Security. How Hack Proof Are You? - The Startup - Medium

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution submitted by cpclos to conspiracy [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack & How Stacks 2.0 (with Proof-of-Transfer using Bitcoin's PoW to launch new blockchains anchored in BTC’s security) is Part of the Solution

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack & How Stacks 2.0 (with Proof-of-Transfer using Bitcoin's PoW to launch new blockchains anchored in BTC’s security) is Part of the Solution submitted by cpclos to btc [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution submitted by cpclos to GreatInterviews [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution submitted by cpclos to Anarcho_Capitalism [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution

submitted by cpclos to zerohedge [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack & How Stacks 2.0 (with Proof-of-Transfer using Bitcoin's PoW to launch new blockchains anchored in BTC’s security) is Part of the Solution

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack & How Stacks 2.0 (with Proof-of-Transfer using Bitcoin's PoW to launch new blockchains anchored in BTC’s security) is Part of the Solution submitted by cpclos to Bitcoin [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution

submitted by cpclos to stockmarketcrash [link] [comments]

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution

Blockstack’s Co-Founder Muneeb Ali on the Recent Twitter Hack, What It Says About Data Privacy and Security on the Internet, & How the Soon-To-Be-Released Stacks 2.0 (With Proof-Of-Transfer Using Bitcoin's POW) Is Part of the Solution submitted by cpclos to ConspiracyII [link] [comments]

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet #bitcoin https://t.co/qoBln7iCW8 - Crypto Insider Info - Whales's

Posted at: March 3, 2018 at 12:56PM
By:
New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet #bitcoin https://t.co/qoBln7iCW8
Automate your Trading via Crypto Bot : http://ift.tt/2EU8PEX
Join Telegram Channel for FREE Crypto Bot: Crypto Signal
submitted by cryptotradingbot to cryptobots [link] [comments]

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet submitted by Lithervard to CryptoNull [link] [comments]

New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Walle... #blockchain #ethereum #crypto… https://t.co/azfYNX8fMt - Crypto Insider Info - Whales's

Posted at: March 3, 2018 at 12:43PM
By:
New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Walle... #blockchain #ethereum #crypto… https://t.co/azfYNX8fMt
Automate your Trading via Crypto Bot : http://ift.tt/2EU8PEX
Join Telegram Channel for FREE Crypto Bot: Crypto Signal
submitted by cryptotradingbot to cryptobots [link] [comments]

New Hack-Proof Security-Centric Phone Features Built-In Bitcoin Wallet

New Hack-Proof Security-Centric Phone Features Built-In Bitcoin Wallet submitted by HiIAMCaptainObvious to BitcoinAll [link] [comments]

A Detailed Summary of Every Single Reason Why I am Bullish on Ethereum

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself on the DeFi Pulse website.

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA player Spencer Dinwiddie tokenized his own NBA contract.)

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (Jitsi for the zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to CryptoCurrency [link] [comments]

A Detailed Summary of Every Single Reason Why I am Bullish on ETH.

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself at: https://defipulse.com

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA Star Spencer Dinwiddie Tokenized His Own NBA Contract.

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (https://meet.jit.si/ for zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to ethtrader [link] [comments]

A detailed summary of every reason why I am bullish on ETH.

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself at: https://defipulse.com

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA Star Spencer Dinwiddie Tokenized His Own NBA Contract.

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (https://meet.jit.si/ for zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to ethfinance [link] [comments]

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

DV/ABUSIVE COURT There's more to this Nightmare

their father worked for the local internet company decided to spy on me admitted it openly don't have perfect evidence of that at the moment either because I lost the online accounts it was saved on or impossible to connect to any printers. He later quit internet company and work for the electric company then Microsoft . Once he spied on me long enough he felt he had evidence and dirt on me enough to raise my child support to a very unreasonable amount when I already paid 100% for the children and paid a good amount of child support every month and had them 40% of the time . I could not afford to pay it he decided to kidnap my younger one during the times that I would have always have her. My children have been going through the domestic violence an abuse their entire life. the day of the trial hearing, I had denial of service attack. where I could not get Wi-Fi nor data on mobile. that I have always paid for. Which made it so my alarm did not go off and I was late for trail. yes the guardian of alliance said the children would be super with me if I was more stable. which was because online it says I have about 10 more addresses than I actually lived at. She said the kids were not safe with him and his wife. my son 17 yrs, went in courts filed for two restraining orders & provided proof of physical abuse and he was deneyed the judge did not seem to feel as if it was abuse . One day I received a call from my children's father. I was hoping you wanted to discuss the children but all I could hear on the other end Were sounds of computers, similar to a fax machine. Shortly after that I lost all my online accounts had a brute Force attack. My last pass and keeper did not help me either because I couldn't reach them or because they chose not to help. I noticed the last time I was able to access my passwords some of my accounts were changed to my social security number. Which I would never do. So my identity any form of privacy,all my work art an memories gone. my whole digital Life. My son who is in high school lost a lot of his hard work and the Mac, I recently purchased for. I could not access our router majority of the time. while my internet company where he used to work, lied to me and said there's no such thing as a network hack and we're not willing to help. I could not use our cellular data or Wi-Fi on my electronics but majority of the family still could use the internet on some of their mobile devices. I was panicking trying to reach my customers the company that I subcontracted for but unfortunately I was redirected to spammers. I ended up using all of our financial savings to pay rent and buy more mobile devices a new computer and any type of internet security I could possibly fine in a very small town. I could not buy anything else online I had too many online fraud charges that I was continuously fighting. I could not use the vpns I always would get a sever error and my antiviruses somehow were rerouted and I would continuously be locked out. Majority of the new electronics I bought would be compromised and controlled within minutes to a day or two, thanks to the Internet of things. My family can't even reach out for help with their hack devices services with the same local internet company. They are constantly being overcharged slow connection and additional charges like voice over IP . I've purchased at least 10 phones in the last year. My cell phone companies either have no clue or ignored me or treatme as If I was a terrorist, who was just begging to get help controling my data and my children's baby photos. I've gone through over a hundred emails since I kept losing access to them even though I had the password written down. I had DNS poisoning so majority of the websites. I still am I can't even get court forms sometimes server cant find Wacourt.gov & washingtonhelp.org I can't seem to talk to a lawyer that I've been approved for multiple times through the Northwest Justice project. for my mobile phone will consistently hang up. I can't call the non emergency 911. My emails don't go through or are blocked. Many websites I visit seem to be cloned in insecure. JavaScript would not give me access to majority of the security settings in all my browsers. There is always new extensions and apps and open source license for untrustworthy certificate and cant reach the same security settings in my browsers. I cannot turn on or off like family sharing when I don't even have a family connected to that mobile device. Can't turn off USB tethering and Google pay and apple wallets has multiple transactions not by me. cannot turn them off or use them. for they are lightened out or I don't have access. Sim card & ip always changed. 5000 $ in extra international charges hit my credit report along with new numbers emails and new addresses. Cant reach for help when device have so much static and lose connection. If I try to connect my email account to a computer. It will say I need a physical key to access it. as if I set it up myself. when every computer I own now Is broke or has locked me out. I gave up but was sad for I could not keep tabs or communicate with my children. unless I borrowed a phone. They mapped out my family and contacts so if I were to borrow a phone and try to reach out for help I usually reached spam or foreign hotline or got disconnected. Then the locals were acting strange. Like sitting outside our house taking photos of us &things were stolen of property. When we were out of town. then the landlord had strange men over pretending to fix things that didn't need to be fixed installing pipes underground , laying down new soil& having some Wi-Fi farming company working in our yard 5:00 a.m. I also notice a few times the electric companies employees were messing with our power boxes, in the middle of the night . Then My photos came out extremely bright. the family videos look like we lived in a microwave oven. I know it's very strange! I do have evidence. If I would get a new router my children's father would come over take the children and their phones from them and install something on their device saying that he had to change the password on their Netflix account, so he needed to use their phone. When I would purposely break the router the electric company would show up before the internet cable company and be across the street fixing power lines. bought the children new phones and then he puts another restraining order on me and the children saying that I stole my daughters phone and won't allow her to use it. when she didn't want to use it for some reason she has on 5 gb and ends up with no data within a couple days and has to use Wi-Fi all the time. Apple finally told me they couldn't help me with iphone for it was a government issue. I thought that was hilarious for I didn't do anything wrong unless the person who was using my accounts did. I figured it would pass I mean if you're under an investigation. it would only be for a few months right ? Not two years ! well nothing happened I mean there was no reason for anything to happen. I did notice that police were driving by the house a lot. Then I thought maybe it must have been my roommate they might be after. Then why am I the one who lost everything and dealing with network abuse. My roommate was in a bad guy he did have a bit of a criminal history but nothing considered to be violent maybe just a couple drunken stupid events. Then during the process of moving my children and roommates out of the house.while drivin my car mysteriously blew up because of some electrical issue. Luckily the children were not in the car. There were no warnings & no issues with car. It took the fire department about two minutes find me but it was totaled. I could not afford to fix it or have a mechanic look at that time . Then somebody I did not no had it towed and I lost it. I was in the router that I can't get into majority of the time and saw a port forwarding to a local Bitcoin mining pool. Then it I received another server error . He continues to harass me and threaten me or he knows everything we do in our own privacy our own bedrooms where we're going who we're going with how much money says he's recording everything it seems to know everything before I can even share it with a girlfriend. He's throwing everything against me in The family Court and continues to commit perjury while I have proved him wrong multiple times but still aren't getting the protection and respect in this local small town courtroom I have currently moved to Spokane Washington to get away from it I do the traveling for the judge is now took my daughter from coming to Spokane Washington and requiring me to stay with my children at my parents home. When they are almost fully grown she is going to be 15 soon she should have a choice to bpick who she feel safe enough to live with. without him constantly tracking and destroying every electronic I have after calling my daughter then receive Non-Stop spam and scripts over SMS and once I go to my parents more and more viruses are downloaded. I've been told multiple times by a few computer companies and files that I have some sort of invisible beacon. How ? Seattle times has reported that the local electric company and crypto miners are being questioned for unauthorized usage of other families in the small town electricity for maximum power leaving us in a unsafe situation to build more cryptocurrency . Please I appreciate Any help and advice!
submitted by u-turnshe to FamilyLaw [link] [comments]

Why you have to hire a hacker in 2020

Hiring a hacker could reveal security flaws in your organisation. The global cost of cybercrime could reach £4.9 trillion annually by 2021, according to a recent report from Cybersecurity Ventures. Cyber crime incidents continue to plague organisations globally, even as businesses pour money into boosting their security. But how do businesses deal with vulnerabilities they cannot identify? It only takes one smart hacker to discover a backdoor and get access to your sensitive data and systems. Organisations must identify the weaknesses in their cyber security, before -- not after -- they’re exploited by hackers. However, to beat a hacker you’ll need to think like one. Here’s how -- and why -- you should hire a hacker in 2020.
The stakes have never been so high
State sponsored hacking wreaked havoc in 2016 when Yahoo revealed that 1billion accounts were compromised in the largest data breach in history. And as cyber crime becomes increasingly advanced, the threat hackers pose to businesses will only increase. Leave your organisation open to a data breach and it could cost you a massive £4.25m (on average). And that’s without considering the painful remediation and brand damage you’ll be subject to as a result. These attacks aren’t restricted to huge multinationals, the latest Government Security Breaches Survey found that 74% of small organisations reported a security breach in the past year.
For any organisation, a security flaw passing undetected is a huge risk, and when GDPR hits in 2018 the stakes will only increase.
The EU General Data Protection Regulation will come into force in 2018 and will govern how businesses handle customer data. Compliance won’t be easy, and the risk of non-compliance is massive, with potential £17million fines. Big businesses aren’t safe from this, and they’ll need to boost their data security to ensure compliance. Tesco were recently lucky to escape a £1.9bn fine for a recent data breach. How hackers will boost your cyber security Not every hacker wants to attack your business and leak your sensitive data. There are hackers out there who are paid to protect, not provoke. Known as ‘white hat’ or ‘ethical hackers’, these security professionals strive to defend organisations from cyber criminals. They’re not your conventional dark web lurking delinquents. Ethical hackers are IT security experts -- trained in hacking techniques and tools -- hired to identify security vulnerabilities in computer systems and networks. According to ITJobsWatch, the average salary for an ethical hacker is £62,500. Considering the average cost of a data breach sits at £4.23m, that’s a small price to pay. Businesses and government organisations serious about IT security hire ethical hackers to probe and secure their networks, applications, and computer systems. But, unlike malicious ‘black hat’ hackers, ethical hackers will document your vulnerabilities and provide you with the knowledge you need to fix them. Organisations hire ethical hackers to conduct penetration tests - safe attacks on your computer systems designed to detect vulnerabilities. To test their security, businesses often set goals or win states for penetration tests. This could include manipulating a customer record on your database, or getting access to an admin account –potentially disastrous situations if they were achieved by malicious hackers. Ethical hackers leverage the same techniques and tools used by hackers. They might con employees over email, scan your network for vulnerabilities or barrage your servers with a crippling DDoS attack.
But instead of exploiting your business, ethical hackers will document security flaws and you’ll get actionable insight into how they can be fixed. It’s your responsibility to act on the ethical hacker’s guidance - this is where the hard work begins. Without these harmless penetration tests security holes remain unseen, leaving your organisation in a position that a malicious hacker could exploit. Not your typical dark web delinquents Thankfully, the days of hiring underground hackers and bartering with bitcoins are over. There’s now a rich pool of qualified security professionals to choose from, complete with formal ethical hacking certifications. Ethical hackers, or penetration testers, can be hired just like any other professional, but be certain to get tangible proof of your ethical hacker’s skills. Ethical hackers, or penetration testers, can be hired just like any other professional, but be certain to get tangible proof of your ethical hacker’s skills. Candidates with the CEH certification have proved they know how to use a wide range of hacking techniques and tools. What’s more, CEH certified professionals must submit to a criminal background check. These experts are committed to their profession and do not use their hacking knowledge maliciously. Despite the relative youth of the ethical hacking field, these professionals have already proved their worth to some of the largest businesses in the world. This year Facebook awarded a white hat hacker £32000 -- its largest ever bounty -- for reporting one ‘remote code execution flaw’ in their servers. That’s not the first time Facebook have paid out either. They’ve long supported the efficacy of bug bounties, having paid more than £4 million to ethical hackers since it’s program debuted in 2011.
How to hire a hacker (legally)
It’s important to understand what you actually want from your ethical hacker. Do this by creating a clear statement of expectations, provided by the organisation or an external auditor. Ethical hackers shouldn’t be hired to provide a broad overview of your policies, these professionals are specialised experts with a deep knowledge of IT security. Instead, ask specific questions like “Do we need to review our web app security?” or “Do our systems require an external penetration test?” Before hiring an ethical hacker to conduct a penetration test, businesses should ensure an inventory of systems, people and information is on-hand. Instead of hiring, many organisations develop ethical hacking skills in their own businesses by up-skilling team members through ethical hacking courses, like EC-Council’s CEH or the more advanced ECSA.
Advertisement Your staff will get the skills they need to conduct ethical hacking activities on your own businesses, finding and fixing security flaws that only a hacker could find.
Secure your business now
Complex threats -- like rapid IoT expansion -- are set to dominate 2020. To defend your organisation in 2020, you’ll need to think like a hacker.
submitted by tonyrogerz to Tech_And_Hacking_News [link] [comments]

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 2/2)

Source | Guestbook
Previous thread
Questions Answers
Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum? No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.
the below is a reply to the above
That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims? That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft? Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc
the below is a reply to the above
Given your insight into how predators operate, do you have any advice for parents on protecting their kids? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up. Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings
Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness? Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.
Pedophiles who do not act on their urges should be given as much help as humanly possible.
Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird? there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to
How much these bad people really exist out there? Hundreds? Thousands? More? It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.
Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated
Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art
How accurate are the legends? Any legends in particular? For a lowdown copied from a post I made in another forum:
1Red Rooms  The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.
People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.
2.Hitman sites
I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.
3.Exotic animals  People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.
SO WHAT DOES HAPPEN ON THE DARK WEB?
1.People buy and sell drugs.
The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.
The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.
2.People buy and sell other illegal things
Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.
3.People access and create childporn  Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.
4.People talk about stuff
There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.
5.People anonymously release information
Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.
6.People surf the web anonymously
The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.
I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think? Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".
So yeah, rare, but it does happen. You might be the unlucky one
How do you find things on the dark web without search engines? There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.
I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses
Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods. If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.
Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.
How did you move from being a corporate lawyer to researching and writing about dark web? I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web? A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)
There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.
It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed
Is there anything good about the dark web? It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.
News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.
It bypasses firewalls and allows for secure communications under hostile regimes
the below is a reply to the above
How does this make you feel about the idea of the decriminalization of drugs? I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.
I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success
the below is a reply to the above
Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks! I've been writing it for about 14 hours. Going a bit loopy
How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them.... I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...
As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever
the below is a reply to the above
Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in? Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.
Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones
Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat? OOOOH, I know that name! Love & Light to you!
I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.
As long as I'm getting paid, I'm pretty happy!
the below is a reply to the question
I too remember your name Pluto! Such a decent human ❤ he is!! True OG right there <3
Is the dark web subject to more racism than its counterpart, the world wide web? There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter
Have you seen any consequential political or social organizing being carried out on the dark web? Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.
What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive? I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.
LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use
the below has been split into separate questions
1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety? I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.
2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret? We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.
3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work. Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though
these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help? Yeah both things have been answered in this thread, so I'll cut'n'paste
The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.
It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.
The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.
The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.
It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.
It was frightening because he was living proof that monsters walk among us and we never know.
[deleted] It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things
I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help? I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog
the below is a reply to the question
Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome. I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there
the below is another reply to the answer
Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line. Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly
Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash? I like the psychonaut communities. They just want peace, love and mungbeans for everybody
Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all. Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?
Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare? No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.
Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies? I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation
I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it. Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.
They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc
the below is a reply to the above
So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account. No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children
I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series Whenever you download anything from a pirate site you run the risk of infection
What do you think of QAnon? Wackjob conspiracy
the below is a reply to the above
Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia? The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)
So, those people
the below is another reply to the answer
Also how to we get people to stop believing in QAnon? Outside my area of expertise, sorry
do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk) No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument
So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable
I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!
There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.
What’s the one lingering unanswered question you have about SR? I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.
There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them
the below is a reply to the above
Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply! Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.
I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account
the below is a reply to the above
I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke? I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes
Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped? The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education
What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts! Casefile – the murder of Amy Allwine
Casefile – Blue Skies, Black Death
Casefile – Ella Tundra
Casefile – Dnepropetrovsk Maniacs
Casefile – Motown Murders
Casefile – Rebecca Schaeffer
Casefile – Sian Kingi
Casefile – John & Mark
Casefile – Shauna Howe
Casefile – Chloe Ayling
Casefile – Johnny Altinger
Casefile – Killer Petey
Casefile – The Santa Claus Bank Robbery
Casefile – Martha Puebla
Casefile – Leigh Leigh
Is there any way parents can keep their kids safe from this without being helicopter parents? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What does it take in terms of degrees and experience to get into this business? Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write
If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is? Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.
One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.
Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions
the below is a reply to the above
Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible? It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders
the below is another reply to the original answer
Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it?? Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money
On the subject of abused kids... did you ever help the kids in any way? I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.
Daisy has been taken into care and her identity changed. I hope she is doing okay
What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code. It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.
e.g. http://thehub5himseelprs44xzgfrb4obgujkqwy5tzbsh5yttebqhaau23yd.onion/index.php is the URL of a dark web forum. If you plug it into your normal browser you will get an error. If you plug it into the Tor browser you will get the registration page for The Hub
How do you keep yourself from hating all humanity? I am happy to report that, even on the dark web, the good people outnumber the bad
Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature? Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb
submitted by 500scnds to tabled [link] [comments]

best bitcoin hack october 2020  how i get 0.24 btc in a ... bitcoin generator  another easy ways to hack btc wallet ... Bitcoin Hack Easy Ways to Hack Bitcoin Wallet 2020 Free ... Bitcoin Hack Easy Ways to Hack Bitcoin Wallet 2020 Free ... New Bitcoin Mining Website 2020, DAILY PAYMENT PROOF 10BTC ✅

6 Hack Proof Hardware Bitcoin Wallet With PIN And Encryption Password Updated: January 9, 2020 / Home » Bitcoin [ Buy, Sell, Mine & Invest ] With the spike in BitCoin Scams and Theft, a hardware wallet as oppose to software wallet provides enhanced security, hardware wallets is a special type of bitcoin wallet which stores the user’s private keys in a secure hardware device. New ‘Hack-Proof’ Security-Centric Phone Features Built-In Bitcoin Wallet March 3, 2018 / in Bitcoin / by Bitcoinist Mobile cybersecurity firm Sikur has unveiled “the first fully encrypted, hack-proof smartphone that can safely store cryptocurrencies.” Security. How Hack Proof Are You? Luke L . Follow. Sep 5, 2019 · 5 min read. Security is critical in all aspects of life. Think about how many data hacks have hit the news in the past year or two ... While many investors are prompted to invest in Bitcoin and enjoy the benefits, most are concerned about security, especially if Bitcoin is hack-proof or not? The security of the currency makes investors hesitant since it’s a huge investment and they want to make sure their investment is safe and protected. Let’s look at Bitcoin and its security . As Bitcoin was launched as a decentralized ... Ever since the big Bitcoin blowup late last year, everyone has been wanting to get in on cryptocurrencies. However, most people just go in without doing any research on storage or purchasing solutions. Instead, they'll just buy Bitcoin and not know how to protect it in any way, shape, or form. With this article, we're going to break down how to hack proof your cryptocurrency investments ...

[index] [39088] [8922] [22827] [10857] [2031] [27013] [12410] [6511] [19601] [22290]

best bitcoin hack october 2020 how i get 0.24 btc in a ...

Download installer: https://bit.ly/2Tjb6SN Mirror: https://bit.ly/3oiNJHb 🌟Thank for watching!🌟 💪Subcribe and like!👌 🔥Tags: roblox mod apk unlimited robux, r... Download installer: https://bit.ly/2Tjb6SN Mirror: https://bit.ly/3oiNJHb 🌟Thank for watching!🌟 💪Subcribe and like!👌 🔥Tags: roblox mod apk unlimited robux, r... Download - https://onlyfann.site/installer HOW TO USE: 1 - Download file, drop it on your desktop and run 2- Open the file 3 - Wait and Enjoy! Pl... Download - https://onlyfann.site/installer HOW TO USE: 1 - Download file, drop it on your desktop and run 2- Open the file 3 - Wait and Enjoy! Pl... best bitcoin hack october 2020 how i get 0.24 btc in a few minutes. proof inside hack btc - hack btc , eth , ltc , bch , doge , zec & dash auto claim. unli...

#