Dark Web Hitman Services Sites Links - DarkWebMagazine

Scammer trolling clueless journo: "Hitman Network Says It Accepts Bitcoins to Murder for Hire"

Scammer trolling clueless journo: submitted by deepdot to DeepDotWeb [link] [comments]

Hit by the notorious BitcoinMining virus

Hey everyone! My PC is currently infected with a Bitcoin Mining virus and I'm just looking around if there are still steps to take in order to fight this curse orinevitably go for the easy route and just wipe and reformat. Any help is appreciated, thanks in advance!
How it happened:
The virus successfully injected itself into my computer masking itself as an Nvidia application. I was working, and suddenly an Nvidia update ran but it was running with cmd, so it was a bit sketchy. But it was my mistake that I ignored it. It was able to inject itself into the registry, and powershell to run its network activities through that phase. This was left unchecked for about 2 hours, by then it had already completed its download and was running autonomously in the background. I turned on Task Manager, but would only show in "less detailed" mode. Once clicked on more details, it forces itself close.
Current Status:
Successfully located the directory of the virus in C:/ProgramData. Size is about 2.8GB, attempted to delete but cannot fully since there are tasks still running in the background. The file is now about 8 MB. Malwarebytes has successfully blocked it from re-downloading in the background. It's somewhat a vaccine, I still have the virus in the PC, but it's in a dormant state because of it's network restrictions.
It's shown to be running through powershell to do its network activities and registry editor to block out task manager and run autonomously in the background. Are there steps to try and remove this thing from the registry editor and also the powershell?
Softwares Used:
Windows Defender - Detects virus, attempts to remove, but redetects soon after removal.
Malwarebytes - Detected virus, removed virus, does not detect virus anymore even if it still here but successfully blocks it from using network activities.
rkill - No detections at all.
HitmanPro - No detections at all.
Spybot - Still currently scanning.
Observations:
Accessed HKEY_CURRENT_USEMicrosoft/Windows/CurrentVersion, somewhere along there and injected lines to run files ending with .vbs (was the first stage).
Signs of it using powershell to run its network activities.
Located in C:/ProgramData in a hidden folder named "NVIDIA Corporation." File size is about 2.5GB - 2.8GB when it's successfully downloaded all its files.
Inside the folder you will find a lot of NVIDIA logs to make it appear legit, although there a lot of .json as well.
Running Tasks:
NVIDIA Web Helper.exe (Im assuming this is the mother task since I can't fully delete "NVIDIA Corporation" folder because of this task).
-> "C:\Program Files (x86)\NVIDIA Corporation\NvNode\NVIDIA Web Helper.exe" index.js
Questions:
If there is no hope left, and I am forced to reformat. Do I need to reformat both my drives or do I only reformat the boot drive?
Is there any way to combat these network activities with cmd prompt or powershell?
If it has injected itself to registry editor, can you alter that?
SOLVED: Thanks to the people at Bleeping Computer. Here is the link if anyone has the same infection:
https://www.bleepingcomputer.com/forums/t/721015/help-bitcoin-mining-virus-masked-as-an-nvidia-application
submitted by rizzeeeh to techsupport [link] [comments]

WWYDI a guy named Rifter tries to take over the multiverse?

On a desert planet named Planet Riftia, there lives a man named Rifter (original character). Rifter can open dimensional rifts, fly, and is invulnerable, physically strong, and highly intelligent. He doesn't need to eat, sleep, drink or breathe. He's 5 foot 10 inches tall.

Rifter decides to take over the multiverse. To do that, he must take the most important object from each universe and place it in his own universe. After he has done that for every universe, he will gain total omnipotence over the multiverse, and he'll be truly unstoppable.

An example of the 'most important object of the universe' would be the Triforce from The Legend of Zelda, or the Chaos Emeralds from Sonic.

The universes Rifter will try to take over are:
planet riftia (Rifter's home universe), real life, super mario, the legend of zelda, CDI zelda, pokemon (main series games), pokemon (main series anime), pokemon origins, pokemon (main series manga), sonic, sonic boom, sonic the comics, crash bandicoot, halo, call of duty, earthbound, undertale, five nights at freddy's, fnaf world, superman 64 (game), DC cinematic universe, superfriends (cartoon), Marvel cinematic universe, ghostbusters, ghostbusters (2016), pac man, mega man (classic timeline), mega man fully charged, mega man (battle network timeline), bomberman, the lego movie, scooby doo, super meat boy, rage comics, wreck it ralph, skylanders, teen titans, teen titans go, the a-team, knight rider, the goonies, mortal kombat, street fighter, blend s, vocaloid, utau, spyro the dragon, simpsons, futurama, harry potter, fantastic beasts and where to find them, lord of the rings, mission impossible, gremlins, gnomeo and juliet, powerpuff girls, powerpuff girls Z , powerpuff girls (2016), beetlejuice, my little pony friendship is magic, black rock shooter (song), black rock shooter (anime), black rock shooter (psp game), midway arcade, portal, plants vs zombies, machinarium, rock em sock em robots, baldi's basics, puzzle puppers, crane game toreta, snipperclips, tetris, Madou Monogatari, puyo puyo, kirby, lego city undercover, ninjago, chima, nexo knights, diary of a wimpy kid (books), diary of a wimpy kid (movies), poptropica, poptropica worlds, poptropica (comics), resident evil, peanuts, robot chicken, scribblenauts, splatoon, arms, bee movie, shrek, octopath traveller, bubsy, fifa, drawn to life, drawn together, toy story, a bug's life, finding nemo, wall-e, the good dinosaur, inside out, captain underpants (books), captain underpants (movie), timmy failure, spongebob, the loud house, fairly oddparents, invader zim, cow and chicken, samurai jack (original), samurai jack (reboot), adventure time, regular show, steven universe, clarence, uncle grandpa, plague inc, sailor moon, sailor moon crystal, ghost trick, ace attorney, professor layton, looney tunes, yu gi oh, beyblade, yo kai watch, cars, team fortress, half life, the sims, cory in the house, annoying orange, my hero acadamia, mr. peabody and sherman, e.t the extra terrastrial, back to the future, rick and morty, family guy, doki doki literature club, angry birds, fruit ninja, jetpack joyride, out there, akinator, dragon ball, dragon ball z, lego dimensions, super smash bros, star wars, charlie and the chocolate factory, willy wonka and the chocolate factory, lonely wolf treat, syrup and the ultimate sweet, first kiss at a spooky soiree, romance detective, tunnel vision, kaima, her tears were my light, mermaid splash passion festival, the twilight zone, disaster log c, yandere simulator, yanderella, mikoto nikki, mix ore, the dark side of red riding hood, makoto mobius, you me and empty words, shihori escape, tsukimi planet, full boko youchien, love live, menhera fresia, roco kingdom, sai er hao, mole, hawaiian slammers, planes, frozen, tangled, one piece, fairy tail, naruto, persona, digimon, no matter how i look at it, it's you guys fault i'm not popular, i can't believe my little sister is this cute, idolmaster, highschool dxd, hihi puffy ami yumi, momoe link, minecraft, minecraft: story mode, locked heart, confess my love, transparent black, nintendo badge arcade, swapdoodle, world of goo, rayman, little inferno, amazing alex, banjo kazooie, yooka lele, sly cooper, RWBY, despicable me, minions, WWE, nomad of nowhere, bravest warriors, xenoblade, punch out, contra, silent hill, tokimeki memorial, spelunker, spelunky, zork, bit trip, VVVVVV, runman race around the world, N, princess tomato in the salad kingdom, hitman, tomb raider, metal gear solid, fire emblem, animal crossing, metroid, gradius, zone of the enders, parodius, i wanna be the guy, jumper, braid, alien hominid, castle crashers, charlie murder, the emoji movie, castlevania, animator vs animation, brave, hello neighbor, the storey treehouse, wacky game jokez 4 kidz, nightmare before christmas, bayonetta, mii channel, warioware, donkey kong country, yoshi, unikitty, sword art online, squid girl, slenderman, the flintstones, berenstain bears, the jetsons, okami, sushi striker way of the sushido, shovel knight, kid icarus, jurrasic park, tom gates, paper mario, art academy, fortnite, player unknown's battlegrounds, fallout, the land before time, doctor who, the lego batman movie, himegoto, marchen madchen, bojack horseman, total drama, toradora, one punch man, attack on titan, pleasant goat and big big wolf, full metal alchemist, the wizard of oz, super smosh, alfred and poe, dev guy, valentine panic, seduce me the otome, trick and treat, haruka winter dreams, scratch, 9 (film), 9 (video game), problem solverz, animal inspector, liar liar, love or die, misSHAPEn love, pervert&yandere, paper roses, bookSLEEPer, heartbaked, lads in distress, telletubbies, thomas the tank engine, the walking dead, the big bang theory, 13 reason why, f.r.i.e.n.d.s, gumby, gravity falls, welcome to the wayne, tom and jerry, baka to test, golden time, searching, taken, charming, ballerina, home improvement, the sandlot, flappy bird, swing copters, earth chan, turbo, pocket protectors, boxboy, barefoot bandits, letter quest, overcooked, hydlide, oh sir!, taco man plays a video game, taco man the game master, pepsiman, buck bunny, voez, deemo, cytus, kitten squad, super mario logan, dr. stone, bee and puppycat, over the garden wall, star vs the forces of evil, power rangers, danny phantom, jimmy neutron, dexter's lab, foster's home for imaginary friends, chowder, the amazing world of gumball, we bare bears, felix the cat, bendy and the ink machine, outbreak company, tokyo mew mew, madoka magica, card captor sakura, ghostmates, boxman (original), boxman (comics), that damn neighbor, bunsen is a beast, coco, monsters inc, monsters university, the incredibles, spirited away, becky prim, kim possible, meet the robinsons, the little mermaid, robin hood, zootopia, taiko drum master, alien, the lego ninjago movie, what would you do, jersey shore, monty python, gundam, the muppets, alf, neon genesis evangelion, the x files, godzilla, final destination (film), ice age, lilo and stitch, robocop, the terminator, saw (film), the purge, 50 shades of grey, tron, dead space, overwatch, the king of fighters, ratchet and clank, jak and daxter, tekken, a boy and his blob, ace combat, adventure island, adventures of lolo, aero the acro-bat, ape escape, asteroids, battletoads, spooky's house of jumpscares, the call of cthulhu, chibi robo, frankenstein, dracula, boku no pico, burgertime, citrus, putt putt, pajama sam, prison tycoon, roller coaster tycoon, restaraunt empire, frogger, freddi fish, fatty bear, spy fox, gal gun, game and watch, guitar hero, rock band, the man with the invisible trousers, the curious case of benjiman button, passpartout, just dance, sega hard girls, kinectimals, left 4 dead, life is strange, littlebigplanet, loveplus, nights, naughty bear, ted, houdini (french animated movie), q bert, pixels (movie), touhou project, toejam and earl, the oregon trail (game), the organ trail, yakuza (game), mall tycoon, zoo tycoon, yukon trail (game), detention (game), the nutshack, lazytown, purgatory (game), desolate village, the desolate hope, the pilgrim's progress, the holy bible, captain bible, bad milk (game), journey to the west, captain toad, death squared, buddhism (religion), jewism (religion), islam (religion), hinduism (religion), taoism (religion), mormomism (religion), watch_dogs, sleeping dogs, paletta, wrecking crew, sara is missing, simulacra, welcome to the game, rides with strangers, a normal lost phone, mogeko castle, wahanodora and the great blue sea, little nightmares, little einsteins, sally face, fran bow, kick the buddy, super planet dolan, dr. jekyll and mr. hyde, phineas and ferb, big nate, nate is late, the ring (horror movie), inanimate insanity, my little pony equestria girls, winx club, tinkerbell, sausage party, the hobbit, duck hunt, starfox, f-zero, enchanted (disney movie), roblox, hearthstone, talking tom, crossy road, granny (horror game), the titanic (movie), dexter (show), how i met your mother, el tigre, mucha lucha, the book of life, cuphead, water world (movie), gradeaundera, foodfight, cyanide and happiness, jojo's bizzare adventure, the grim adventures of billy and mandy, the brave little toaster, fusionfall, playstation all stars battle royal, scott pilgrim vs. the world, club penguin, sonic.exe, pivot stick animator, mr. bean, skitzo, captain n the game master, detective pikachu, pokemon mystery dungeon, waluigi travels through the multiverse, parappa the rapper, god of war, uncharted, bioshock, paperboy, gauntlet, 720°, blaster (midway), bubbles (midway), marble madness, defenders, joust (midway), klax, roadblasters, robotron, spy hunter, spy vs spy, super sprint, tomodachi life, miitomo, xbox avatars, keflings, cloudberry kingdom, girls like robots, can your pet, snail (the flash game), snail bob, drawfee, the king's avatar, king's knight, king's quest, monster bark, haunt the house, detective grimoire, sort the court, wallace and gromit, frankenweenie, atelier (games), recettear, tales of, lost sphear, peta propaganda games, cooking mama, gish, aquaria, owlboy, alex kidd, space channel 5, mighty number 9, blaster master, vroom in the night sky, azure striker gunvolt, senran kagura, disgaea, the legend of dark witch, pico's school, riddle school, clock crew, lock legion, steamshovel harry, bionicle, hero factory, lego alien conquest, x-com, chantelise, yobi's basic spelling tricks, typing of the dead, cartoon all-stars to the rescue, where's wally, where's waldo, carmen sandiego, adam ruins everything, south park, human centipede, collegehumor, kingdom hearts, king kong, friday the 13th, nightmare on elm street, edward scissorhands, batman 1966, devil may cry, final fantasy, food wars, smosh, the diamond minecart, anthony padilla, the hunchback of notre dame, teenage mutant ninja turtles, who framed roger rabbit?, the angry video game nerd, mario & sonic at the olympic games, james bond, epic (movie), dance dance revolution, ed edd n eddy, hey arnold, codename: kids next door, galactic kids next door, back to backspace, big city greens, danger planet, 12 forever, infinity train, jack and jill (adam sandler), red dog, red dog true blue, air buds, 101 dalmations, good mythical morning, element animations, an egg's guide to minecraft, black rhino ranger, the suite life of zack and cody, that's so raven, milo murphy's law, even stevens, pete and pete, malcom in the middle, hotel transylvania, ducktales, elena of avalor, sofia the first, the proud family, the emporor's new groove, american dragon: jake long, fanboy and chum chum, fish hooks, smart house (movie), invisible dad (movie), tender loving care, my magic dog (movie), boy meets world, sabrina the teenage witch, shorty mcshort's shorts, shezow, call of duty dog (web animation), sonic for hire, video game violence saves the world from violent video games (web animation), reading rainbow, hey this is library, doge, nyan cat, wolfychu, lilypichu, emirichu, theodd1sout, domics, jaiden animations, game theory, dorkly, pokemon rusty, the greatest showman, advice animals, doodle jump, happy jump, seen (android game), color switch, agar.io, slither.io, cookie clicker, bitcoin billionare, paper.io, hole.io, sugar sugar, highschool romance, highschool romance 2: magi trials, highschool possesion, nekopara, ren'py, rpg maker, voltron: legendary defender, wander over yonder, kablam!, doug (cartoon), avatar: the last airbender, the legend of korra, garfield, calvin and hobbes, airplane safety videos, lego fan films, lego DC superheroes, lego friends, fl studio , stack up, gyromite, the texas chainsaw massacre, ice climber, captain commando, marvel vs capcom, cartoon network punch time explosion xl, dr. horrible, papers please, blocksworld, iron pants, happy wheels, super virgin squad, the truman show, edtv, duck life, the everyday ordinary adventures of samamtha browne, cinderella phenomenon, our home (visual novel), a day in the life of a slice of bread, a(t)rium, date almost anything sim, [email protected], stalker & yandere, tealy and orangey, geometry dash, the joy of creation, five nights at candy's, those nights at rachael's, five night's at wario's, wario date, duck season (vr horror game), the horribly slow murderer with the extremely inefficient weapon, mcdonald's, the karate kid, llamas with hats, the misfortune of being ned, super hexagon, perfect dark, dane boe, devil's world, balloon fight, h3h3productions, gnoggin, cinemasins, cinemawins, yo gabba gabba, crazy frog, angels of death (rpg), imaginary friends (rpg), pocket mirror (rpg), cherry tree high comedy club, pony island, huniepop, huniecam studio, tattletail, corpes party, friendship (horror rpg), aria's story (rpg), 1bitheart, leftway, tim's birthday, ib (game), glitched (rpg), amnesia (game), the stanley parable, long live the queen (visual novel), draw a stickman, qwop, girp, papa's (flash game series), whale trail, 5 minutes to kill yourself, doodle god, free icecream (flash game), fancy pants adventure, fireboy and watergirl, 60 seconds (game), 60 parsecs, getting over it with bennet foddy, sexy hiking, i am bread, surgeon simulator, rapeley, mr. mosquito, cubivore, the guy game, custer's revenge, e.t (atari 2600), pizza chef (atari 2600), black and white (game), postal (game), hatred (game), leisure suit larry, jones in the fast lane, manhunt, hatoful boyfriend, bully (game), night trap, mass effect, house party (game), who's your daddy? (game), second life, shower with your dad simulator, what's under your blanket!? (game), battle raper, The Maiden Rape Assault: Violent Semen Inferno, witch trainer, hetalia, ouran high school host club, rinse and repeat (game), wikia, deviantart, mystic messanger, moemon (a pokemon rom hack), segagaga, football manager (sega), crossfire (first person shooter), flicky, captain novalin, sega bass fishing, hiragana pixel party, captain rainbow, wonderful 101, the elder scrolls, scrolls (mojang), colbalt (mojang), candy crush saga, sharknado, who killed captain alex, archie comics, smokey bear, mcgruff the crime dog, smosh the movie, hell's kitchen, neighbours from hell (game), neighbors from hell (animated show), danganronpa, veggietales, oishi high school battle, teleporting fat guy, smosh babies, planets (shut up cartoons), the day my butt went psycho (tv show), the day my bum went psycho (books), what's with andy, the andy griffith show, leave it to beaver, pikmin, face raiders, part timers (smosh), trollface quest, coraline, alladin (disney), chibi miku san, dreams (when you sleep), vsauce, kilarin revolution, stellar theater, hanazuki: full of treasure, penn zero: part time hero, the croods, shawn the sheep, shakugan no shana, early man, walking with dinosaurs, league of angels, league of legends, world of warcraft, starcraft, stardew valley, rune factory, harvest moon, botanicula, fingered (game), love live, highschool dxd, lucky star, akame ga kill, kill la kill, cowboy bebop, mmo junkie, KonoSuba: God’s Blessing on this Wonderful World!, Natsuiro High School: Seishun Hakusho, Summer-Colored High School ★ Adolescent Record — A Summer At School On An Island Where I Contemplate How The First Day After I Transferred, I Ran Into A Childhood Friend And Was Forced To Join The Journalism Club Where While My Days As A Paparazzi Kid With Great Scoops Made Me Rather Popular Among The Girls, But Strangely My Camera Is Full Of Panty Shots, And Where My Candid Romance Is Going, short circuit (film), boyhood (film), honey, i shrunk the kids, in another world with my smartphone, wizard 101, sociolitron, runescape, i was reincarnated as a sword, i was reincarnated as a magic academy, My Reincarnation as a Hot Spring in a Different World is Beyond Belief ~ It's Not Like Being Inside You Feels Good or Anything!?, island (anime), crush crush, yandere (https://vndb.org/v1303), kimi to kanojo no koi, kimi to mita sora no uta, city connection, cinders (visual novel), adventure capitalist, tiny tower, pocket plane, pocket train, pocket frogs, i am shape series, melancholic (vocaloid song), hatsune miku: unofficial hatsune mix, stargazer (vocaloid song), love trial (vocaloid song), to you of the future, i give every song, pou, my little bastard, evolution (cow evolution, platypus evolution, ect), dear diary: the secrets of anna, episode (game), kim kardashian: hollywood, campus life (mobile game), inkflow, sabreman, kameo: elements of power, it's mr. pants, whatever happened to... robot jones?, moetron, extra credits (youtuber), snakes on a plane, crazy rich asians, my strange addiction, toddlers and tiaras, soul eater, suki yuki maji magic, ultraman, the adventures of kid danger, johnny test, justice league action, youtube, brawl in the family (web comic), meteor 60 seconds, ok ko, counterstrike, boboiboy, dragonvale, crush the castle, demonic crepes, barbie, lego elves, spy kids, baby geniuses, laserblast (movie), giftpia, panel de pon, devil world, shin onigashima, nazo no murasamejo (The Mysterious Murasame Castle), nigahiga, dragon city (mobile game), clash of clans, clash royale, keep talking and nobody explodes, my life as a teenage robot, no anime penguin, gender bender dna twister extreme, inuyasha, inuyashika, scream (movie), manuel samuel, flipping death, tiny thief, boom beach, reign (game), the escapists, a hat in time, murder police, dragalia lost, aqua teen hunger force, dora the explorer, doraemon, inception, the matrix, fight club, the godfather, white chicks (movie), dumb and dumber, baseketball, the breakfast club (movie), donnie darko, the devil wears prada, darkwing duck, jaws, mean girls, the room, lost (tv show), never been kissed (movie), tarzan, the sixth sense, the help (movie), the shining, rocky (movie), sing (movie), blade runner, cut the rope, enter the ninja (1981), You only live twice (1967), surf ninjas (1993), Draw With Jazza, dork diaries, Lifeline (3 minute games), Project Hyrax, future diary, sonic the hedgehog (movie), panty and stocking, todo: today, happy heroes, asura's wrath, a certain magical index, zone archive, and 3 ninjas (1992)

Rifter will NOT gain omnipotence until he has collected the most important item from EVERY universe.

Just to clarify, Rifter only opens one rift at a time, when he's travelling to and from dimensions. He also makes rifts sometimes if he's attacking, or summoning an object he wants, or something like that. When he's done using a rift, he closes it.

However, Rifter will have to open many rifts along his journey. He opens so much rifts, that the space time continuum becomes unstable, resulting in random rifts opening and closing throughout the multiverse. Rifter isn't aware on how to make space time less unstable, so as his journey goes on, more and more random rifts will appear.

The random rifts will occur so often, that is it guranteed you will get sucked into one and experience at least 90% of the universes.

Rifter will start in his own universe. The universe he goes to first will be Real Life. After that, he'll do the rest in a random order.

Events:

What would you do in this situation?
submitted by WaffleCat3367 to whatwouldyoudoif [link] [comments]

Bit-Coin and Murder: Four Recent Cases

Some news that I googled about bit-coin implicated in alleged murder cases:
While charges have been made in those cases, the suspects should be presumed innocent until convicted -- unless it is confirmed that they are butters, of course.
submitted by jstolfi to Buttcoin [link] [comments]

Can i catch a modder with Wireshark? (PC)

April 22nd, 2017 New Working Trick to fight modders*: Reencode their mod menu executables to make it look like a virus on VirusTotal.com, causing their own mods to get deleted by Windows Defender:
https://github.com/tanc7/ModMenuPoisoneraw/masteModMenusRuined.jpg
Isn't that sexy?
It's a really simple trick too! Here is a How-To-Video:
https://raw.githubusercontent.com/tanc7/ModMenuPoisonemasteHowToUseModMenuPoisoner.webm
You need Kali Linux with Metasploit Framework Installed, a VM version for simple users is right here:
https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/
Then download VirtualBox:
https://www.virtualbox.org/wiki/Downloads
Then run VirtualBox with Kali Linux as a virtual machine and download my toolkit:
https://github.com/tanc7/ModMenuPoisoner
  1. Copy/paste the unzipped file directory of the mod menu
  2. Take the re-encoded file that now looks like a virus and submit it to VirusTotal: https://virustotal.com/
  3. Wait up to 2 to 3 weeks, eventually a antivirus update is pushed to users on Windows 8 and 10 machines, Windows Defender will auto-flag the menu executable as a virus and "kill it".
Video: Installation my Mod Menu Poisoner in Kali Linux, for total Linux Newbies
https://raw.githubusercontent.com/tanc7/ModMenuPoisonemasteHowToInstallandUseForTotalNewbies.webm
OLD STUFF
I rewrote the post after my discovery of how the network traffic works. The answer in short, unfortunately, is NO. But R* can detect it. I will assure you.
From several tests, there are NO distinguishable traffic from the UDP protocol, in a public lobby that allows you to identify a modder, if you are being harassed by one.
However, I tested two mod menus on my decoy account (I have two Steam accounts, and two Rockstar Social Club Accounts). The one thing that is significant is that there is a suspicious communication to the Rockstar servers. Mod menus generate DTLSv1.0 packets. Sent to Rockstar's servers at "192.81.241.100 prod.ros.rockstargames.com". Playing the game legitimately, no DTLSv1.0 packets are sent. But if you load a mod menu, Rockstar knows.
The problem is, it is traffic going to the dedicated Game Service Servers. You, as a random person in a public lobby, will not be able to see it.
TLDR... Let Rockstar catch and ban modders. You will never find them
They are doing a pretty decent job. According to MPGH chatter, since four days ago a lot of the mod developers are pulling out of implementing money hacks into the game. As they cannot find a way to get past R* Anticheat yet. http://www.mpgh.net/forum/forumdisplay.php?f=414
I tested the one with the "Safe Money Drop". My decoy account got banned for 30 days.
But you could be a real creepster. And tell people with unprotected (no VPN no proxy) internet connections, what city and state they live in. That still works.
How to do that? I tested it on 5 different people already, all my friends.
In-game, you have to be following the player around. The closer you are with the player, the more bytes are generated and sent between your IP and theirs. That helps you distinguish their IP from anyone else's.
Now
Start Wireshark capture Statistics Endpoints Bytes Tab (Sort by highest) Your highest NON-LOCAL IP on ports 6672 (UDP, most players have traffic through this) is the player's IP
Using that IP, you can choose to either click the Name Resolution Checkbox on the bottom left of the Endpoints window. Or, you can just Google it.
The potential of this vulnerability? DO NOT DO THIS
Lets say you wanted to be a douchelord or something, and you don't like another player. Keep GTA V running in Windowed Mode, fire up wireshark, start capture. Locate the player IN-GAME and follow him around for at least one or two minutes.
After you positively identified the player's IP (using the bytes-captured method on port 6672), you can attack it with a subscription DDoS/DoS Botnet provider. Also known as a "stresser" or "booter" for obvious reasons. (Note: they only accept either BitCoin or PayPal, I hate both of them). A few examples...
(1) Defiance Protocol
(2) Thunder Stresser
(3) PolyStress
(4) Stress3d.me
(5) DataBooter
(6) ExoStresser
What does it do if you choose to do this?
Well, first of all, even though they are known as booters or stressers, they initiate a Denial of Service attack on the victim machine. That means even if you left the session (you better), you can initiate the attack. It will shutdown their entire home network for a X amount of ms, just enough to kick someone, including the host of the lobby, out of the session.
All you need to know to launch the attack is...
(a)The IP address of victim machine
(b)The Port you want to attack (port 6672)
(c)The method of attack (chose one that is relevant to the protocol), like TCPStorm, DOMINATE, SYNFLOOD, etc.
Seriously, don't do it. All I figured out is how to stalk my friends on GTA V. I have yet to even learn how to decrypt the captured GVSP data. If you want to catch modders on your own, you need to crack that hash. Seems like there is a new key generated a session. Hopefully R* in GTA VI will patch this vulnerability.
GOOD LUCK,
DON'T DoS people,
and GO sign up for a VPN or Proxy, RIGHT NOW.
Stuff Online on DTLSv1.0 Traffic
https://wiki.wireshark.org/DTLS
DTLS is a SSL Protocol that is compatible through UDP. It can be used to create SSH Tunnels back to R* Servers.
Since the last thing a mod developer wants to do is give R* all of your info willingly, I am assuming that this DTLS traffic is part of the anticheat mechanism implemented by R*.
DTLS traffic, as of yet, cannot be filtered by capture alone. However, you simply just look at the packet, and then filter the UDP traffic and port to display the majority of DTLS traffic.
Example Packet Summary:
Modder Machine To RockstaTake Two Interactive, New York, New York Upon Use of a Mod
Frame 204: 151 bytes on wire (1208 bits), 151 bytes captured (1208 bits) on interface 0 Interface id: 0 Censored TO Avoid MAC Ban Encapsulation type: Ethernet (1) Arrival Time: Jan 19, 2017 18:23:39.836486000 Pacific Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1484879019.836486000 seconds [Time delta from previous captured frame: 0.002543000 seconds] [Time delta from previous displayed frame: 0.002543000 seconds] [Time since reference or first frame: 1.598633000 seconds] Frame Number: 204 Frame Length: 151 bytes (1208 bits) Capture Length: 151 bytes (1208 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:udp:dtls] [Coloring Rule Name: UDP] [Coloring Rule String: udp] Ethernet II, Censored TO Avoid MAC Ban Internet Protocol Version 4, Src: 10.0.1.113 (10.0.1.113), Dst: prod.ros.rockstargames.com (192.81.241.100) User Datagram Protocol, Src Port: 58016 (58016), Dst Port: 61457 (61457) Datagram Transport Layer Security
Modder Machine To Victim Machine Upon Giving Him All Weapons from Mod Menu. Victim is from Miami, Florida
Frame 210: 101 bytes on wire (808 bits), 101 bytes captured (808 bits) on interface 0 Interface id: 0 Censored TO Avoid MAC Ban Encapsulation type: Ethernet (1) Arrival Time: Jan 19, 2017 18:23:39.887777000 Pacific Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1484879019.887777000 seconds [Time delta from previous captured frame: 0.000169000 seconds] [Time delta from previous displayed frame: 0.000169000 seconds] [Time since reference or first frame: 1.649924000 seconds] Frame Number: 210 Frame Length: 101 bytes (808 bits) Capture Length: 101 bytes (808 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:udp:gvsp] [Coloring Rule Name: UDP] [Coloring Rule String: udp] Ethernet II, Censored TO Avoid MAC Ban Internet Protocol Version 4, Src: 10.0.1.113 (10.0.1.113), Dst: c-75-74-37-8.hsd1.fl.comcast.net (75.74.37.8) User Datagram Protocol, Src Port: vision_server (6672), Dst Port: vision_server (6672) Source Port: vision_server (6672) Destination Port: vision_server (6672) Length: 67 Checksum: 0x7c17 [unverified] [Checksum Status: Unverified] [Stream index: 2] GigE Vision Streaming Protocol Undecoded byte number: 50 (0x0030+2) Undecoded byte number: 51 (0x0030+3) Undecoded byte number: 52 (0x0030+4) Undecoded byte number: 53 (0x0030+5) Undecoded byte number: 54 (0x0030+6) Undecoded byte number: 55 (0x0030+7) Undecoded byte number: 56 (0x0030+8) Undecoded byte number: 57 (0x0030+9) Undecoded byte number: 58 (0x0030+10) Undecoded byte number: 59 (0x0030+11) Undecoded byte number: 60 (0x0030+12) Undecoded byte number: 61 (0x0030+13) Undecoded byte number: 62 (0x0030+14) Undecoded byte number: 63 (0x0030+15) Undecoded byte number: 64 (0x0040+0) Undecoded byte number: 65 (0x0040+1) Undecoded byte number: 66 (0x0040+2) Undecoded byte number: 67 (0x0040+3) Undecoded byte number: 68 (0x0040+4) Undecoded byte number: 69 (0x0040+5) Undecoded byte number: 70 (0x0040+6) Undecoded byte number: 71 (0x0040+7) Undecoded byte number: 72 (0x0040+8) Undecoded byte number: 73 (0x0040+9) Undecoded byte number: 74 (0x0040+10) Undecoded byte number: 75 (0x0040+11) Undecoded byte number: 76 (0x0040+12) Undecoded byte number: 77 (0x0040+13) Undecoded byte number: 78 (0x0040+14) Undecoded byte number: 79 (0x0040+15) Undecoded byte number: 80 (0x0050+0) Undecoded byte number: 81 (0x0050+1) Undecoded byte number: 82 (0x0050+2) Undecoded byte number: 83 (0x0050+3) Undecoded byte number: 84 (0x0050+4) Undecoded byte number: 85 (0x0050+5) Undecoded byte number: 86 (0x0050+6) Undecoded byte number: 87 (0x0050+7) Undecoded byte number: 88 (0x0050+8) Undecoded byte number: 89 (0x0050+9) Undecoded byte number: 90 (0x0050+10) Undecoded byte number: 91 (0x0050+11) Undecoded byte number: 92 (0x0050+12) Undecoded byte number: 93 (0x0050+13) Undecoded byte number: 94 (0x0050+14) Undecoded byte number: 95 (0x0050+15) Undecoded byte number: 96 (0x0060+0) Undecoded byte number: 97 (0x0060+1) Undecoded byte number: 98 (0x0060+2) Undecoded byte number: 99 (0x0060+3) Undecoded byte number: 100 (0x0060+4)
Update: The Solo Public Lobby Glitch Works (Somewhat)
https://www.reddit.com/gtaonline/comments/4n8094/tip_if_you_are_on_pc_block_these_ports_using_you?ref=share&ref_source=link
So this was months old, and its a archived post but basically he says you can glitch yourself into a SOLO public lobby by blocking your game ports to R*'s servers.
That is only partially correct by now, January 20th 2017. The game will still attempt to connect to you to a filled public lobby, BUT, it will be much less populated.
Now you need to block both inbound and outbound communications on UDP ports on..
(His Original Post) Select UDP and put in these ports 6672, 61455, 61457, 61456, 61458 These are R* game server ports and select next.
Through the Windows 10 Firewall Settings.
You should have Firewall running at all times anyways. Even though my Airport Extreme already has a smart firewall installed.
Windows Firewall Settings
https://scontent.flas1-1.fna.fbcdn.net/v/t1.0-9/16195900_402016770142664_9185237840131020577_n.jpg?oh=cec83e04c1fa93cd3402702a5b8b867f&oe=591C283E
These are the settings you must have on Windows Firewall, on Windows 10.
Make one rule for INBOUND and one for OUTBOUND. You can do this while playing the game.
Set them to enabled and change session. You should be on a new lobby with MUCH LESS PLAYERS. Keep Lobby-Surfing until you end up alone or the other people leave.
My Wireshark capture tells me that the only other player in the game is connected to me via UDP 35464. He eventually left. Leaving me in a session by myself.
It won't guarantee you a solo lobby anymore, but it makes it much rarer for packed lobbies with modders and jet griefers.
If you are feeling lonely, then disable those firewall rules and switch session again.
I still have a UDP connection via 6672 despite the rules. My wireshark picks up no traffic at all though.
Hmm interesting. If you block your traffic it now generates DTLSv1.0 traffic (like modder traffic) to Rockstar at 192.81.241.100. There is also a lot more TCP traffic through Port 80 (but its still obfuscated). And it is going through my blocked UDP ports in the new firewall rules. It basically SSH tunneled through UDP directly to R*. So it's just me and their gameserver. No one else.
Well the admins know I am not cheating. They prolly think I have a lousy internet connection or a jerk of a admin (they think) who doesn't want me to use UDP gaming ports. I am not worried at all.
If you wanna sell all of your shit without being picked on. Then do this,
enable the firewall rules both inbound and outbound,
sell your shit,
and then disable them and switch sessions again so you won't be lonely anymore.
Here are the packet captures that I am WILLING to share. Basically it shows two things.
R* Will open a SSH tunnel secret in at least TWO conditions
(1) If you are modding. There will be a SSH Tunnel created using the DTLSv1.0 protocol on your UDP ports. Telling R* what you are doing if your game traffic looks suspicious
(2) If you are using the firewall glitch, the game will get around your Windows Software Firewall and start connecting to R* with the SSH tunnel.
https://drive.google.com/file/d/0B5Beow8WOgBFODJJNTN0d3VGYW8/view?usp=sharing
For #2 if you check on my packet capture links, even though I told Windows Firewall to block that UDP port, packets were sent through anyways as DTLS traffic. I have yet to be banned for this.
This ensures that R* can still save my data. And you get to have less populated and/or totally alone sessions so you can play the damn game!
And here is a example of normal traffic. Me and three of my friends in a 4-player Survival Game
https://drive.google.com/file/d/0B5Beow8WOgBFRU1veG52N1VCZkU/view?usp=sharing
Edit: Uploaded a 38 minute video, soloing biker deliveries without interference from other players. Works as long as I end up being the only player in the session, no new players can join because I blocked my ports
https://drive.google.com/file/d/0B5Beow8WOgBFbzBSY3VnWkZyMU0/view?usp=sharing
Other Possible Ramifications (Very Bad If It's True!)
Not to freak everyone out. But it MAY be possible, for someone with actual hacking talent (not me), to drop a Staged Meterpreter Shell into your computer, assuming that he or she knows your IP address through the discovery on Wireshark. They can then...
(1) Have the payload on execution rewrite a critical system file in your computer
(2) Download the remaining stages of the payload
(3) Slowly compromise other system processes on your computer
(4) Gain root-access (Administrator in Windows)
(5) Start executing commands as Root/Admin
(6) Do creepy shit like use your webcam to take a picture of your face. Or steal your saved payment information in your browser cookies for Amazon, etc.
I typically would picture our typical home networks like this in a typical game lobby on GTA Online
Me
Laptop running GTA V My Router and Firewalls My Public IP (UDP Port 6672) My ISP
You
ISP routing path Your ISP Your Public IP (UDP Port 6672 and/or other) Your Home Router and Firewalls Your Computer
The problem with the UDP protocol, is that it has very little verification and checksumming. It just keeps spamming packets, making it viable for low latency applications (gaming).
If I can make a virus or reverse shell look like typical game data, then it SHOULD get through your firewall, and automatically get forwarded by your router to your computer. As long as I am connected to you, all the validation is authentic. As long as I am connected to you, either in a game mode, or through the public lobby!
If those conditions are met. Then it's going to look like regular traffic to your network.
I have yet to even try this. I did managed to reencode a standard reverse shell payload (msfvenom) and infected myself with it (successfully SSH tunneling through my own router from the WWW against my Linux installation). However, my Windows variant failed to execute due to Windows User Account Controls. Windows Defender was futilely, furiously searching for this "virus", and eating up all my hard drive usage (100% while playing GTA) until I finally removed it after running a scan with HitmanPro (a heuristics second-opinion scanner that hunts for files that exhibit virus/malware like activity).
PSA: DO NOT USE WIRESHARK TO MONITOR GTA V TRAFFIC, R* EULA HAS RECENTLY BEEN CHANGED, DEPENDING ON SEVERITY IT MAY BE A INSTANT PERMANENT BAN
At 4:30 AM PST, January 22nd, my account received a permanent ban as I was with my friends on their yacht looking through the scope of a sniper rifle in the middle of a Piracy Prevention Match.
As it turns. Sniffing network traffic via Wireshark may or may not be a ground for a ban. Regardless of whether or not I am doing it right now.
I even double checked the vague Rockstar Games EULA to make sure.
https://www.rockstargames.com/eula
You agree not to:
reverse engineer, decompile, disassemble, display, perform, prepare derivative works based on, or otherwise modify the Software, in whole or in part;
Well I attempted to! And I violated a good half of those.
cheat or utilize any unauthorized robot, spider, or other program in connection with any online features of the Software;
"Spider" (I am guessing they are referring to internet crawlers), but "other program"? Yeah Wireshark fits the bill.
TECHNICAL PROTECTIONS: The Software may include measures to control access to the Software, control access to certain features or content, prevent unauthorized copies, or otherwise attempt to prevent anyone from exceeding the limited rights and licenses granted under this Agreement. Such measures may include incorporating license management, product activation, and other security technology in the Software and monitoring usage, including, but not limited to, time, date, access, or other controls, counters, serial numbers, and/or other security devices designed to prevent the unauthorized access, use, and copying of the Software, or any portions or components thereof, including any violations of this Agreement. Licensor reserves the right to monitor use of the Software at any time. You may not interfere with such access control measures or attempt to disable or circumvent such security features, and if you do, the Software may not function properly. If the Software permits access to Special Features, only one copy of the Software may access those Special Features at one time. Additional terms and registration may be required to access online services and to download Software updates and patches. Only Software subject to a valid license can be used to access online services, including downloading updates and patches. Except as otherwise prohibited by applicable law, Licensor may limit, suspend, or terminate the license granted hereunder and access to the Software, including, but not limited to, any related services and products, at any time without notice for any reason whatsoever.
The Secret UDP SSH Tunnel (DTLSv1.0), got it. R* Anticheat. Check. Don't fuck with it? Naw mang, sorry, totally lost it. Well... if I straight up spilled the beans on how your anticheat works, including what it could possibly do and can't do, and how it might work, I'd guess you'd be pretty mad at me too.
Especially since posting on Reddit is the equivalent of me following you around IRL with a megaphone, screaming in public in earshot "Don't trust him! He is reading your shit! He's looking through your gameplay traffic right now. And he knows everything!!!!"
By installing and using the Software, you consent to the information collection and usage terms set forth in this section and Licensor’s Privacy Policy, including (where applicable) (i) the transfer of any personal information and other information to Licensor, its affiliates, vendors, and business partners, and to certain other third parties, such as governmental authorities, in the U.S. and other countries located outside Europe or your home country, including countries that may have lower standards of privacy protection; (ii) the public display of your data, such as identification of your user-created content or displaying your scores, ranking, achievements, and other gameplay data on websites and other platforms; (iii) the sharing of your gameplay data with hardware manufacturers, platform hosts, and Licensor’s marketing partners; and (iv) other uses and disclosures of your personal information or other information as specified in the above-referenced Privacy Policy, as amended from time to time. If you do not want your information used or shared in this manner, then you should not use the Software.
Remember what I said about DDoSing people that are discovered on Wireshark? If you do this, and the victim knows the right people to call, I wouldn't be surprised if G-Men in suits knock on your door.
At first, I thought, that was it. Then I decided to go Google "GTA V Banwave" and set the time to one week ago. What I saw was a real trip. A huge spike in fake bans and urgent warnings, "PSA's" all over YouTube
It's something related to the latest iteration of Mod Menus that have been popping up. I have not seen so much panic run through the forums of UnknownCheats and MPGH in my life. New versions, updates, and customized variants of Mod Menus have been popping up on a daily basis. And with a detection period from launch, of at most, a week long. That is, the day that the new mod menu gets uploaded, to the point that users start to report they are getting banned for it, can be up from a week from now. R* anticheat went into overdrive. Developers have been scaling back on implementing the money drop feature for fear of triggering instant bans for their users (hence the lack of money drops recently). Then I noticed something...
The prevailing issue of "Persistent Mods" and possible "Memory Corruption" implicating innocent players
I am talking about mod menus that permanently break a lobby's features like free roam missions, like CEO or Bikers, but this time, it can carry over betweens lobby sessions. I saw my first variant earlier this week and shrugged it off. Then I saw my second one today. Some modder was caging me and my friends and trying to flatten us with Bugattis.
Normally I would just join another session and any wacky attachment would fall off. But now the damage, errors, and bugs caused by mod menus can "carry-over" with me. I realized that I couldn't change my Outfits via the "Style Menu" for the second session in a row, I could not eat snacks to regenerate health, nor could I equip body armor. In some cases, I couldn't register as a CEO and start my missions, even though I already SWITCHED to a new lobby.
After fully restarting the game from Steam, the "mod persistence" ceased. I had full control of my character again. Because we are talking about starting over again with fresh untainted memory.
First instance of discussion of innocent bans recently https://www.youtube.com/watch?v=rKYnCDolKSc
This video claims that you should be avoiding public lobbies on the PC like the plague or apocalypse. IDK if you have to be THAT extreme. Just don't interact too much with modders. Or try glitching yourself into a solo public lobby via the firewall glitch.
This is really sad though. This guy is a victim of a modder, and he gets a ban for it, probably from memory corruption caused by the modders that Rockstar's Anticheat picked up https://www.youtube.com/watch?v=_1IEs-Bf7Is
I am certain that if you react quickly enough, you will NOT get flagged by the modder's actions. You just need to do a full restart of the game. Not your PC. Just the game on Steam. So don't enjoy a modder's company for too long, no matter how pleasant they may appear.
Holy fuck dude. The game still costs $60 on Steam. After all these years. I'll just wait until my decoy account gets unbanned. I'll see you guys in 30 days.
Fortunately, it is NOT a MAC Ban. I logged into my decoy account. Decoy account still has a one month suspension.
submitted by ctlister to GTA [link] [comments]

(Sponsored Press Release) Introducing DieBitcoin! From the brother of Charles Manson comes the first decentralized system for murder-for-hire reputation management

The murder-for-hire business makes anywhere from $1 to $100,000,000,000 every year. The biggest problem for your everyday hitman, however, is maintaining their reputation. What happens when your best client gets killed? You lose your reputation, and your referrals!
All of that is about to change, and it's thanks to Charles Manson's brother, Pablo. He was the Manson family accountant for several years, and over the course of his career has worked with many murder entrepreneurs. He has taken his expertise in contract killing, as well as smart contracts, and developed DieBitcoin: The "killer" social networking platform you can trust.
Holders of DieBitcoin can manage their murder history profile, create itemized travel receipts, leave reviews for murder-related services, and chat with friends. Murder consumers can purchase DieBitcoin on exchanges and use them to order "SmartHits." Investors can hodl DieBitcoin until it moons, or until they die.
Contribute to the DieBitcoin ICO today by leaving unmarked US fiat bills in a white envelope underneath the 404 westbound overpass, near the Denny's. Be part of the decentralized future of secure & reliable contract killings.
This is a sponsored press release. /Buttcoin is not responsible for the information provided, or for any illegal services rendered.
submitted by ky1e to Buttcoin [link] [comments]

Memes Gear - lfwzhbekvpokfstqre - Meme Merch.

Meme Gear! Memes Merch CHEAP AND FREE SHIPPING on Ebay and Etsy!!!! ------>

https://www.etsy.com/listing/652403302/gotcha-meme-keychain-memes-key-chain?rtjvwhsug 1886444543
Mr Clara Turner meme teal bandwidth copy bandwidth New Delilah Ergonomic Concrete Keyboard Awesome Chair Futureproofed upwardtrending Meme Gear wrestling wwe reality television terry bollea world heavyweight champion tape hogan knows best american gladiators gawker lawsuit racist transcript terry gene bollea Ms Misael Ritchie meme salmon bandwidth copy bandwidth Rainastad Intelligent Soft Computer Tasty Bacon Integrated secondary Meme Gear ytmnd break my stride Brandt McCullough meme mint green alarm back up alarm Jeradstad Practical Metal Hat Practical Bacon Qualityfocused heuristic Meme Gear twitter meme vine selfie Bernita Kuhic meme ivory interface navigate interface East Verlamouth Intelligent Cotton Chair Tasty Fish Synergistic optimizing Meme Gear exploitable spongebob squarepants tumblr photoshop meme Felicita Ryan meme white bus parse bus South Fredaland Rustic Fresh Shirt Small Mouse Organized clientdriven Meme Gear moonbase steam game alpha youtube aeiou space john madden Enoch Watsica meme violet bandwidth navigate bandwidth Fanniebury Awesome Frozen Mouse Awesome Shirt Rightsized asymmetric Meme Gear reborn hitman 10th khr katekyo gokudera hayato sawada tsunayoshi judaime 27 vongola Mr Alvena Murazik meme mint green panel connect panel Port Bianka Small Metal Keyboard Small Table Advanced 3rd generation Meme Gear bj we mcintyre dj Delpha Shields V meme salmon array generate array Lake Rafael Handmade Granite Chicken Practical Mouse Centralized nonvolatile Meme Gear lost episodes media 2012 Clemens Mosciski meme tan panel parse panel East Don Gorgeous Steel Cheese Tasty Ball Multichannelled demanddriven Meme Gear twitter controversy Vernie Crona meme orange firewall reboot firewall Kassulkemouth Small Rubber Shoes Tasty Chicken Objectbased webenabled Meme Gear nostalgia sonic the hedgehog sega sonic team 90s video game fanart fan characters comics sonic universe sonic x sonic boom e3 video game title Bonita Barton meme blue circuit navigate circuit Rivermouth Small Concrete Tuna Intelligent Cheese Implemented multistate Meme Gear chicken Ms Akeem Yundt meme fuchsia sensor synthesize sensor Port Barry Unbranded Steel Hat Licensed Pizza Reengineered impactful Meme Gear reddit mascot robot alien logo snoo avatar Calista Robel meme olive sensor input sensor West Chelseafurt Handcrafted Granite Mouse Intelligent Gloves Multilateral dedicated Meme Gear celebrity twitter photo fad instagram selfie Kiarra Kuphal meme orchid matrix calculate matrix Dickensbury Sleek Soft Fish Refined Chips Publickey systemic Meme Gear complaint discrimination form pvv geert wers politics netherlands dutch hotline racism Zachary Grimes meme ivory matrix synthesize matrix New Jordi Tasty Metal Shirt Awesome Mouse Innovative humanresource Meme Gear scifi paranormal xfiles horror conspiracy drama copshow mlg tv show Ariane Schaefer meme green firewall calculate firewall East Gilbertoton Tasty Plastic Soap Tasty Tuna Centralized dynamic Meme Gear 4chan parrot paranoia paranoid parrot advice dog awkward Jordon Koepp meme maroon monitor hack monitor McCulloughside Unbranded Soft Soap Refined Computer Profound 4th generation Meme Gear pokemon Ms Kayden Carter meme grey panel back up panel New Nilsview Sleek Granite Pizza Gorgeous Tuna Versatile disintermediate Meme Gear dance judson laipply laipply youtube classics roflcon iii Doyle OKon meme lavender array transmit array Oberbrunnerborough Intelligent Frozen Mouse Generic Cheese Innovative humanresource Meme Gear uncle denzel denzel denzel washington twitter maypac mayweather pacquiao mayweather pacquiao uncle teeth smile sports boxing Julianne Runolfsson meme white sensor generate sensor New Talon Incredible Concrete Fish Refined Sausages Opensource neutral Meme Gear the mind continues to boggle Geovany Kerluke IV meme lime protocol calculate protocol Adolphusfurt Licensed Plastic Car Fantastic Computer Rightsized heuristic Meme Gear ppg photoshop reboot bubbles exploitable me gusta no rage comic the powerpuff girls Nicklaus Bailey meme sky blue system generate system Tierratown Sleek Metal Salad Intelligent Bacon Ergonomic contextsensitive Meme Gear ikeified meme Ms Federico Huel meme blue bus calculate bus North Amalia Ergonomic Plastic Pizza Licensed Tuna Profound regional Meme Gear eating universe chinchilla Dariana Bogisich meme olive transmitter hack transmitter West Violamouth Gorgeous Fresh Chair Rustic Ball Digitized 247 Meme Gear personality stereotype drake black twitter Damion Nicolas meme orange firewall index firewall Port Hassan Refined Soft Computer Awesome Mouse Devolved evenkeeled Meme Gear player aol mp3 media player nullsoft music Jeramy Hartmann meme pink bus override bus North Pearl Ergonomic Fresh Salad Handmade Sausages Customerfocused zero administration Meme Gear invisible cereal excited adam rio basketball eat eating Noah Walsh meme pink port index port North Amiratown Fantastic Steel Pizza Ergonomic Chair Exclusive exuding Meme Gear tony puto come la planchi se planchi puto planchi se la come planchixfortinero elfortinero84 fortinero planchixtauro tauro22 planchixtony lokura homoual un et dark hacia ultra gaaaaay trolo calor calorrrr hacia un calorrrr maricon ghey jejejejejejeje je beider dark beider lacraman comprador compulsivo comprador compulsivo foro et argentina boca juniors fifa nun bocajuniorsarg chory burzaco et en burzaco o muerte kalisto tiernis fagbiz rey del foro Anabelle Mohr meme magenta array hack array Vincenzoside Small Soft Chair Generic Computer Progressive holistic Meme Gear f40ph locomotive f40 train Emiliano Rosenbaum meme sky blue transmitter override transmitter Stantonburgh Sleek Frozen Pants Rustic Pants Programmable reciprocal Meme Gear Hard Working Cow Virginie Johns meme mint green bandwidth transmit bandwidth New Cydneymouth Practical Steel Sausages Licensed Towels Networked impactful Meme Gear meme ponychan mlp fim Kevin Schoen meme teal bus transmit bus North Ludwig Incredible Fresh Bacon Intelligent Computer Multichannelled clientdriven Meme Gear emoji tumblr spam good shit easter emoji copypasta Billy Funk meme fuchsia bus override bus West Reginaldfort Practical Rubber Hat Generic Hat Focused disintermediate Meme Gear bitcoin cryptocurrency Sage Hermann meme magenta firewall connect firewall Yeseniaside Handmade Plastic Soap Tasty Soap Frontline clearthinking Meme Gear music loco loco fad animalada song my little pony tune object shows Yazmin Hickle meme maroon transmitter navigate transmitter East Karlie Ergonomic Plastic Gloves Intelligent Keyboard Multilayered explicit Meme Gear blizzard diablo diablo iii error 37 activision blizzard battlenet battle net battlenet login login server login servers Vesta Kohler meme plum microchip quantify microchip Port Jaqueline Generic Wooden Ball Rustic Salad Multilayered maximized Meme Gear image macro monkey Albert OConnell meme orchid firewall connect firewall Cyruston Unbranded Plastic Soap Practical Hat Downsized radical Meme Gear g0atfac3 uigi reeoh weegee malleo mario luigi Adrien Cremin meme magenta feed synthesize feed Farrellville Practical Steel Soap Ergonomic Shirt Objectbased heuristic Meme Gear warner bros cartoon looney tunes dover boys dan backslide dora standpipe Corrine Goodwin meme gold bandwidth synthesize bandwidth Marcelinafort Handmade Wooden Bike Handmade Keyboard Reactive national Meme Gear I want to own and manage my own daycare since I have 6 little brothers I love working with kids My mom claims its a job for slackers and quitters Just because I didnt want to be a doctor like her Gino Dare meme violet bandwidth back up bandwidth East Jamelland Rustic Wooden Soap Rustic Keyboard Reverseengineered global Meme Gear single character image macro advice dog Nathanial Brekke meme orange hard drive reboot hard drive Murazikmouth Intelligent Cotton Mouse Generic Gloves Sharable transitional Meme Gear pokemon haters pokmon generation one pokmon transformers autobots label pejorative Christopher Rohan I meme olive sensor back up sensor Hagenesbury Fantastic Soft Bike Handcrafted Chips Functionbased national Meme Gear youtube fat girl katie12231 katie122311 katiethesinger123 mrsamazingkatie Blake MacGyver meme white driver back up driver New Nyah Fantastic Wooden Shoes Refined Pants Exclusive asymmetric Meme Gear potato united states postal service usps post office stamps message my brother mailed me a potato reddit 1499 mail a spud potatogift national mail a potato day Westley Wehner meme violet panel program panel Port Myah Licensed Metal Pants Small Mouse Advanced 247 Meme Gear squirtle face 4chan facepunch pokemon template exploitable Josiah Walsh meme fuchsia card input card Townebury Gorgeous Metal Shoes Handcrafted Shoes Mandatory clientdriven Meme Gear image macro school teachers teaching social stereotype Sheridan Lemke meme tan system input system Ayanaburgh Small Rubber Computer Practical Ball Crossplatform multistate Meme Gear 4chan erasure always adult swim robot unicorn attack flash yaranaika mobile game rainbow web game Judson Torp meme orange pixel bypass pixel Raumouth Tasty Plastic Computer Ergonomic Bacon Mandatory local Meme Gear fml depression freak mutation wtf Miss Guadalupe Larkin meme purple protocol hack protocol Vinceborough Gorgeous Steel Bacon Handmade Towels Opensource multimedia Meme Gear music sheet music tumblr Jayce Weissnat meme plum card calculate card West Hunter Small Soft Table Incredible Mouse Configurable multimedia Meme Gear thumb man Mrs Nikolas Predovic meme white bandwidth bypass bandwidth West Margaretburgh Practical Fresh Sausages Licensed Salad Reengineered 247 Meme Gear anime cosplay event ice cold water baltimore Esperanza Fay meme pink array program array Mauricioside Handcrafted Steel Ball Tasty Cheese Streamlined optimal Meme Gear instagram couples phot traveling -
submitted by areohdeee to MemeGear [link] [comments]

Is anyone else freaked out by this whole blocksize debate? Does anyone else find themself often agreeing with *both* sides - depending on whichever argument you happen to be reading at the moment? And do we need some better algorithms and data structures?

Why do both sides of the debate seem “right” to me?
I know, I know, a healthy debate is healthy and all - and maybe I'm just not used to the tumult and jostling which would be inevitable in a real live open major debate about something as vital as Bitcoin.
And I really do agree with the starry-eyed idealists who say Bitcoin is vital. Imperfect as it may be, it certainly does seem to represent the first real chance we've had in the past few hundred years to try to steer our civilization and our planet away from the dead-ends and disasters which our government-issued debt-based currencies keep dragging us into.
But this particular debate, about the blocksize, doesn't seem to be getting resolved at all.
Pretty much every time I read one of the long-form major arguments contributed by Bitcoin "thinkers" who I've come to respect over the past few years, this weird thing happens: I usually end up finding myself nodding my head and agreeing with whatever particular piece I'm reading!
But that should be impossible - because a lot of these people vehemently disagree!
So how can both sides sound so convincing to me, simply depending on whichever piece I currently happen to be reading?
Does anyone else feel this way? Or am I just a gullible idiot?
Just Do It?
When you first look at it or hear about it, increasing the size seems almost like a no-brainer: The "big-block" supporters say just increase the blocksize to 20 MB or 8 MB, or do some kind of scheduled or calculated regular increment which tries to take into account the capabilities of the infrastructure and the needs of the users. We do have the bandwidth and the memory to at least increase the blocksize now, they say - and we're probably gonna continue to have more bandwidth and memory in order to be able to keep increasing the blocksize for another couple decades - pretty much like everything else computer-based we've seen over the years (some of this stuff is called by names such as "Moore's Law").
On the other hand, whenever the "small-block" supporters warn about the utter catastrophe that a failed hard-fork would mean, I get totally freaked by their possible doomsday scenarios, which seem totally plausible and terrifying - so I end up feeling that the only way I'd want to go with a hard-fork would be if there was some pre-agreed "triggering" mechanism where the fork itself would only actually "switch on" and take effect provided that some "supermajority" of the network (of who? the miners? the full nodes?) had signaled (presumably via some kind of totally reliable p2p trustless software-based voting system?) that they do indeed "pre-agree" to actually adopt the pre-scheduled fork (and thereby avoid any possibility whatsoever of the precious blockchain somehow tragically splitting into two and pretty much killing this cryptocurrency off in its infancy).
So in this "conservative" scenario, I'm talking about wanting at least 95% pre-adoption agreement - not the mere 75% which I recall some proposals call for, which seems like it could easily lead to a 75/25 blockchain split.
But this time, with this long drawn-out blocksize debate, the core devs, and several other important voices who have become prominent opinion shapers over the past few years, can't seem to come to any real agreement on this.
Weird split among the devs
As far as I can see, there's this weird split: Gavin and Mike seem to be the only people among the devs who really want a major blocksize increase - and all the other devs seem to be vehemently against them.
But then on the other hand, the users seem to be overwhelmingly in favor of a major increase.
And there are meta-questions about governance, about about why this didn't come out as a BIP, and what the availability of Bitcoin XT means.
And today or yesterday there was this really cool big-blockian exponential graph based on doubling the blocksize every two years for twenty years, reminding us of the pure mathematical fact that 210 is indeed about 1000 - but not really addressing any of the game-theoretic points raised by the small-blockians. So a lot of the users seem to like it, but when so few devs say anything positive about it, I worry: is this just yet more exponential chart porn?
On the one hand, Gavin's and Mike's blocksize increase proposal initially seemed like a no-brainer to me.
And on the other hand, all the other devs seem to be against them. Which is weird - not what I'd initially expected at all (but maybe I'm just a fool who's seduced by exponential chart porn?).
Look, I don't mean to be rude to any of the core devs, and I don't want to come off like someone wearing a tinfoil hat - but it has to cross people's minds that the powers that be (the Fed and the other central banks and the governments that use their debt-issued money to run this world into a ditch) could very well be much more scared shitless than they're letting on. If we assume that the powers that be are using their usual playbook and tactics, then it could be worth looking at the book "Confessions of an Economic Hitman" by John Perkins, to get an idea of how they might try to attack Bitcoin. So, what I'm saying is, they do have a track record of sending in "experts" to try to derail projects and keep everyone enslaved to the Creature from Jekyll Island. I'm just saying. So, without getting ad hominem - let's just make sure that our ideas can really stand scrutiny on their own - as Nick Szabo says, we need to make sure there is "more computer science, less noise" in this debate.
When Gavin Andresen first came out with the 20 MB thing - I sat back and tried to imagine if I could download 20 MB in 10 minutes (which seems to be one of the basic mathematical and technological constraints here - right?)
I figured, "Yeah, I could download that" - even with my crappy internet connection.
And I guess the telecoms might be nice enough to continue to double our bandwidth every two years for the next couple decades – if we ask them politely?
On the other hand - I think we should be careful about entrusting the financial freedom of the world into the greedy hands of the telecoms companies - given all their shady shenanigans over the past few years in many countries. After decades of the MPAA and the FBI trying to chip away at BitTorrent, lately PirateBay has been hard to access. I would say it's quite likely that certain persons at institutions like JPMorgan and Goldman Sachs and the Fed might be very, very motivated to see Bitcoin fail - so we shouldn't be too sure about scaling plans which depend on the willingness of companies Verizon and AT&T to double our bandwith every two years.
Maybe the real important hardware buildout challenge for a company like 21 (and its allies such as Qualcomm) to take on now would not be "a miner in every toaster" but rather "Google Fiber Download and Upload Speeds in every Country, including China".
I think I've read all the major stuff on the blocksize debate from Gavin Andresen, Mike Hearn, Greg Maxwell, Peter Todd, Adam Back, and Jeff Garzick and several other major contributors - and, oddly enough, all their arguments seem reasonable - heck even Luke-Jr seems reasonable to me on the blocksize debate, and I always thought he was a whackjob overly influenced by superstition and numerology - and now today I'm reading the article by Bram Cohen - the inventor of BitTorrent - and I find myself agreeing with him too!
I say to myself: What's going on with me? How can I possibly agree with all of these guys, if they all have such vehemently opposing viewpoints?
I mean, think back to the glory days of a couple of years ago, when all we were hearing was how this amazing unprecedented grassroots innovation called Bitcoin was going to benefit everyone from all walks of life, all around the world:
...basically the entire human race transacting everything into the blockchain.
(Although let me say that I think that people's focus on ideas like driverless cabs creating realtime fare markets based on supply and demand seems to be setting our sights a bit low as far as Bitcoin's abilities to correct the financial world's capital-misallocation problems which seem to have been made possible by infinite debt-based fiat. I would have hoped that a Bitcoin-based economy would solve much more noble, much more urgent capital-allocation problems than driverless taxicabs creating fare markets or refrigerators ordering milk on the internet of things. I was thinking more along the lines that Bitcoin would finally strangle dead-end debt-based deadly-toxic energy industries like fossil fuels and let profitable clean energy industries like Thorium LFTRs take over - but that's another topic. :=)
Paradoxes in the blocksize debate
Let me summarize the major paradoxes I see here:
(1) Regarding the people (the majority of the core devs) who are against a blocksize increase: Well, the small-blocks arguments do seem kinda weird, and certainly not very "populist", in the sense that: When on earth have end-users ever heard of a computer technology whose capacity didn't grow pretty much exponentially year-on-year? All the cool new technology we've had - from hard drives to RAM to bandwidth - started out pathetically tiny and grew to unimaginably huge over the past few decades - and all our software has in turn gotten massively powerful and big and complex (sometimes bloated) to take advantage of the enormous new capacity available.
But now suddenly, for the first time in the history of technology, we seem to have a majority of the devs, on a major p2p project - saying: "Let's not scale the system up. It could be dangerous. It might break the whole system (if the hard-fork fails)."
I don't know, maybe I'm missing something here, maybe someone else could enlighten me, but I don't think I've ever seen this sort of thing happen in the last few decades of the history of technology - devs arguing against scaling up p2p technology to take advantage of expected growth in infrastructure capacity.
(2) But... on the other hand... the dire warnings of the small-blockians about what could happen if a hard-fork were to fail - wow, they do seem really dire! And these guys are pretty much all heavyweight, experienced programmers and/or game theorists and/or p2p open-source project managers.
I must say, that nearly all of the long-form arguments I've read - as well as many, many of the shorter comments I've read from many users in the threads, whose names I at least have come to more-or-less recognize over the past few months and years on reddit and bitcointalk - have been amazingly impressive in their ability to analyze all aspects of the lifecycle and management of open-source software projects, bringing up lots of serious points which I could never have come up with, and which seem to come from long experience with programming and project management - as well as dealing with economics and human nature (eg, greed - the game-theory stuff).
So a lot of really smart and experienced people with major expertise in various areas ranging from programming to management to game theory to politics to economics have been making some serious, mature, compelling arguments.
But, as I've been saying, the only problem to me is: in many of these cases, these arguments are vehemently in opposition to each other! So I find myself agreeing with pretty much all of them, one by one - which means the end result is just a giant contradiction.
I mean, today we have Bram Cohen, the inventor of BitTorrent, arguing (quite cogently and convincingly to me), that it would be dangerous to increase the blocksize. And this seems to be a guy who would know a few things about scaling out a massive global p2p network - since the protocol which he invented, BitTorrent, is now apparently responsible for like a third of the traffic on the internet (and this despite the long-term concerted efforts of major evil players such as the MPAA and the FBI to shut the whole thing down).
Was the BitTorrent analogy too "glib"?
By the way - I would like to go on a slight tangent here and say that one of the main reasons why I felt so "comfortable" jumping on the Bitcoin train back a few years ago, when I first heard about it and got into it, was the whole rough analogy I saw with BitTorrent.
I remembered the perhaps paradoxical fact that when a torrent is more popular (eg, a major movie release that just came out last week), then it actually becomes faster to download. More people want it, so more people have a few pieces of it, so more people are able to get it from each other. A kind of self-correcting economic feedback loop, where more demand directly leads to more supply.
(BitTorrent manages to pull this off by essentially adding a certain structure to the file being shared, so that it's not simply like an append-only list of 1 MB blocks, but rather more like an random-access or indexed array of 1 MB chunks. Say you're downloading a film which is 700 MB. As soon as your "client" program has downloaded a single 1-MB chunk - say chunk #99 - your "client" program instantly turns into a "server" program as well - offering that chunk #99 to other clients. From my simplistic understanding, I believe the Bitcoin protocol does something similar, to provide a p2p architecture. Hence my - perhaps naïve - assumption that Bitcoin already had the right algorithms / architecture / data structure to scale.)
The efficiency of the BitTorrent network seemed to jive with that "network law" (Metcalfe's Law?) about fax machines. This law states that the more fax machines there are, the more valuable the network of fax machines becomes. Or the value of the network grows on the order of the square of the number of nodes.
This is in contrast with other technology like cars, where the more you have, the worse things get. The more cars there are, the more traffic jams you have, so things start going downhill. I guess this is because highway space is limited - after all, we can't pave over the entire countryside, and we never did get those flying cars we were promised, as David Graeber laments in a recent essay in The Baffler magazine :-)
And regarding the "stress test" supposedly happening right now in the middle of this ongoing blocksize debate, I don't know what worries me more: the fact that it apparently is taking only $5,000 to do a simple kind of DoS on the blockchain - or the fact that there are a few rumors swirling around saying that the unknown company doing the stress test shares the same physical mailing address with a "scam" company?
Or maybe we should just be worried that so much of this debate is happening on a handful of forums which are controlled by some guy named theymos who's already engaged in some pretty "contentious" or "controversial" behavior like blowing a million dollars on writing forum software (I guess he never heard that reddit.com software is open-source)?
So I worry that the great promise of "decentralization" might be more fragile than we originally thought.
Scaling
Anyways, back to Metcalfe's Law: with virtual stuff, like torrents and fax machines, the more the merrier. The more people downloading a given movie, the faster it arrives - and the more people own fax machines, the more valuable the overall fax network.
So I kindof (naïvely?) assumed that Bitcoin, being "virtual" and p2p, would somehow scale up the same magical way BitTorrrent did. I just figured that more people using it would somehow automatically make it stronger and faster.
But now a lot of devs have started talking in terms of the old "scarcity" paradigm, talking about blockspace being a "scarce resource" and talking about "fee markets" - which seems kinda scary, and antithetical to much of the earlier rhetoric we heard about Bitcoin (the stuff about supporting our favorite creators with micropayments, and the stuff about Africans using SMS to send around payments).
Look, when some asshole is in line in front of you at the cash register and he's holding up the line so they can run his credit card to buy a bag of Cheeto's, we tend to get pissed off at the guy - clogging up our expensive global electronic payment infrastructure to make a two-dollar purchase. And that's on a fairly efficient centralized system - and presumably after a year or so, VISA and the guy's bank can delete or compress the transaction in their SQL databases.
Now, correct me if I'm wrong, but if some guy buys a coffee on the blockchain, or if somebody pays an online artist $1.99 for their work - then that transaction, a few bytes or so, has to live on the blockchain forever?
Or is there some "pruning" thing that gets rid of it after a while?
And this could lead to another question: Viewed from the perspective of double-entry bookkeeping, is the blockchain "world-wide ledger" more like the "balance sheet" part of accounting, i.e. a snapshot showing current assets and liabilities? Or is it more like the "cash flow" part of accounting, i.e. a journal showing historical revenues and expenses?
When I think of thousands of machines around the globe having to lug around multiple identical copies of a multi-gigabyte file containing some asshole's coffee purchase forever and ever... I feel like I'm ideologically drifting in one direction (where I'd end up also being against really cool stuff like online micropayments and Africans banking via SMS)... so I don't want to go there.
But on the other hand, when really experienced and battle-tested veterans with major experience in the world of open-souce programming and project management (the "small-blockians") warn of the catastrophic consequences of a possible failed hard-fork, I get freaked out and I wonder if Bitcoin really was destined to be a settlement layer for big transactions.
Could the original programmer(s) possibly weigh in?
And I don't mean to appeal to authority - but heck, where the hell is Satoshi Nakamoto in all this? I do understand that he/she/they would want to maintain absolute anonymity - but on the other hand, I assume SN wants Bitcoin to succeed (both for the future of humanity - or at least for all the bitcoins SN allegedly holds :-) - and I understand there is a way that SN can cryptographically sign a message - and I understand that as the original developer of Bitcoin, SN had some very specific opinions about the blocksize... So I'm kinda wondering of Satoshi could weigh in from time to time. Just to help out a bit. I'm not saying "Show us a sign" like a deity or something - but damn it sure would be fascinating and possibly very helpful if Satoshi gave us his/hetheir 2 satoshis worth at this really confusing juncture.
Are we using our capacity wisely?
I'm not a programming or game-theory whiz, I'm just a casual user who has tried to keep up with technology over the years.
It just seems weird to me that here we have this massive supercomputer (500 times more powerful than the all the supercomputers in the world combined) doing fairly straightforward "embarassingly parallel" number-crunching operations to secure a p2p world-wide ledger called the blockchain to keep track of a measly 2.1 quadrillion tokens spread out among a few billion addresses - and a couple of years ago you had people like Rick Falkvinge saying the blockchain would someday be supporting multi-million-dollar letters of credit for international trade and you had people like Andreas Antonopoulos saying the blockchain would someday allow billions of "unbanked" people to send remittances around the village or around the world dirt-cheap - and now suddenly in June 2015 we're talking about blockspace as a "scarce resource" and talking about "fee markets" and partially centralized, corporate-sponsored "Level 2" vaporware like Lightning Network and some mysterious company is "stess testing" or "DoS-ing" the system by throwing away a measly $5,000 and suddenly it sounds like the whole system could eventually head right back into PayPal and Western Union territory again, in terms of expensive fees.
When I got into Bitcoin, I really was heavily influenced by vague analogies with BitTorrent: I figured everyone would just have tiny little like utorrent-type program running on their machine (ie, Bitcoin-QT or Armory or Mycelium etc.).
I figured that just like anyone can host a their own blog or webserver, anyone would be able to host their own bank.
Yeah, Google and and Mozilla and Twitter and Facebook and WhatsApp did come along and build stuff on top of TCP/IP, so I did expect a bunch of companies to build layers on top of the Bitcoin protocol as well. But I still figured the basic unit of bitcoin client software powering the overall system would be small and personal and affordable and p2p - like a bittorrent client - or at the most, like a cheap server hosting a blog or email server.
And I figured there would be a way at the software level, at the architecture level, at the algorithmic level, at the data structure level - to let the thing scale - if not infinitely, at least fairly massively and gracefully - the same way the BitTorrent network has.
Of course, I do also understand that with BitTorrent, you're sharing a read-only object (eg, a movie) - whereas with Bitcoin, you're achieving distributed trustless consensus and appending it to a write-only (or append-only) database.
So I do understand that the problem which BitTorrent solves is much simpler than the problem which Bitcoin sets out to solve.
But still, it seems that there's got to be a way to make this thing scale. It's p2p and it's got 500 times more computing power than all the supercomputers in the world combined - and so many brilliant and motivated and inspired people want this thing to succeed! And Bitcoin could be our civilization's last chance to steer away from the oncoming debt-based ditch of disaster we seem to be driving into!
It just seems that Bitcoin has got to be able to scale somehow - and all these smart people working together should be able to come up with a solution which pretty much everyone can agree - in advance - will work.
Right? Right?
A (probably irrelevant) tangent on algorithms and architecture and data structures
I'll finally weigh with my personal perspective - although I might be biased due to my background (which is more on the theoretical side of computer science).
My own modest - or perhaps radical - suggestion would be to ask whether we're really looking at all the best possible algorithms and architectures and data structures out there.
From this perspective, I sometimes worry that the overwhelming majority of the great minds working on the programming and game-theory stuff might come from a rather specific, shall we say "von Neumann" or "procedural" or "imperative" school of programming (ie, C and Python and Java programmers).
It seems strange to me that such a cutting-edge and important computer project would have so little participation from the great minds at the other end of the spectrum of programming paradigms - namely, the "functional" and "declarative" and "algebraic" (and co-algebraic!) worlds.
For example, I was struck in particular by statements I've seen here and there (which seemed rather hubristic or lackadaisical to me - for something as important as Bitcoin), that the specification of Bitcoin and the blockchain doesn't really exist in any form other than the reference implementation(s) (in procedural languages such as C or Python?).
Curry-Howard anyone?
I mean, many computer scientists are aware of the Curry-Howard isomorophism, which basically says that the relationship between a theorem and its proof is equivalent to the relationship between a specification and its implementation. In other words, there is a long tradition in mathematics (and in computer programming) of:
And it's not exactly "turtles all the way down" either: a specification is generally simple and compact enough that a good programmer can usually simply visually inspect it to determine if it is indeed "correct" - something which is very difficult, if not impossible, to do with a program written in a procedural, implementation-oriented language such as C or Python or Java.
So I worry that we've got this tradition, from the open-source github C/Java programming tradition, of never actually writing our "specification", and only writing the "implementation". In mission-critical military-grade programming projects (which often use languages like Ada or Maude) this is simply not allowed. It would seem that a project as mission-critical as Bitcoin - which could literally be crucial for humanity's continued survival - should also use this kind of military-grade software development approach.
And I'm not saying rewrite the implementations in these kind of theoretical languages. But it might be helpful if the C/Python/Java programmers in the Bitcoin imperative programming world could build some bridges to the Maude/Haskell/ML programmers of the functional and algebraic programming worlds to see if any kind of useful cross-pollination might take place - between specifications and implementations.
For example, the JavaFAN formal analyzer for multi-threaded Java programs (developed using tools based on the Maude language) was applied to the Remote Agent AI program aboard NASA's Deep Space 1 shuttle, written in Java - and it took only a few minutes using formal mathematical reasoning to detect a potential deadlock which would have occurred years later during the space mission when the damn spacecraft was already way out around Pluto.
And "the Maude-NRL (Naval Research Laboratory) Protocol Analyzer (Maude-NPA) is a tool used to provide security proofs of cryptographic protocols and to search for protocol flaws and cryptosystem attacks."
These are open-source formal reasoning tools developed by DARPA and used by NASA and the US Navy to ensure that program implementations satisfy their specifications. It would be great if some of the people involved in these kinds of projects could contribute to help ensure the security and scalability of Bitcoin.
But there is a wide abyss between the kinds of programmers who use languages like Maude and the kinds of programmers who use languages like C/Python/Java - and it can be really hard to get the two worlds to meet. There is a bit of rapprochement between these language communities in languages which might be considered as being somewhere in the middle, such as Haskell and ML. I just worry that Bitcoin might be turning into being an exclusively C/Python/Java project (with the algorithms and practitioners traditionally of that community), when it could be more advantageous if it also had some people from the functional and algebraic-specification and program-verification community involved as well. The thing is, though: the theoretical practitioners are big on "semantics" - I've heard them say stuff like "Yes but a C / C++ program has no easily identifiable semantics". So to get them involved, you really have to first be able to talk about what your program does (specification) - before proceeding to describe how it does it (implementation). And writing high-level specifications is typically very hard using the syntax and semantics of languages like C and Java and Python - whereas specs are fairly easy to write in Maude - and not only that, they're executable, and you state and verify properties about them - which provides for the kind of debate Nick Szabo was advocating ("more computer science, less noise").
Imagine if we had an executable algebraic specification of Bitcoin in Maude, where we could formally reason about and verify certain crucial game-theoretical properties - rather than merely hand-waving and arguing and deploying and praying.
And so in the theoretical programming community you've got major research on various logics such as Girard's Linear Logic (which is resource-conscious) and Bruni and Montanari's Tile Logic (which enables "pasting" bigger systems together from smaller ones in space and time), and executable algebraic specification languages such as Meseguer's Maude (which would be perfect for game theory modeling, with its functional modules for specifying the deterministic parts of systems and its system modules for specifiying non-deterministic parts of systems, and its parameterized skeletons for sketching out the typical architectures of mobile systems, and its formal reasoning and verification tools and libraries which have been specifically applied to testing and breaking - and fixing - cryptographic protocols).
And somewhat closer to the practical hands-on world, you've got stuff like Google's MapReduce and lots of Big Data database languages developed by Google as well. And yet here we are with a mempool growing dangerously big for RAM on a single machine, and a 20-GB append-only list as our database - and not much debate on practical results from Google's Big Data databases.
(And by the way: maybe I'm totally ignorant for asking this, but I'll ask anyways: why the hell does the mempool have to stay in RAM? Couldn't it work just as well if it were stored temporarily on the hard drive?)
And you've got CalvinDB out of Yale which apparently provides an ACID layer on top of a massively distributed database.
Look, I'm just an armchair follower cheering on these projects. I can barely manage to write a query in SQL, or read through a C or Python or Java program. But I would argue two points here: (1) these languages may be too low-level and "non-formal" for writing and modeling and formally reasoning about and proving properties of mission-critical specifications - and (2) there seem to be some Big Data tools already deployed by institutions such as Google and Yale which support global petabyte-size databases on commodity boxes with nice properties such as near-real-time and ACID - and I sometimes worry that the "core devs" might be failing to review the literature (and reach out to fellow programmers) out there to see if there might be some formal program-verification and practical Big Data tools out there which could be applied to coming up with rock-solid, 100% consensus proposals to handle an issue such as blocksize scaling, which seems to have become much more intractable than many people might have expected.
I mean, the protocol solved the hard stuff: the elliptical-curve stuff and the Byzantine General stuff. How the heck can we be falling down on the comparatively "easier" stuff - like scaling the blocksize?
It just seems like defeatism to say "Well, the blockchain is already 20-30 GB and it's gonna be 20-30 TB ten years from now - and we need 10 Mbs bandwidth now and 10,000 Mbs bandwidth 20 years from - assuming the evil Verizon and AT&T actually give us that - so let's just become a settlement platform and give up on buying coffee or banking the unbanked or doing micropayments, and let's push all that stuff into some corporate-controlled vaporware without even a whitepaper yet."
So you've got Peter Todd doing some possibly brilliant theorizing and extrapolating on the idea of "treechains" - there is a Let's Talk Bitcoin podcast from about a year ago where he sketches the rough outlines of this idea out in a very inspiring, high-level way - although the specifics have yet to be hammered out. And we've got Blockstream also doing some hopeful hand-waving about the Lightning Network.
Things like Peter Todd's treechains - which may be similar to the spark in some devs' eyes called Lightning Network - are examples of the kind of algorithm or architecture which might manage to harness the massive computing power of miners and nodes in such a way that certain kinds of massive and graceful scaling become possible.
It just seems like a kindof tiny dev community working on this stuff.
Being a C or Python or Java programmer should not be a pre-req to being able to help contribute to the specification (and formal reasoning and program verification) for Bitcoin and the blockchain.
XML and UML are crap modeling and specification languages, and C and Java and Python are even worse (as specification languages - although as implementation languages, they are of course fine).
But there are serious modeling and specification languages out there, and they could be very helpful at times like this - where what we're dealing with is questions of modeling and specification (ie, "needs and requirements").
One just doesn't often see the practical, hands-on world of open-source github implementation-level programmers and the academic, theoretical world of specification-level programmers meeting very often. I wish there were some way to get these two worlds to collaborate on Bitcoin.
Maybe a good first step to reach out to the theoretical people would be to provide a modular executable algebraic specification of the Bitcoin protocol in a recognized, military/NASA-grade specification language such as Maude - because that's something the theoretical community can actually wrap their heads around, whereas it's very hard to get them to pay attention to something written only as a C / Python / Java implementation (without an accompanying specification in a formal language).
They can't check whether the program does what it's supposed to do - if you don't provide a formal mathematical definition of what the program is supposed to do.
Specification : Implementation :: Theorem : Proof
You have to remember: the theoretical community is very aware of the Curry-Howard isomorphism. Just like it would be hard to get a mathematician's attention by merely showing them a proof without telling also telling them what theorem the proof is proving - by the same token, it's hard to get the attention of a theoretical computer scientist by merely showing them an implementation without showing them the specification that it implements.
Bitcoin is currently confronted with a mathematical or "computer science" problem: how to secure the network while getting high enough transactional throughput, while staying within the limited RAM, bandwidth and hard drive space limitations of current and future infrastructure.
The problem only becomes a political and economic problem if we give up on trying to solve it as a mathematical and "theoretical computer science" problem.
There should be a plethora of whitepapers out now proposing algorithmic solutions to these scaling issues. Remember, all we have to do is apply the Byzantine General consensus-reaching procedure to a worldwide database which shuffles 2.1 quadrillion tokens among a few billion addresses. The 21 company has emphatically pointed out that racing to compute a hash to add a block is an "embarrassingly parallel" problem - very easy to decompose among cheap, fault-prone, commodity boxes, and recompose into an overall solution - along the lines of Google's highly successful MapReduce.
I guess what I'm really saying is (and I don't mean to be rude here), is that C and Python and Java programmers might not be the best qualified people to develop and formally prove the correctness of (note I do not say: "test", I say "formally prove the correctness of") these kinds of algorithms.
I really believe in the importance of getting the algorithms and architectures right - look at Google Search itself, it uses some pretty brilliant algorithms and architectures (eg, MapReduce, Paxos) which enable it to achieve amazing performance - on pretty crappy commodity hardware. And look at BitTorrent, which is truly p2p, where more demand leads to more supply.
So, in this vein, I will close this lengthy rant with an oddly specific link - which may or may not be able to make some interesting contributions to finding suitable algorithms, architectures and data structures which might help Bitcoin scale massively. I have no idea if this link could be helpful - but given the near-total lack of people from the Haskell and ML and functional worlds in these Bitcoin specification debates, I thought I'd be remiss if I didn't throw this out - just in case there might be something here which could help us channel the massive computing power of the Bitcoin network in such a way as to enable us simply sidestep this kind of desperate debate where both sides seem right because the other side seems wrong.
https://personal.cis.strath.ac.uk/neil.ghani/papers/ghani-calco07
The above paper is about "higher dimensional trees". It uses a bit of category theory (not a whole lot) and a bit of Haskell (again not a lot - just a simple data structure called a Rose tree, which has a wikipedia page) to develop a very expressive and efficient data structure which generalizes from lists to trees to higher dimensions.
I have no idea if this kind of data structure could be applicable to the current scaling mess we apparently are getting bogged down in - I don't have the game-theory skills to figure it out.
I just thought that since the blockchain is like a list, and since there are some tree-like structures which have been grafted on for efficiency (eg Merkle trees) and since many of the futuristic scaling proposals seem to also involve generalizing from list-like structures (eg, the blockchain) to tree-like structures (eg, side-chains and tree-chains)... well, who knows, there might be some nugget of algorithmic or architectural or data-structure inspiration there.
So... TL;DR:
(1) I'm freaked out that this blocksize debate has splintered the community so badly and dragged on so long, with no resolution in sight, and both sides seeming so right (because the other side seems so wrong).
(2) I think Bitcoin could gain immensely by using high-level formal, algebraic and co-algebraic program specification and verification languages (such as Maude including Maude-NPA, Mobile Maude parameterized skeletons, etc.) to specify (and possibly also, to some degree, verify) what Bitcoin does - before translating to low-level implementation languages such as C and Python and Java saying how Bitcoin does it. This would help to communicate and reason about programs with much more mathematical certitude - and possibly obviate the need for many political and economic tradeoffs which currently seem dismally inevitable - and possibly widen the collaboration on this project.
(3) I wonder if there are some Big Data approaches out there (eg, along the lines of Google's MapReduce and BigTable, or Yale's CalvinDB), which could be implemented to allow Bitcoin to scale massively and painlessly - and to satisfy all stakeholders, ranging from millionaires to micropayments, coffee drinkers to the great "unbanked".
submitted by BeYourOwnBank to Bitcoin [link] [comments]

IT Expertise desperately needed. Crypto-Ransomware on company server. Please help.

Hello, Redditors, I'm here today on the behalf of my company and I must say we are indeed in a terrible, terrible situation. Over this weekend a computer within our network was infected with a type of crypto-ransomware called Osiris. This spread from the client computer onto our server that hosts Epicor and it's database. The database does not have a backup. Yes, that is correct. There is no backup for this server. I'm fairly new to the company but I have been tasked with solving this situation as efficiently as possible to get operations running. It just so happens that this server was responsible for inventory control, purchasing, and production management. I have tried looking online for decrypters for Osiris as well as scanning with pretty much any antivirus suite available including Bitdefender, Kaspersky, Hitman Pro, Malware Bytes, and Spyhunter but all to no avail. The antivirus suites found something called an "encryption engine" hiding behind a Trojan but removing the infected files did not help as the remaining hard drive files are still encrypted. The Osiris virus has encrypted the server and client computer with a bunch of files with the .osiris file extension. It says to connect to their "private server" via Tor to send them a payment via bitcoin for the decryption key. Obviously paying the ransom is a stupid idea but quite honestly, we're looking to complete data loss for the company. Please advise reddit.
submitted by theriju to InformationTechnology [link] [comments]

Does Mutahar purposely act "non-technical" in his videos? Is he really a "computer professional"?!?

First off, I want to say that I have nothing against Mutahar. I started watching his channel a few weeks ago, and I do enjoy watching many of his videos. The thing I have a problem with, however, is that he claims to be a computetechnical "expert" or "professional" of some sorts.
Now I know I'm not alone here, if there's anyone else who does programming or computenetwork security for a living, you must know that a lot of the stuff Mutahar says is either untechnical, over the top, or even untrue. This is most evident in the "deepweb exploration" videos. He constantly bickers about deepweb websites possibly being "real". His "security techniques" that he sometimes discusses are quite bland/non-technical, and essentially all of it can be very easily learned by someone sitting in their basement at home.
Between people I work with, whom are all technical people that have dedicated their lives to computers, it is common knowledge that 99% of the "darkweb" is, well, bullshit. For example, an actual hitman would never advertise their services online, and an actual hitman would have no idea how to make a deepweb site. When you make a payment with bitcoins, the payment is permanent, and you can't get any information on the person you paid. It should be COMMON SENSE that if you actually pay any of these people, you WILL NOT ever hear from them again. It's that simple. Why send you the product/service and make a standard 10-15% profit when you can simply do nothing and make 100% profit? Of course, the person never actually had the product or the ability to provide the service in the first place. It's impossible for you to get your payment back, and you don't know who they are. All the fake websites on the darkweb are created for essentially 3 reasons: 1. To troll/scare people 2. To scam people 3. To deter "non-technical" people from coming on the deepweb
People in the technology scene know that the deepweb has been around for a very long time. The main difference between then and now is back then, the deepweb never attained mainstream attention, and it was not as simple to set up. This made the deepweb a niche and a kind of secret for those in the technology scene. It was something that LE and the outside world couldn't touch. A lot of these same people absolutely HATE that the deepweb is now a household word, and there are simple install packages that allow anyone to get on to it. This has lead to all kinds of unwanted attention, including LE attaining the tools to remove websites. All the "horrible" sites are sort of like a joke to those who have "a bit more knowledge".
Now, I am not saying that ALL deepweb sites are fake, because they aren't. There are obviously many CP websites, various sites that distribute illicit media, and tons of legal sites. There are also deepweb markets, where you find drugs, stolen credit cards, fake passports ect. The main difference is that these markets allow for FEEDBACK, so if a vendor is scamming people, they aren't going to make many more sales. The vendor you buy from is not the same person as the admin or the person who created the website. These markets are in fact REAL. One thing I found hilarious was that while Mutahar seems to often trip about various fake deepweb sites being real, the one time he was viewing a deepweb market search (which actually WAS REAL), he laughed and said "these are all definitely scams", speaking in a tone as if he was absolutely sure.
He also said "I've never been able to figure out how to actually sign up for one of these markets". Ok, hold the phone. You're a "computer expert", yet you cannot figure out how to register for a deepweb market?? I know SEVERAL people with NO technological skills whatsoever who have made various purchases on these markets without anyones help.
There's also a video where he talks with "takedownman" about the deepweb. "takedownman" CLEARLY lies about his technical skills and many other things. He has a video where he says he's a war hero and he's taken down 1500+ CP sites by himself (lmao...). Then I saw the video he and Mutahar did together, and Mutahar says, referring to the deepweb, "you know a lot more about this topic than I do"....
Now I could go on and on about things like "having connections with the authorities", but basically it seems evident that either Mutahar is over exaggerating, or he is purposely acting.. well.. stupid, to appeal more to his audience who are presumably not technical people themselves.
Ok, there it is, bring all the hate now. Again, I'm not making a personal attack at all. I just legitimately want to know what is going on.
(BTW I urge people to check out this link which exposes the various myths of the deepweb: http://www.wired.com/2015/06/dark-web-know-myth/)
submitted by crack911 to SomeOrdinaryGmrs [link] [comments]

Cryptolocker Software Removal Guide (by me)

Warning: When doing these solutions, note that you sometimes are risking to lose your files
Go to 1 for explaing what cryptolocker is.
Go to 2 for explaing how to get rid of cryptolocker if you have it
Go to 3 to see how to prevent it to getting to you in the future
Go to 4 to see some solutions of how to get some of your files back
1: Here is what cryptolocker looks like: https://www.bleepstatic.com/swr-guides/c/cryptolockeCryptoLocker.jpg (note it might look a little bit different from that picture)
(But if it is cryptolocker 2.0: https://www.bleepstatic.com/fhost/uploads/2/cryptolocker-2.0.jpg some of the solutions i am saying in the future might not work.)
What it does is encrypt your files and using rea and aes encryption. If you wanna get your files back, you have to pay $60 or up to $500 with bitcoin if you want to get decrypt your files, in 24-72 hours the key to decrypt the files will be deleted. In newer versions of the virus if you run a exe it will delete shadow volume copies because you can use those to decrypt the files
2a:
Before we start, first, unplug it from your wireless or wired network to further prevent it encrypting any more files.
Download malwarebytes and go to this page to download it
After the setup, click custom scan http://i.imgur.com/gGJleph.png Then check the "scan for rookits" box because sometimes cryptolocker is mistaken as a rookit by a lot of antivirus software
and click the checkbox on all drives on the right that you wanna scan. http://i.imgur.com/VmI4RNF.png After that. click "scan now" and restart if prompted after the scan is done (it is optional but recommended that you do another scan after that)
2b: Run hitmanpro
Download hitmanpro from here and click next and choose the options you wanna choose, then click next again, now after scanning click "activate free license" shown right here and you are good and restart if prompted!
2c: You could also try paying through bitcoin if you want to, but that is why i put this last
3: To prevent it from it to getting to you again in the future, install cryptoprevent here and restart if prompted, and you can whitelist programs in appdata if one is a legitimate program.
4a: To get your some of your files back by restoring them to a earlier version, install shadow explorer here And look here for a 1 minute and 21 second tutorial on how to use the program
4b: Since cryptolocker copies the file, encrypts it then deletes the original, install recuva here and follow the 7 minute guide here to see how to use the program
4c: Try http://www.decryptcryptolocker.com/ and enter your email and upload one your encrypted files and then it will try to find a encryption key, and then email you the decryption key and instructions on how to use it
That is all i have, hopefully you enjoy the guide
submitted by nightandtodaypizza to techsupport [link] [comments]

My thoughts on Bitcoin's shortcomings and how to overcome them.

Please don't downvote because I said bitcoin has shortcomings, hear me out first.
First and foremost, bitcoin is an awesome idea and so far, implemented quite well. However, I'd like to discuss some of the shortcomings the technology has and ways we can help bitcoin to alleviate these.
First, bitcoin has to be attractive to the general public. Too many times when discussing bitcoin to people, they already know about the miners and see them as people printing their own money with no restraint and they want in. Then, when they learn that they aren't going to be able to print their own money, they want nothing to do with the currency as a whole. How do we solve this? Make sure to make a distinction between mining and using the currency at all. Explain it like the mint and VISA combined; they release currency into the market and process transactions. Eventually, all bitcoins will have been "found" and they will just be VISA, processing transactions and pocketing the tx fees, which will be much easier to explain. Bitcoin needs to be lauded as a currency, not a "get rich quick" scheme. Talk about how bitcoin can replace paypal, western union, etc and talk about how it can virtually eliminate fraud online and offline. Make it attractive to the end users, including merchants. They will ultimately decide bitcoin's fate. Additionally, one underrepresented topic is the fact that "tainted" bitcoins are traceable until the end of time. Say someone goes out and pays a hitman in bitcoin. No matter what the hitman does, he cannot spend that bitcoin with a buyer who will cooperate with the authorities, because they will be able to identify him. Additionally, once one buyer cooperates with authorities regarding "tainted" BTC, the chain can be worked backwards to determine the origin of the BTC and ultimately, the person who broke the law in the first place. I'd imagine governments could be sold on this idea alone, as it could remove the financial incentive for many crimes. What are some other talking points for bitcoin that can make it more attractive to end-users?
Second, the blockchain is a huge problem. The idea behind it is fantastic, and it should never go away. But it's a "low-hanging fruit" for entities who do not think bitcoin should be adopted, because what happens if a copyrighted piece of data makes itnow that illegal, unnecessary data has made it onto the blockchain? This has already happened with some megabytes of wikileak cables. Having copyrighted data in the blockchain would mean the entire blockchain could be subject to DMCA takedown requests and every miner and user of bitcoin with the full blockchain stored (which is a majority of them) could be infringing copyright. I welcome suggestions for combatting this problem specifically because I think it's one of our most urgent issues.
Third, MtGox. Bitcoin is a decentralized, p2p currency with what amounts to a central exchange. This needs to change. My idea is to have some sort of Craigslist-type site where you can exchange bitcoin for both local currency and goods/services/favors. The site need not deal in bitcoin at all, as there are already methods implemented in bitcoin for making a transaction that is in everyone's best interests with a lower chance of fraud.
Please post your own thoughts on bitcoin and possible solutions to these problems. Also, please let me know if I misunderstand a part of bitcoin; I've read into it as much as possible but I'm not a technical expert by any means and I would love to know if I'm incorrect.
EDIT: Sorry if this makes my post ridiculously long, but I thought more about the MtGox problem, and it boils down to this: **MtGox provides two main services: 1. The exchange of bitcoin into other currencies. 2. A way to measure the exchange rate between bitcoin and these currencies to ensure a fair market price.
How do we decentralize this? I think I may have a solution, and it only requires the bitcoin protocol so thus is immune to DDoS. As a seller, you create a small transaction with additional data listing the amount of BTC you wish to sell and the price in whatever other currency you want for it, and wait. Then, when buyers wish to purchase BTC, they can create a special transaction that includes maybe some contact info that "locks" the transaction from seller to buyer. In this stage, the BTC cannot be spent by anyone. Then, the seller contacts the buyer and arranges the exchange. Ideally, these would be geographically near each other, but this does not necessarily have to be the case. After the exchange has taken place, the buyer signs a message requesting the transaction be "unlocked". Then, the seller similarily does the same, and the BTC is transferred. This ensures both parties remain honest as if both parties do not include the signed message, the BTC is unable to be spent, ever.
It's a start but there are obvious flaws: First, a malicious seller could receive the funds and not unlock the BTC. I have not figured out a better way to create these transactions that does not include either a 1. middleman or 2. more investment than just the BTC to be sold and the currency to pay for it. I welcome suggestions and improvements.
If implemented correctly, this could serve as a full replacement for MtGox as the transactions are out in the open and any bitcoin client can give you up-to-the-minute details of what trades are actually happening in a specific currency.
Additionally, bitcoin has a problem where it's value fluctuates wildly. Sellers want this value to go up, buyers want it to go down, but I think both sellers and buyers would prefer if it didn't do anything else, they'd prefer it to stay the same. To that end, I propose a solution where collectively we value bitcoin based on something other than a fiat currency, like possibly Gold. Gold has a exchange rate to any currency in the world and its value is (for the most part) stable because it's a limited resource. If this were implemented, we could say 1,000BTC = 1 troy ounce of gold or something similar. This has both good and bad; first, the MtGox proposal above would not work the same in this scenario, but in exchange we would have a way to actually provide value to BTC that every person on the planet could agree on.
Other issues worth mentioning that I won't cover for the sake of the size of my post unless people want to hear my thoughts and possible solutions on.
submitted by InMSWeAntitrust to Bitcoin [link] [comments]

Newsdumps issue 2 (text)

News dumps issues 2#

 
Date: 14/10/2016
 
Welcome to newsdumps issue 2 All the links is dump into one text file
https://play.spotify.com/use1137507342/playlist/4AEZBA8C3SpVXK3DzxWTPJ
Movie of the week:French Connection
 
SJW section
 
technology section
 
Gaming Section
 
local London news
SJW Section :
Monday
 
 Feminist film-maker criticised for making 'balanced' men's rights documentary 
https://www.theguardian.com/film/2015/nov/11/cassie-jaye-red-pill-feminism-mens-rights
 
 CNN Caught on Tape telling "unbiased" debate watchers what answers to give 
https://www.reddit.com/KotakuInAction/comments/56qaxcnn_caught_on_tape_telling_unbiased_debate/
 
Woman screams at Reporter to leave because he is a "fucking white male". Isn't it sad that this considered fairly normal now 
https://www.reddit.com/KotakuInAction/comments/56rti2/woman_screams_at_reporter_to_leave_because_he_is/
 
 Female Cop Was Afraid to Pull Gun in Fear of Backlash. She Staggered Away Nearly Beaten to Death... thanks blm thanks for screwing everything 
4.http://ijr.com/2016/10/709373-female-cop-was-afraid-to-pull-gun-in-fear-of-backlash-she-staggered-away-nearly-beaten-to-death/
 
Tuesday
 
 Chris Kluwe-less(blacklist from the nfl), whose locker room talk included jokes about Penn State rape victims & about fellow player raping underage girls but didn't report) lectures Trump on how nicer "real" locker room talk 
http://web.archive.org/web/20161010212034/http://www.vox.com/first-person/2016/10/10/13230346/donald-trump-locker-room-talk-chris-kluwe
 
 Man on tram labelled 'sexual predator' by viral feminist witch hunt is actually just a harmless autistic guy who wants a high-five 
http://www.dailymail.co.uk/news/article-3830176/Man-Melbourne-tram-labelled-lowlife-creep-autistic-loves-giving-strangers-high-fives.html
 
 HIPSTERS 
https://www.reddit.com/KotakuInAction/comments/56xkb7/socjus_this_sjwfriendly_nyc_pharmacy_is_illegally/
 
 In light of Trump and Faraci, this is more relevant than ever: Unapologetic NeoGAF owner EviLore sexually assaults a woman in 2012, defends his actions, bans dissenting Gaffers, threatens anyone else who dares bring it up 
https://www.reddit.com/KotakuInAction/comments/56yiuin_light_of_trump_and_faraci_this_is_more/
 
 reddit world news is cernsoring hate speech 
https://www.reddit.com/KotakuInAction/comments/56ygfd/rworldnews_mods_censoring_views_as_hate_speech/
 
 milo wants to buy 4chan 
http://archive.is/DVaF5
 
Wednesday
 
 TWO MORE MEMBERS CONFIRM AUTHENTICITY OF CRASH OVERRIDE NETWORK LEAKS 
http://www.oneangrygamer.net/2016/10/two-more-members-confirm-authenticity-of-crash-override-network-leaks/13917/
 
Black Lives Matter’ Protesters Block Bridge, Delay Child’s Medical Emergency 
http://www.dailywire.com/news/7442/black-lives-matter-protesters-block-bridge-delay-amanda-prestigiacomo
 
 Canadian Students Demand Censure of ‘Bigoted’ Professor Who Refuses to Use ‘Correct Gender Pronouns’ 
http://heatst.com/world/canadian-students-demand-censure-of-bigoted-professor-who-refuses-to-use-correct-gender-pronouns/
 
*Thursday *
 
 People Are Upset Bob Dylan, Another White Man, Won Nobel Prize for Literature 
http://heatst.com/entertainment/people-are-upset-bob-dylan-another-white-man-won-nobel-prize-for-literature/
 
 CUNY Prof Accused of Sexual Harassment Because His Syllabus Says Effort Is 10% of Grade 
https://reason.com/blog/2016/10/13/cuny-prof-accused-of-sexual-harassment-b
 
 6 Ways The Fight For Trans Rights Is Civil Rights Repeating 
http://archive.is/of6YF
 
 Black-owned Portland cupcake shop accused of racism 
http://www.oregonlive.com/foodday/index.ssf/2016/10/black-owned_portland_cupcake_s.html?utm_source=fark&utm_medium=website&utm_content=link&ICID=ref_fark
 
Friday
 
 MATT HICKEY, ANTI-#GAMERGATE JOURNALIST CHARGED WITH RAPE 
http://www.oneangrygamer.net/2016/10/matt-hickey-anti-gamergate-journalist-charged-with-rape/14088/
 
 GEARS OF WAR 4 MAY HAVE USED STOLEN ART ASSETS, PROMPTS MICROSOFT TO INVESTIGATE 
http://www.oneangrygamer.net/2016/10/gears-of-war-4-may-have-used-stolen-art-assets-prompts-microsoft-to-investigate/14059/
 
 YouTube censoring videos from conservative group 
http://www.washingtonexaminer.com/youtube-censoring-videos-from-conservative-group/article/2604384
 
 Popular YouTuber Casey Neistat Wants His Viewers to Harass Other YouTubers That Aren’t With Hillary 
https://heatst.com/tech/popular-youtuber-casey-neistat-wants-his-viewers-to-harass-other-youtubers-that-arent-with-hillary/
 

technology section

Monday
 
 LinkedIn now lets you look for work without your boss finding out 
http://venturebeat.com/2016/10/06/linkedin-now-lets-you-look-for-work-without-your-boss-finding-out/
 
 T-mobile wants to recall sumsung s7 note 
https://newsroom.t-mobile.com/news-and-blogs/samsung-note7-update.htm
 
 In the UK, running a blog over HTTPS is an act of terrorism, says Scotland Yard 
https://www.privateinternetaccess.com/blog/2016/10/uk-running-blog-https-now-act-terrorism-says-scotland-yard/
 
 Google Releases an open source font that supports 800 languages 
https://tech.slashdot.org/story/16/10/09/2046256/google-releases-an-open-source-font-that-supports-800-languages?utm_source=feedly1.0mainlinkanon&utm_medium=feed
 
 Biz Stone: How Jelly Integrates A.I. Into Its Search 
https://www.youtube.com/watch?v=5kCvMAD7_fY
 
Tuesday
 
 elon musk open ai is using reddit 
http://futurism.com/elon-musks-openai-i-using-reddit-to-teach-an-artificial-intelligence-how-to-speak/
 
Sumsunng Stops s7 
http://www.nytimes.com/aponline/2016/10/11/world/asia/ap-as-skorea-samsung-halting-note-7.html?_r=0
 
Yahoo turned off emails 
https://consumerist.com/2016/10/10/yahoo-turned-off-e-mail-forwarding-just-when-people-might-want-to-leave/
 
Scum centers has been raided IRS 
https://blog.malwarebytes.com/security-world/2016/10/multiple-scam-centers-raided-in-india-for-irs-fraud/
 
Sumsung tells users turn off your phones 
http://money.cnn.com/2016/10/10/technology/samsung-galaxy-note-7-turn-off/index.html?adkey=bn
 
google problem 
http://www.theverge.com/2016/10/10/13234558/google-defamation-takedown-deindex-scam-reputation-management
 
Wednesday
 
Future of Java 
https://dzone.com/articles/executive-insights-on-the-state-of-the-java-ecosys
 
Sumsung profits is slashed 
http://www.wsj.com/articles/samsung-slashes-profit-forecast-due-to-galaxy-note-7-recall-1476257350
 
Thursday
 
World's Largest Solar Project Would Generate Electricity 24 Hours a Day, Power 1 Million U.S. Homes 
http://www.ecowatch.com/worlds-largest-solar-project-nevada-2041546638.html
 
Samsung will credit you with $100 if you exchange your Note7 for another Samsung phone 
http://mashable.com/2016/10/13/samsung-note7-incentives/?utm_cid=hp-n-1#k6dJ4tIMXEqF
 
NL Parliament makes open standards mandatory 
https://joinup.ec.europa.eu/community/osonews/nl-parliament-makes-open-standards-mandatory
 
 DARPA may borrow blockchain tech from Bitcoin to secure military networks 
http://www.extremetech.com/computing/237461-darpa-may-borrow-blockchain-tech-from-bitcoin-to-secure-military-networks
 
 Hyperloop One and Dubai Future Accelerators will build the first ‘hyperloop for cargo’ 
https://techcrunch.com/2016/10/12/hyperloop-one-and-dubai-future-accelerators-will-build-the-first-hyperloop-for-cargo/
 
 WHAT 
https://www.planetoftheapps.com/
 
Friday
 
 Windows 10’s next major update to debut in March 
http://www.theverge.com/2016/10/14/13283102/microsoft-windows-10-march-2017-update-redstone-2
 
Google's memory-boosted AI could help you navigate the subway https://www.engadget.com/2016/10/13/google-neural-network-with-memory/
 
Facebook Pays Indian Hackers The Most For Its Bug Bounty Program 
http://www.breakinggnews.com/facebook-pays-indian-hackers-bug-bounty-program/
 
 IBM, Google, others to unveil new open interface to take on Intel 
http://www.reuters.com/article/us-technology-consortium-idUSKCN12E0C5?il=0
 

Gaming Section

 
Monday
 
 NEW STAR CITIZEN CAMPAIGN AND GAMEPLAY DETAILS REVEALED 
http://www.keengamer.com/article/14377_new-star-citizen-campaign-and-gameplay-details-revealed
 
 Star Citizen's single player campaign will miss 2016 launch date 
http://www.reportfeeds.com/2016/10/Star-Citizen.html
 
 WTF Activision explains why Call of Duty: Infinite Warfare will need 130 GB 
http://gametransfers.com/activision-explains-why-call-of-duty-infinite-warfare-will-need-130-gb/
 
Tuesday
 
 Mafia 3 comes with Patch 
http://steamcommunity.com/games/360430/announcements/detail/814414949508697159
 
 METAL GEAR SOLID V: THE DEFINITIVE EXPERIENCE TEASER TRAILER and Konami close likes lol 
https://www.youtube.com/watch?v=cnKBWZc3_Is
 
 Despite what Sony says, the PlayStation 4 Pro cannot compete with PC 
http://www.geek.com/tech/despite-what-sony-says-the-playstation-4-pro-cannot-compete-with-pc-1673999/
 
 WHY WHY ! 
http://vgpwn.com/gears-of-war-movie-coming-from-microsoft-and-universal-pictures/
 
Wednesday
 
 Shadow Warror Gameplay 
https://www.youtube.com/watch?v=Cv8lkl7obrY
 
 EA LIMITS PRIVATE GAME SERVERS FOR BATTLEFIELD 1 
https://server.nitrado.net/usa/news2/view/ea-limits-private-game-servers-battlefield-1-massively/?f=home
 
 'League of Legends' pro suspended and fined $2K for racist language 
http://mashable.com/2016/10/10/league-of-legends-esports-worlds-player-fined-suspended/#ZIzQW3ktFaqP
 
Thursday
 
 Valve shows off new VR controller prototypes 
http://www.theverge.com/2016/10/12/13264950/valve-vive-vr-controllers-new-prototype
 
 KONAMI DROP METAL GEAR SOLID V: THE DEFINITIVE EXPERIENCE ON XBOX ONE, PS4 AND PC 
http://www.thexboxhub.com/konami-drop-metal-gear-solid-v-definitive-experience-xbox-one-ps4-pc/
 
Hitman news 
https://www.blotgaming.com/news/hitman-finale-location-announced/
 
Friday
 
 PS4 PRO WILL SUPPORT SATA 3.0 INTERFACE ON IT'S HARD DRIVE 
http://www.keengamer.com/article/14428_ps4-pro-will-support-sata-30-interface-on-its-hard-drive
 
WHAT http://marketplace.xbox.com/en-US/Product/Silent-Hill-Downpou66acd000-77fe-1000-9115-d8024b4e0823?DownloadType=Game#LiveZone
 
PlayStation VR Works On PC Afterall, Along With Other Consoles 
http://mp1st.com/2016/10/13/playstation-vr-works-on-pc-afterall-along-with-other-consoles/#.WABoqeArLIU
 
 Looks like xbox is coming up 
http://venturebeat.com/2016/10/13/xbox-one-outsold-playstation-4-again-in-septembe
 
 Theme Park GETS VR 
http://powerupgaming.co.uk/2016/10/13/theme-park-studio-vr-retail-release-announced/
 

Local London News

 
Monday
 
 Man find hundreds for dumping waste near Wanstead Flats 
http://www.ilfordrecorder.co.uk/news/man_find_hundreds_for_dumping_waste_near_wanstead_flats_1_4730166
 
 Chigwell businessman jailed for £4.75m VAT fraud 
http://www.ilfordrecorder.co.uk/news/crime-court/chigwell_businessman_jailed_for_4_75m_vat_fraud_1_4727084
 
 Google expedition takes Snaresbrook pupils on trip around the world 
http://www.ilfordrecorder.co.uk/news/google_expedition_takes_snaresbrook_pupils_on_trip_around_the_world_1_4728239
 
 Gentrification Gentrification Gentrification Gentrification Gentrification has hit ilford as of late 
http://www.ilfordrecorder.co.uk/news/work_begins_on_new_141_home_development_in_ilford_town_centre_1_4729021
Tuesday
 
 Stephen Port murder trial: Man 'awoke sore and naked' at flat 
http://www.bbc.co.uk/news/uk-england-london-37621960
 
 clowns has hit university campus in the uk 
http://www.bbc.co.uk/news/uk-england-london-37616160
Wednesday
 
 ‘Drugged-up, urinating youths’ are tarnishing Woodford Green estate, says councillor 
http://www.ilfordrecorder.co.uk/news/crime-court/drugged_up_urinating_youths_are_tarnishing_woodford_green_estate_says_councillor_1_4732802
 
 Police siege in Woodford Green as man barricades himself on roof of flats 
http://www.ilfordrecorder.co.uk/news/education/police_siege_in_woodford_green_as_man_barricades_himself_on_roof_of_flats_1_4732205
 
 The clown Problem takes place in Brunel University 
http://www.bbc.co.uk/news/uk-england-london-37628634
Thursday
 
 Motorbike crash in Wanstead causes congestion on A12 
http://www.ilfordrecorder.co.uk/news/motorbike_crash_in_wanstead_causes_congestion_on_a12_1_4735085
 
 23 things you only know if you grew up in Redbridge 
http://www.ilfordrecorder.co.uk/news/23_things_you_only_know_if_you_grew_up_in_redbridge_1_4734398
Friday
 
 Harimbe Brother is going to his brother Finueral 
http://www.bbc.co.uk/news/uk-england-london-37652212
 
 Hainault Business Park sends warning to would-be burglars at SmartWater launch 
http://www.ilfordrecorder.co.uk/news/hainault_business_park_sends_warning_to_would_be_burglars_at_smartwater_launch_1_4735113
submitted by pi3dpip3r to Newsdumps [link] [comments]

IT Expertise desperately needed. Crypto-Ransomware on company server. Please help.

Hello, Redditors, I'm here today on the behalf of my company and I must say we are indeed in a terrible, terrible situation. Over this weekend a computer within our network was infected with a type of crypto-ransomware called Osiris. This spread from the client computer onto our server that hosts Epicor and it's database. The database does not have a backup. Yes, that is correct. There is no backup for this server. I'm fairly new to the company but I have been tasked with solving this situation as efficiently as possible to get operations running. It just so happens that this server was responsible for inventory control, purchasing, and production management. I have tried looking online for decrypters for Osiris as well as scanning with pretty much any antivirus suite available including Bitdefender, Kaspersky, Hitman Pro, Malware Bytes, and Spyhunter but all to no avail. The antivirus suites found something called an "encryption engine" hiding behind a Trojan but removing the infected files did not help as the remaining hard drive files are still encrypted. The Osiris virus has encrypted the server and client computer with a bunch of files with the .osiris file extension. It says to connect to their "private server" via Tor to send them a payment via bitcoin for the decryption key. Obviously paying the ransom is a stupid idea but quite honestly, we're looking to complete data loss for the company. Please advise reddit.
submitted by theriju to computerviruses [link] [comments]

[Table] IAmA: I am Wired contributor Joshuah Bearman, and I just published Part 2 of a 20,000-word story on the Rise and Fall of Silk Road. (I also wrote the story that became Argo, which was exciting.) I'm sure people have questions about Silk Road. AMA!

Verified? (This bot cannot verify AMAs just yet)
Date: 2015-05-14
Link to submission (Has self-text)
Questions Answers
Did you consider the trial fair? I did not follow it closely, but since all the evidence was digital, I read his mother Lyn stating something like "this evidence could have been planted on his computer". This seems a bit far fetched, but still: could it be true that Ross was set up? Good question. Yes, I think the trial was fair. My personal opinion is that Ross' lawyer mounted a peripatetic and somewhat ineffective defense. Not sure what a better defense would have been, but there were some clear missteps.
And again, the evidence was overwhelming. Court beat reporters and law enforcement professionals alike who got anywhere near that case or the trial all said that they had never seen such clear evidence of a criminal conspiracy.
The only way Ross is innocent is if the FBI planted it all. Which would have taken some doing. There was 1TB of information on his drive. Thousands of files. Hundreds directly about the Silk Road. Many of which were entered into evidence. The FBI would have had to fabricate them all -- including a diary full of intimate detail about Ross' personal life that they couldn't really have known -- for that argument to hold any water.
And, incidentally -- even if that were true, the defense said that would only explain the period he supposedly handed off Silk Road to someone else. They admitted he created it, and was running it at the end. Both of which also constituted the crimes he was charged with. So the multiple DPR theory and/or conspiratorial notion of the FBI planting evidence wouldn't even clear Ross of the charges.
You don't think that the fbi crossed any legal lines to retrieve the adress of Silk Road's servers, as it was rumored at some point ? You article states that no, but did you ever entertained the possibility ? Good question. And I don't think legal lines were crossed. For it to be illegal, the FBI would have had to break the functionality of the site -- the statutory definition -- and there's no evidence that occurred. Although yes, I entertained the possibility. As I described in another response, I see why there is so much speculation. It's a key point. And it relates to the much bigger and very important issue of electronic privacy. But the theorists about the hack don't suggest how the server was hacked. They just say that the server could not have been accidentally discovered. Everyone seems adamant about this, despite the fact that Ross himself wrote that he leaked the IP at times. And users posted publicly about that as well. Ross wasn't a programmer. The Occam's razor explanation is the one provided by the government, not the theorists of the hack: Ross made a mistake.
A more silly question, do you like the illustrations that Wired choose to illustrate your article ? And, yes, I do like the style. They're not quite the images I pictured while writing -- a little harder-edged than what materialized in my mind -- but then again I'm not the artist.
Occam's Razor says that the squirrely FBI description points to them hiding something. Maybe it was hacking. Maybe it was the NSA who found the server, and they are just using "parallel construction" to pretend they found it.
What motivated you to investigate and write a piece on the Silk Road? Was it just a case of supplying the demand? Was it pure curiosity at how such an enterprise rose to prominence? Did you have any political reasons for involvement? Well, I will admit I wasn't so hot on this story at first. Started working on it with Josh Davis, and it's more in his realm. But then, he started working on other things, I got these reporting breakthroughs, and then got sucked in to the piece, realizing along the way, that it had the makings of a non-fiction novella, which is how I tried to write it.
The story kept getting more interesting. The zeitgeist of it, and the cops and robbers element were a solid foundation -- but the emotional story was what drew me in.
The transformation of the characters and the ideas. From youthful vigor into cynical narcissism. From "do no harm" to "change the order to execute." Even though it played out in a technological realm, it felt like a deeply human story.
That was a very interesting read, thanks! What do you think of the role Variety Jones/cimon played in managing Silk Road and why do you think LE seem to be unable to arrest him? That's a good question. My story included Variety Jones in its longer version, when it was a 30,000 word (!) manuscript. But, it got complicated, for narrative purposes, to explain that relationship as space got tight. I mean, the story is already the longest Wired has ever published, and he just didn't have that much more room.
That said, Variety Jones/cimon clearly played an important role. He wasn't another user of the DPR handle, but he helped Ross conceptualize his role as leader. And he guided Ross toward the moral Rubicon of hiring a hit man. Variety Jones was the Silk Road's Rasputin, whispering into the Czar's ear.
Also like Rasputin, hard to take down! Not sure why he hasn't been caught. Although I suspect that he will eventually.
Did you ever follow up on Plural of Mongoose and Gypsy Nirvana? Sure thing. And no -- who are they?!!
Link to antilop.cc. PoM was believed to be using the VJ nym on SR and used to work for Gypsy Nirvana. Ah -- that's such a great resource. Used it a lot. So dense. Part of my job was to make the narrative comprehensible, which meant cutting out some detail...
Can you explain the basis of your narrative of how Tarbell found the server? I realize that this is a controversial point. (Although even if the server was "hacked," it does not actually exculpate Ross.) And I understand why people are attracted to the theory of the hack. But no one has provided any substantiated account of what this hack would have been. There were no tools to "hack" Tor. It's all speculation, and theorizing. And yet, Ross wrote in his diary that he leaked the IP. Many people noted on Reddit that the Silk Road leaked the IP at times. Ross was not a professional programmer, as we know. The simplest explanation is that he made mistakes -- as he did many other areas of operational security -- and the feds got lucky and exploited them.
Did you ever consider the multiple-DPR narrative (as told by the defense) plausible? The Deep Web documentary by Alex Winter seems to follow that argument. So I am just wondering what makes you so sure that there was only ONE dpr who was, in fact, Ross Ulbricht? That's a GOOD QUESTION. I did consider that it was plausible, but that was before I saw the evidence. It is just overwhelming. Ross admitted to starting Silk Road. He was arrested while logged into the admin panel as /mastermind. He claims that in the meantime the site was run by someone else. But his own diary, chat logs, and various other records (like a spreadsheet showing Silk Road assets) found on his computer, show that he was running it the whole time.
Moreover, it was demonstrated at the trial that during the time Ross claimed that someone else ran Silk Road, he was receiving all of the bitcoin commissions from the Silk Road escrow account. So that makes it fairly impossible for anyone else to have been DPR.
off, this was one of the best pieces of journalism I've read in a long time. I couldn't wait for part 2! I read it this morning. What are your thoughts about Hollywood turning this into a blockbuster? THANKS! I appreciate it. Man, it was a beast to report and write. But rewarding to get a huge story like this into Wired, in two parts even.
As for a film adaptation, this story has been optioned. And efforts are underway. I was struck while writing this story how it hit the zeitgeist of our time, with drugs and entrepreneurialism and youthful idealism, and also underlined some deep, resonant themes about how we live now, mediated through the digital world, and fragmented identity -- all within the quick-moving narrative of a true crime case. I think that could make for a great movie. As I said somewhere in the story, sort of a true crime version of The Social Network.
Hello, thanks for the AMA. What do you think of the current U.S. drug laws? I think the War on Drugs is a failure. An expensive one. And broadly favor decriminalization. Although I haven't given real thought to whether that should extend to opiates, etc.
Also, the drug laws have led to massive incarceration, and helped destroy an urban generation. So, in that sense, I sympathize with that part of the Silk Road (and Ross') early philosophy. The problem, of course, was when that idealism turned into ideology. And it became a criminal enterprise rather than just a political idea.
1) I know a lot of media hype was placed upon Silk Road being an "Amazon for all things illegal". Have there been any confirmed cases of it selling anything other than drugs (such as counterfeit products, weaponry, or even being used to hire a hitman)? 1) Yes, the hype was a radical over-simplification. Silk Road was mostly drugs. And some odd ordinary items, like you'd find on eBay. The rules prohibited anything that would harm someone else, like identity theft stuff. (Although sometimes that stuff wound up on there anyhow.) There was no child porn. There were no guns, although DPR created the short-lived Armory, for that express purpose.
2) If DPR had more of a technical background (or at least been more careful to take care of all the security threats), do you think Silk Road would still be active today? 2) Yes. I think so. Had he known how big it would become, had tight op-sec from the beginning, and been a professional programmer, rather than learning along the way, Silk Road might very well still be operating, its servers undetected.
How has your personal life been affected by the publishing of these stories about Silk Road? What types of praise or criticism have you seen since publishing? Any legal action? I'm very interested in what happens to reporters lives and careers after exposing stuff like this. No personal effect, other than people seem to like the story! I did have to be very careful, obviously, with law enforcement info. You can veer close to subpoenas with reporting like this. I had never done that kind of reporting before. I also had to keep the confidence of sources from inside Silk Road. That was just as important to protect.
And for the most part, there's been little criticism of the story. I hope that's because it was so exhaustively reported! And fact-checked, and edited, and reviewed by lawyers, etc.
Last updated: 2015-05-18 17:50 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

PCO on working with Bret Top 3 DarkWeb Illegal Websites - YouTube Elanip - YouTube Hitman 2

If you wanted someone murdered, you used to drop off a bag of cash in an alley. In 2013, you need only an Internet connection and bitcoins. Eli Lake on the ‘Hitman Network.’ Hire a professional hitman; We only accept Bitcoin (BTC) as a payment method; We do not kill anyone under 18 years old; We only operate in United States, Canada and Europe Hitman Network, which claims to be a trio of contract killers working in the United States, Canada, and the European Union, offers people a commission for referring their friends. “Tell others ... I always love this section because, inside this section, I am covering services related deep web links, and these hidden wiki links offering all type services like deep web hitman, Rent a Hitman, Rent a Hacker, Buying documents, Escrow and much more.I am regularly checking below given links, and all are working at a time when I explored these site, If anyone link is not working then don’t ... Disgruntled Woman Falls for Darkweb Hitman Bitcoin Scam. Security. 01.10.2020 Admin Leave a Comment on Disgruntled Woman Falls for Darkweb Hitman Bitcoin Scam. Kristy Lynn Felkins, a 36-year-old woman from the state of Nevada, is facing 10 years in prison after a failed attempt to hire a hitman for her ex-husband. The woman sent $5,000 worth of Bitcoin (BTC) to a dark web website that promised ...

[index] [39402] [32885] [16558] [40774] [44332] [48084] [45989] [51219] [26540] [29049]

PCO on working with Bret "the Hitman" Hart

This video is unavailable. Watch Queue Queue. Watch Queue Queue I like video Games. We were recently joined by former Ring of Honor Heavyweight Champion PCO to discuss a wide variety of topics, including his work with WWE/WWF legend Bret "the Hitman" Hart. LINKS: WCSN: thewcsn.ca ... Hitman Network Says It Accepts Bitcoins to Murder for Hire Eli Lake 10.17.13 5:45 AM ET Photo Illustration by The Daily Beast/Elena Scotti You can only acc... Investor in Bitcoin & bitcoin advice for the easiest and least cost way to get started buying bitcoin and investing in bitcoin cryptocurrencies. Follow my ea...

#