cheat the system. This was a major step forward for the E-cash concept that people have been working on for the 20 years prior.
Gen 2 was Ethereum and other smart-contract platforms that allow other coins and platforms to be built on top of their infrastructure. These coins can interact with others on the platform, but cannot interact with other platforms. Meaning it is still not truly interoperable. Most Gen 2 blockchains are also using Proof of Work likes Bitcoin, which effects scaling. Also missing is a built-in method to pay for upgrades and voting mechanics for decision making.
Gen 3 blockchains are a complete package designed to replace the current financial infrastructure of the world. Cardano is using Proof of Stake to ensure security and decentralisation(Shelley). Scaling through parallel computation (Hydra in Basho), Sidechains to allow the platform to interact with other platforms (Basho), and also include mechanisms for voting for project funding, changes to the protocol and improvement proposals (Voltaire). Finally smart contracts platform for new and established projects that are developer friendly (Goguen).
Who is the team behind Cardano? There are three organisations that are contributing to the development of Cardano. The first is the Cardano Foundation, an objective, non-profit organisation based in Switzerland. Its core responsibilities are to nurture, grow and educate Cardano users and commercial communities, to engage with authorities on regulatory and commercial matters and to act as a blockchain and cryptocurrency standards body. The second entity is IOHK, a leading cryptocurrency research and development company, which holds the contract to develop the platform until 2020. The final business partner is Emurgo, which invests in start-ups and assists commercial ventures to build on the Cardano blockchain.
www.Cardano.org www.emurgo.io https://cardanofoundation.org/en/
What is the difference between Proof of Work and Proof of stake? Both these protocols are known as “consensus protocols” that confirm whether a transaction is valid or invalid without a middleman like Visa or your bank. Every node (active and updated copy of the blockchain) can agree that the transaction did take place legitimately. If more than half validators agree, then the ledger is updated and the transaction is now secured. Proof-of-Work (PoW) happens when a miner is elected to solve an exceptionally difficult math problem and gets credit for adding a verified block to the blockchain. Finding a solution is an arduous guessing game that takes a considerable amount of computing power to compete for the correct answer. It is like “pick a number between 1 and one trillion” and when you get it right, you get $30,000 in Bitcoin, so the more computers you have working on it, the faster you can solve it. Also the more people who are trying to solve the same block, the harder the algorithm, so it may become 1 in 20 trillion. The downside is the massive amounts of power required to run the computers that run the network, and the slow pace that blocks are solved. To “Hack” a PoW system, you need 51% of the computing power, which would allow you to deny transactions, or spend the same coin twice. At the moment there are 8 main mining operations for bitcoin, and 4 of them make up more that 51% of the mining power.
PoS instead selects a coin at random that already exists, and the person who owns that coin is elected to put the work in to validate the block. This means there is no contest and no guessing game. Some computer power is required, but only a fraction of a PoW system. The complex nature of selecting a coin that exists on the correct and longest chain and is owned by someone who can complete the block, AND in such a way that it is secure AND that computer currently running AND that person also having an incentive to complete the work, has made the development of PoS very slow. However only a few years ago it wasn’t even possible. In this method, the more of the coin (ADA) you stake, the more likely you are to be selected to close a block. Cardano also allows you to delegate your stake to someone else to validate the block so they do the work, and you share in the reward for doing so.
To “hack” a PoS blockchain you need to own 51% of the tokens, which is significantly harder than owning 51% of the computing power.
What is ADA and how is it different to Cardano? Cardano is the name of the network infrastructure, and can be thought of like a rail network. ADA is the native token that has been developed alongside Cardano to facilitate the network operation. This helps confusion and maintains distinction, compared to Ethereum being the native token of Ethereum. Similar to bitcoin or any other token, ADA can be sent peer to peer as payment, but is also the reward for running the network, and what is taken as transaction fees.
In this metaphor “Cardano” is the train tracks, that everything runs on. A stake pool would be the locomotive, facilitating transactions on the network while ADA is the coal that powers the locomotive. The train carriages are Decentralised applications (Dapps) that are also running on cardano tracks, but are not actively powering the network.
What is staking Cardano is a Proof of Stake protocol, and uses already existing coins like a marker to ensure security. The protocol chooses a coin at random and the owner of that coin is elected to validate a block of transactions. Staking is the process of adding your ADA coins to a Pool that has the resources to run the network. If the pool you have chosen to "delegate" your stake to is chosen to close/validate a block, then you get a portion of the rewards. The ADA never leaves your wallet, and you can "undelegate" whenever you like. this increases stability of the network and also gives an incentive to pool operators to invest the time and hardware required to run a pool.
What is a stake-pool and how does it work? Cardano.org FAQ on the issue goes into much more detail
A stake pool is where the computing power of the network takes place. During ITN there was 1200 registered stake pools while 300 were creating blocks. You can manage your own stake-pool or delegate your ADA to an already registered pool. Rewards are determined by the protocol, however the pool may elect to charge fee Percentages, or flat rate fee to upkeep their pool.
Can I Stake my ADA right now? The staking testnet has closed, If you participated in the Incentivised Test Net and earned rewards, instructions to check the balance are here.
However if you have just purchased some or it was held on an exchange, then you will need to wait until the Shelley mainnet launch happening at the end of July 2020.
Where do I stake my ADA? Daedalus Flight wallet, and Yoroi Wallet (as a chrome extension) are the current best options. Adalite and several other third-party wallets also exist. Coinbase will also allow staking as a custodial service, and many exchanges may offer “staking as a service” so you can leave your coins on the exchange and still earn rewards if you enjoy trading. I do not recommend leaving coins on an exchange unless you are actively trading.
What are the staking rewards now and what can I expect on a return in the future? The Incentivised Test Net (ITN) Delivered 10%-15%pa returns on average. The future of staking will most likely be lower, but will depend on the amount of ADA staked across the network and the amount of network traffic.
Check https://staking.cardano.org/en/calculato for a clearer picture.
what is a Pledge? To stop one person operating many pools, the rewards that a pool earns will vary depending on the amount of personal ADA they “pledge” to open the pool. This means that 50 pools with a 1,00ADA pledge each will be overall less profitable than 1-2 pool with the max ADA pledge (unknown but likely around 300k). Even if the 50 pools have the same over stake delegated by other users and have a better chance of being selected to close a block, the 50 pools may receive lower rewards.. (at least that is the theory)
Who is IOHK? IOHK is a for-profit software engineering company founded by CEO Charles Hoskinson and Jeremy Wood in 2015 that has taken a scientific approach to the development of blockchain. IOHK started with “first principles” and looked at questions like “what is a blockchain” and “what should a blockchain be able to do” rather than accepting the established paradigm of Bitcoin and Ethereum. IOHK was originally Input Output Hong Kong, but is now Input Output Global and is based in Wyoming USA employing over 230 staff. IOHK has established research labs in several universities in order to complete the Cardano project, and is also developing Ethereum Classic, Atala, Mantis and possibly other Blockchain related programs and infrastructure.
Who is Charles? Charles Hoskinson is an early adopter of cryptocurrencies, American entrepreneur and cryptocurrency specialist. Charles Co-founded Ethereum with Vitalik Buterin and 5-8 others, However he only worked on that project for approximately six-months. Charles is now the CEO of IOHK and the director of The Bitcoin Education Project.
Why isn’t ADA on coinbase? Cardano and coinbase have recently connected in a big way. With IOHK turning over all their ADA to the custodial services of Coinbase. This means that Cardano and Coinbase have been working together for some time and there is a strong partnership forming. Staking and cold storage will be available and trading on Coinbase will most likely become available after the release of Shelley (although no official word yet)
Why Doesn’t Cardano have a Wikipedia Page? Wikipedia has strict guidelines on what can be turned into an article. As there has been no coverage of Cardano from mainstream media or “noteworthy” sources, there is no article yet. Wikipedia will also not accept sources from IOHK as they are not considered “reliable” and must come from a third party. This will most likely change soon.
Cardano does have a dedicated community driven wiki
https://cardanowiki.info/wiki/Home
What is Atala and why do I care?*
Atala is a suite of services being developed on top of the cardano blockchain by IOHK that focusses on credential certification, for things like education, work history and degrees (Atala Prism). Product counterfeiting protection through registering products on a blockchain and create taper-proof provenance. This does not only apply to Gucci handbags, but also medication, art, and anything that can be counterfeited (Atala Scan). As well as supply chain tracking to see issues and inefficiencies with greater transparency(Atala Trace).
Im new, how much is a good investment?
Cardano is still a speculative market and although there is amazing potential here, it is still only potential. When investing in any High risk market like Crypto, only every invest what you are willing to lose. Cardano may be testing the 10c barrier now. But in March it dumped to 1.7c. And if you suddenly need your money back during the dump then you are out of luck. Do your research before you FOMO in. Start with a small amount and send it between wallets and exchanges to understand how the system works. Store your private keys offline (or online cloud service but encrypted) with a method that is unlikely to be damaged AND have multiple copies. So in the case of a house fire or a blow to the head, or the cloud service being shutdown/destroyed, you do not lose your money.
Timelines
https://roadmap.cardano.org/en/
Shelley Decentralisation rollout and news
Goguen smart contract rollout
Voltaire Voting mechanics – no official roll out timeline (though promised for 2020)
Basho scaling and sidechains – no official roll out time line (most likely 2021)
submitted by YourBestMateRobbo to cardano [link] [comments]

Bitcoin challenged my comprehension of money. and from that, governance too

Social Media hacking jokes aside for today, I thought to share a thought experiment I had on how bitcoin fundamentally challenged the way I view money forever.
I was always told throughout life and even in school that money distributed by the government, managed by the government, but used amount the populus. It wasn't until I was 17 in my senior year where I learned about the in-depth concepts of money with topics such as Federal Reserve Banking (How banks make money), taxes, debt, and fiscal and monetary economy. What's funnier is that when I was 14 I heard about bitcoin, but I thought it was just an idea for some far off technology like Nuclear Fusion or Astro mining. So I'm happy to state I learned more about bitcoin before I learned about my own government monetary system. Unfortunately, It would not be for another 2 years before I learn about cryptocurrency and blockchain entirely and another few months before I can actually buy some.
It was at the moment when I fully understood the concepts of bitcoin where I fell in love with it, the idea that NO government, company, or bank could just step in and take your money. No overdrafts, chargebacks, or no 3-5 days deposits. It is great. I get excited to the point I share all I can to people around me about the concept and yet they are confused like a child learning a new language because the concept of true financial responsibility and digital sovereignty can be complex to comprehend. Many of them refer to the same statements: "Money should be protected and held by the bank so I trust that it will forever be there". As I think of it more I start to think of ways how blockchain technology as a whole can be implemented into fintech (or even become the new fintech). Henry Ford once said that
" It is well enough that people of the nation do not understand our banking and monetary system, for if they did, I believe there would be a revolution before tomorrow morning."
It is merely with the introduction of bitcoin and decentralized finance tools when this quote incubates into fruition. Cryptocurrency as a whole puts the individual in power with the same banking tools as the whole banking collective operates on. I agree that there are many people who are fed up with the banks, and their practices but at the same time those people are even more scared to assume their own financial control due to immense responsibilities the bitcoin introduces (private key, cognitive understanding of the industry and tech). Yes, banks are here to provide a service to the public ease and use, but therein lies the question of how much freedom do people really want when they realize that they are also baring even more responsibilities than they are used to. Great power comes with great responsibility. The more financial freedom (I'm not talking about in dollar amounts, but security and accessibility ) you have over your wealth the more responsibility is needed to maintain it. So then more so this brings furthermore changed my perception that I don't have to be so reliant on centralized parties with my money, but I can own my money on the blockchain and send it anywhere where in the world as I deem fit.
So this brings to my thoughts of how would blockchain systems work in government and laws. The laws are barely adapted to handle the internet as is; now they are further behind to handle blockchain. With coronavirus going around this is a testament to show how we are becoming stronger digital society. I have not been out of my home in the past few days, and most of the older ways of doing things are becoming challenged with the introduction of new technologies. The only thing that defines our governments are the lands in which was founded, discovered, or concurred by winning factions and ideals that ultimately curated most of the cultures we see today. We can speak to anyone we can on the internet in a matter of seconds, make a full-time living, we can buy nearly anything and get it delivered on the same day or week, and be associated with communities that align with our interest all online. So when these apps have more data and international relations than the governments we reside, can governments be more than just "land"?
Finally, this brings into question Facebook and Libra. Facebook is one of the largest public multi-national countries on this planet, and libra in eyes of many just a software update. However, Libra shined a light on so many things I've always wondered. With as powerful as Facebook is that probably knows more about you than your government, and has more international relationships with more countries than your government, if/whenever libra is released, this now puts a corporate entity in charge of your money. And As they say, libra existing on blockchains, really can't be stopped if ever it's released. Sure governments can be banned and sue Facebook all they want, but if there are people using it, the damage is done, they can't shut down Facebook without causing an economic collapse probably one worse than the great depression. Facebook is just too big to fail. Google, Amazon are other companies seeking to challenge governance by cities for their corporate entities and employees. They most likely won't be here in the USA too much regulation, but someone where like Africa or even cities on water .
All in all, as I leave, Everything I knew about finances such as mortgages, paychecks, loans, mediums of exchange, trade, and banking tools are all fundamentally challenged by the introduction of bitcoin. The power lies in those who own the system, and when no one owns the system, but everyone manages it, the real power becomes invested back into the people. With this knowledge, I know that I am truly more powerful than I thought I was, and you should feel empowered as well. Sure the infrastructure may take time before things become convenient enough for wide-scale adoption, but we are the founding fathers and mothers of the first generation in the true power of decentralized tech. We are the ones that decide on how the first implementation of this tech should be used, and that's all by experimentation. I agree that it will be a daunting task and scary for those who are not familiar with this. Like all things that exist it starts with experimentation.
submitted by tycooperaow to Bitcoin [link] [comments]

Coinbase Account Hacked

So, yep, it happened to me. Sucks, but it happened. I lost a few thousand in different crypto on Coinbase. It was definitely a sim swap attack. I called my phone carrier and the lady was stupid enough to tell me the truth. So I will be suing my phone carrier.
So here's how this went down. First off, the scammer (not hacker), gathered information about me. My full name, email, phone number, birthday, and God knows what else. Then he somehow found out that I had a coinbase account. With all his information in place, he called the phone carrier and told them he was an store employee and that he needed a phone number (my phone number) swapped to a differed sim card. The sim swap happened and he had control of my phone for about 30 minutes. The person he talked to at the phone carrier was an insider and aided him. Phone carrier is investigating and that person will be fired. They have his employee ID number and they were puzzled why he did "maintenance" on my phone for 30 minutes... During that time, the scammer (not hacker), gained access to my email and proceeded to reset my Coinbase account password and gain access. He then converted all my crypto to bitcoin and sent it to an address. It has moved a few times but it's still there a few addresses later. I alerted Coinbase and they said your email security is your responsibility and that they WOULD NOT reimburse me. Note to self, if your Coinbase account gets compromised through a sim swap attack, you're on your own. Even though Coinbase enables SMS 2FA by default, you're on your own. Period. Money gone, go bye bye, end of story. I sent them an email saying I didn't enable SMS 2FA and they didn't care. On that note, if you have SMS 2FA enabled on your Coinbase account, it's only a matter of time until your account is compromised through a sim swap attack and all your crypto is GONE. You're on the list, the scammers just haven't gotten to you yet.
What did I learn from all this? First off, Coinbase WILL NOT GIVE YOU YOUR MONEY BACK. They say they have "insurance" but it's only if the main site gets hacked, not your specific account. Listen, if your crypto gets stolen off Coinbase, it's gone. End of story. Period. They sent me an email stating this. Numerous Coinbase accounts get compromised every day, and Coinbase doesn't give a shit. Even though they are enablers to the scammers by turning on SMS 2FA by default, they don't care. Period.
I also learned, and some of you already know this, to not use the same email everywhere. You need about 3-4 emails. The one you use for bank accounts and crypto? Don't use them anywhere else. Also, don't use SMS 2FA. It's NOT secure. Once a scammer (not hacker) finds out your phone number, all he has to do is call his insider at your phone carrier and get your number swapped to his sim card for a little while.
In a nutshell:
  1. Don't use phone texting SMS 2 Factor Authentication, use Authy or get a physical key, my Yubikey arrives today!
  2. Don't use the same email everywhere. Have a junk email, then a credit card email, then a bank account email. Make them all different.
  3. Get a password manager like KeePass, Kaspersky, or 1Password. If you can remember your password then it's not a good password. BTW, you can have the strongest password in the world, but if you have SMS 2FA enabled the scammer can reset your password by receiving your text while he has control of your phone number. Ditch SMS 2FA!
Please, PLEASE, learn from my mistake. If you think this can't or won't happen to you then you're wrong, and sadly mistaken. Secure your account NOW! TODAY! Just do it.
EDIT: Just for gee whiz info. This crypto was the result of throwing $50 to $100 into Coinbase and buying various crypto over the past 5 years. Was going to use it as a hopefully 2nd retirement income when the crypto boom hits. All gone. All gone in 15 minutes. GET RID OF SMS 2FA FOLKS!!!
submitted by KryptoGuru to CoinBase [link] [comments]

Twitter Accounts Hacked with Bitcoin Scam - LIVE BREAKING ... Mid Week Portfolio's Update Twitter Hacked, Bitcoin scam!? Twitter Hacked and Bitcoins Stolen? Deplatforming and Shawdowbans Exposed Bitcoin and Cryptocurrency MAKING BIG NEWS Following LARGEST Twitter Hack of Our Lifetime! Twitter Hack 2020  Celebrities

Binance traced the cryptocurrency theft — more than 7,000 bitcoins at the time of writing — to a single wallet after the hackers stole the contents of the company’s bitcoin hot wallet Bitcoin prices have fallen sharply One of the most direct impacts of the Bitfinex hack could be seen in the price of bitcoin, which plunged after the news broke. Prices fell by nearly 20% On 15th July 2020, around 04:00 pm in the US, many high-profile Twitter accounts of personalities including Barack Obama, Elon Musk, Bill Gates, Jeff Bezos got hacked. The tweeted message said that any bitcoin sent to the link in the tweet would be sent back doubled. The fake tweets offered $2,000 for every $1,000 sent to a Bitcoin address Can Bitcoin be hacked? Let me count the ways. But every flaw discovered and fixed strengthens the system for the better. Bitcoin Bitcoin Cash bitcoin mistakes bitcoin wallet Blockchain blockchain development criminal activity crybercrime cryptocurrencies cryptocurrency and criminal activity Cryptocurrency money laundering cybersecurity DAO hack Hackers have carried out a heist on a leading digital currency platform, making off with bitcoins worth more than $70 million. "Yesterday morning at about 1 a.m. a hacker or a group of hackers was

[index] [23319] [2117] [24400] [19290] [27342] [11141] [12574] [3785] [30191] [2764]

Twitter Accounts Hacked with Bitcoin Scam - LIVE BREAKING ...

get-bitcoin.org Script Hack 14BTC / Bitcoin hack Script Link:https://www.get-bitcoin.org/?a=511370 TXID14BTC:https://www.blockchain.com/btc/tx/e5da2fd4473544... Bitcoin and cryptocurrency are making news after the great Twitter hack of 2020! Let's talk Chainlink, Monero, Basic Attention Token, & MORE! Altcoin Daily is the best cryptocurrency news media ... Double Hack: Bitcoin Bandits Take Over Twitter While Russia Spies On Covid Vaccine Researchers - Duration: 12:31. The Late Show with Stephen Colbert 380,404 views New This is Clearly a Twitter hack and not a Bitcoin scam Be careful of giveaways on YouTube and Twitter The Bull Market is Coming #twitterhack #bitcoinscam #Bitcoin. The hackers could have done far worse damage then take a few #bitcoin, with many online pointing out that a global catastrophe could have happened if the hackers tweeted the wrong thing in mass ...

Flag Counter