Sell bitcoin with moneygram global funds transfer exchange

Bob The Magic Custodian



Summary: Everyone knows that when you give your assets to someone else, they always keep them safe. If this is true for individuals, it is certainly true for businesses.
Custodians always tell the truth and manage funds properly. They won't have any interest in taking the assets as an exchange operator would. Auditors tell the truth and can't be misled. That's because organizations that are regulated are incapable of lying and don't make mistakes.

First, some background. Here is a summary of how custodians make us more secure:

Previously, we might give Alice our crypto assets to hold. There were risks:

But "no worries", Alice has a custodian named Bob. Bob is dressed in a nice suit. He knows some politicians. And he drives a Porsche. "So you have nothing to worry about!". And look at all the benefits we get:
See - all problems are solved! All we have to worry about now is:
It's pretty simple. Before we had to trust Alice. Now we only have to trust Alice, Bob, and all the ways in which they communicate. Just think of how much more secure we are!

"On top of that", Bob assures us, "we're using a special wallet structure". Bob shows Alice a diagram. "We've broken the balance up and store it in lots of smaller wallets. That way", he assures her, "a thief can't take it all at once". And he points to a historic case where a large sum was taken "because it was stored in a single wallet... how stupid".
"Very early on, we used to have all the crypto in one wallet", he said, "and then one Christmas a hacker came and took it all. We call him the Grinch. Now we individually wrap each crypto and stick it under a binary search tree. The Grinch has never been back since."

"As well", Bob continues, "even if someone were to get in, we've got insurance. It covers all thefts and even coercion, collusion, and misplaced keys - only subject to the policy terms and conditions." And with that, he pulls out a phone-book sized contract and slams it on the desk with a thud. "Yep", he continues, "we're paying top dollar for one of the best policies in the country!"
"Can I read it?' Alice asks. "Sure," Bob says, "just as soon as our legal team is done with it. They're almost through the first chapter." He pauses, then continues. "And can you believe that sales guy Mike? He has the same year Porsche as me. I mean, what are the odds?"

"Do you use multi-sig?", Alice asks. "Absolutely!" Bob replies. "All our engineers are fully trained in multi-sig. Whenever we want to set up a new wallet, we generate 2 separate keys in an air-gapped process and store them in this proprietary system here. Look, it even requires the biometric signature from one of our team members to initiate any withdrawal." He demonstrates by pressing his thumb into the display. "We use a third-party cloud validation API to match the thumbprint and authorize each withdrawal. The keys are also backed up daily to an off-site third-party."
"Wow that's really impressive," Alice says, "but what if we need access for a withdrawal outside of office hours?" "Well that's no issue", Bob says, "just send us an email, call, or text message and we always have someone on staff to help out. Just another part of our strong commitment to all our customers!"

"What about Proof of Reserve?", Alice asks. "Of course", Bob replies, "though rather than publish any blockchain addresses or signed transaction, for privacy we just do a SHA256 refactoring of the inverse hash modulus for each UTXO nonce and combine the smart contract coefficient consensus in our hyperledger lightning node. But it's really simple to use." He pushes a button and a large green checkmark appears on a screen. "See - the algorithm ran through and reserves are proven."
"Wow", Alice says, "you really know your stuff! And that is easy to use! What about fiat balances?" "Yeah, we have an auditor too", Bob replies, "Been using him for a long time so we have quite a strong relationship going! We have special books we give him every year and he's very efficient! Checks the fiat, crypto, and everything all at once!"

"We used to have a nice offline multi-sig setup we've been using without issue for the past 5 years, but I think we'll move all our funds over to your facility," Alice says. "Awesome", Bob replies, "Thanks so much! This is perfect timing too - my Porsche got a dent on it this morning. We have the paperwork right over here." "Great!", Alice replies.
And with that, Alice gets out her pen and Bob gets the contract. "Don't worry", he says, "you can take your crypto-assets back anytime you like - just subject to our cancellation policy. Our annual management fees are also super low and we don't adjust them often".

How many holes have to exist for your funds to get stolen?
Just one.

Why are we taking a powerful offline multi-sig setup, widely used globally in hundreds of different/lacking regulatory environments with 0 breaches to date, and circumventing it by a demonstrably weak third party layer? And paying a great expense to do so?
If you go through the list of breaches in the past 2 years to highly credible organizations, you go through the list of major corporate frauds (only the ones we know about), you go through the list of all the times platforms have lost funds, you go through the list of times and ways that people have lost their crypto from identity theft, hot wallet exploits, extortion, etc... and then you go through this custodian with a fine-tooth comb and truly believe they have value to add far beyond what you could, sticking your funds in a wallet (or set of wallets) they control exclusively is the absolute worst possible way to take advantage of that security.

The best way to add security for crypto-assets is to make a stronger multi-sig. With one custodian, what you are doing is giving them your cryptocurrency and hoping they're honest, competent, and flawlessly secure. It's no different than storing it on a really secure exchange. Maybe the insurance will cover you. Didn't work for Bitpay in 2015. Didn't work for Yapizon in 2017. Insurance has never paid a claim in the entire history of cryptocurrency. But maybe you'll get lucky. Maybe your exact scenario will buck the trend and be what they're willing to cover. After the large deductible and hopefully without a long and expensive court battle.

And you want to advertise this increase in risk, the lapse of judgement, an accident waiting to happen, as though it's some kind of benefit to customers ("Free institutional-grade storage for your digital assets.")? And then some people are writing to the OSC that custodians should be mandatory for all funds on every exchange platform? That this somehow will make Canadians as a whole more secure or better protected compared with standard air-gapped multi-sig? On what planet?

Most of the problems in Canada stemmed from one thing - a lack of transparency. If Canadians had known what a joke Quadriga was - it wouldn't have grown to lose $400m from hard-working Canadians from coast to coast to coast. And Gerald Cotten would be in jail, not wherever he is now (at best, rotting peacefully). EZ-BTC and mister Dave Smilie would have been a tiny little scam to his friends, not a multi-million dollar fraud. Einstein would have got their act together or been shut down BEFORE losing millions and millions more in people's funds generously donated to criminals. MapleChange wouldn't have even been a thing. And maybe we'd know a little more about CoinTradeNewNote - like how much was lost in there. Almost all of the major losses with cryptocurrency exchanges involve deception with unbacked funds.
So it's great to see transparency reports from BitBuy and ShakePay where someone independently verified the backing. The only thing we don't have is:
It's not complicated to validate cryptocurrency assets. They need to exist, they need to be spendable, and they need to cover the total balances. There are plenty of credible people and firms across the country that have the capacity to reasonably perform this validation. Having more frequent checks by different, independent, parties who publish transparent reports is far more valuable than an annual check by a single "more credible/official" party who does the exact same basic checks and may or may not publish anything. Here's an example set of requirements that could be mandated:
There are ways to structure audits such that neither crypto assets nor customer information are ever put at risk, and both can still be properly validated and publicly verifiable. There are also ways to structure audits such that they are completely reasonable for small platforms and don't inhibit innovation in any way. By making the process as reasonable as possible, we can completely eliminate any reason/excuse that an honest platform would have for not being audited. That is arguable far more important than any incremental improvement we might get from mandating "the best of the best" accountants. Right now we have nothing mandated and tons of Canadians using offshore exchanges with no oversight whatsoever.

Transparency does not prove crypto assets are safe. CoinTradeNewNote, Flexcoin ($600k), and Canadian Bitcoins ($100k) are examples where crypto-assets were breached from platforms in Canada. All of them were online wallets and used no multi-sig as far as any records show. This is consistent with what we see globally - air-gapped multi-sig wallets have an impeccable record, while other schemes tend to suffer breach after breach. We don't actually know how much CoinTrader lost because there was no visibility. Rather than publishing details of what happened, the co-founder of CoinTrader silently moved on to found another platform - the "most trusted way to buy and sell crypto" - a site that has no information whatsoever (that I could find) on the storage practices and a FAQ advising that “[t]rading cryptocurrency is completely safe” and that having your own wallet is “entirely up to you! You can certainly keep cryptocurrency, or fiat, or both, on the app.” Doesn't sound like much was learned here, which is really sad to see.
It's not that complicated or unreasonable to set up a proper hardware wallet. Multi-sig can be learned in a single course. Something the equivalent complexity of a driver's license test could prevent all the cold storage exploits we've seen to date - even globally. Platform operators have a key advantage in detecting and preventing fraud - they know their customers far better than any custodian ever would. The best job that custodians can do is to find high integrity individuals and train them to form even better wallet signatories. Rather than mandating that all platforms expose themselves to arbitrary third party risks, regulations should center around ensuring that all signatories are background-checked, properly trained, and using proper procedures. We also need to make sure that signatories are empowered with rights and responsibilities to reject and report fraud. They need to know that they can safely challenge and delay a transaction - even if it turns out they made a mistake. We need to have an environment where mistakes are brought to the surface and dealt with. Not one where firms and people feel the need to hide what happened. In addition to a knowledge-based test, an auditor can privately interview each signatory to make sure they're not in coercive situations, and we should make sure they can freely and anonymously report any issues without threat of retaliation.
A proper multi-sig has each signature held by a separate person and is governed by policies and mutual decisions instead of a hierarchy. It includes at least one redundant signature. For best results, 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7.

History has demonstrated over and over again the risk of hot wallets even to highly credible organizations. Nonetheless, many platforms have hot wallets for convenience. While such losses are generally compensated by platforms without issue (for example Poloniex, Bitstamp, Bitfinex, Gatecoin, Coincheck, Bithumb, Zaif, CoinBene, Binance, Bitrue, Bitpoint, Upbit, VinDAX, and now KuCoin), the public tends to focus more on cases that didn't end well. Regardless of what systems are employed, there is always some level of risk. For that reason, most members of the public would prefer to see third party insurance.
Rather than trying to convince third party profit-seekers to provide comprehensive insurance and then relying on an expensive and slow legal system to enforce against whatever legal loopholes they manage to find each and every time something goes wrong, insurance could be run through multiple exchange operators and regulators, with the shared interest of having a reputable industry, keeping costs down, and taking care of Canadians. For example, a 4 of 7 multi-sig insurance fund held between 5 independent exchange operators and 2 regulatory bodies. All Canadian exchanges could pay premiums at a set rate based on their needed coverage, with a higher price paid for hot wallet coverage (anything not an air-gapped multi-sig cold wallet). Such a model would be much cheaper to manage, offer better coverage, and be much more reliable to payout when needed. The kind of coverage you could have under this model is unheard of. You could even create something like the CDIC to protect Canadians who get their trading accounts hacked if they can sufficiently prove the loss is legitimate. In cases of fraud, gross negligence, or insolvency, the fund can be used to pay affected users directly (utilizing the last transparent balance report in the worst case), something which private insurance would never touch. While it's recommended to have official policies for coverage, a model where members vote would fully cover edge cases. (Could be similar to the Supreme Court where justices vote based on case law.)
Such a model could fully protect all Canadians across all platforms. You can have a fiat coverage governed by legal agreements, and crypto-asset coverage governed by both multi-sig and legal agreements. It could be practical, affordable, and inclusive.

Now, we are at a crossroads. We can happily give up our freedom, our innovation, and our money. We can pay hefty expenses to auditors, lawyers, and regulators year after year (and make no mistake - this cost will grow to many millions or even billions as the industry grows - and it will be borne by all Canadians on every platform because platforms are not going to eat up these costs at a loss). We can make it nearly impossible for any new platform to enter the marketplace, forcing Canadians to use the same stagnant platforms year after year. We can centralize and consolidate the entire industry into 2 or 3 big players and have everyone else fail (possibly to heavy losses of users of those platforms). And when a flawed security model doesn't work and gets breached, we can make it even more complicated with even more people in suits making big money doing the job that blockchain was supposed to do in the first place. We can build a system which is so intertwined and dependent on big government, traditional finance, and central bankers that it's future depends entirely on that of the fiat system, of fractional banking, and of government bail-outs. If we choose this path, as history has shown us over and over again, we can not go back, save for revolution. Our children and grandchildren will still be paying the consequences of what we decided today.
Or, we can find solutions that work. We can maintain an open and innovative environment while making the adjustments we need to make to fully protect Canadian investors and cryptocurrency users, giving easy and affordable access to cryptocurrency for all Canadians on the platform of their choice, and creating an environment in which entrepreneurs and problem solvers can bring those solutions forward easily. None of the above precludes innovation in any way, or adds any unreasonable cost - and these three policies would demonstrably eliminate or resolve all 109 historic cases as studied here - that's every single case researched so far going back to 2011. It includes every loss that was studied so far not just in Canada but globally as well.
Unfortunately, finding answers is the least challenging part. Far more challenging is to get platform operators and regulators to agree on anything. My last post got no response whatsoever, and while the OSC has told me they're happy for industry feedback, I believe my opinion alone is fairly meaningless. This takes the whole community working together to solve. So please let me know your thoughts. Please take the time to upvote and share this with people. Please - let's get this solved and not leave it up to other people to do.

Facts/background/sources (skip if you like):



Thoughts?
submitted by azoundria2 to QuadrigaInitiative [link] [comments]

Sobre Tibia, gold farmers y un caso de ayuda y éxito PT2. Son muy buenos consejos de cómo comenzar a programar profesionalmente

Una vez más, reconocimiento al autor original de los post International-Unit-8
Hello,

I have gotten so many replies and messages since my last post in this thread, that I can't answer them all individually. Previous topic:

https://www.reddit.com/TibiaMMO/comments/h8tu5u/a_great_tip_for_brazilians_venezuelans_and_othe

It has been shared on multiple subreddits so I have no idea where to even post this. But I'd like to come up with a follow-up thread with some more information. The internet is the most powerful tool that mankind has ever invented. You have the ability to reach thousands, millions and even billions of people with just a computer and some internet access.

If you're on this subreddit, chances are you're already playing Tibia and you already have a computer and internet access. It doesn't need to be the best internet, but as long as websites will load (eventually) you are good to go.

In this topic I will go more in-depth on web development and software engineering. If you have a very slow internet connection, you may want to look into web development instead of software development. An application/software is much heavier (larger file size) than a website. And most developer jobs require that you send and download files, back and forth, between you and your company's server. So if you feel like your internet is too slow to send a lot of files - do not worry! There are plenty of jobs.

First, I will go through some more details on how to learn web development and software development. After that, I will list a few other kinds of jobs that you can do remotely. These types of jobs can be done from anywhere in the world as long as you have internet access.



Part 1: Some languages you should learn

What is web development? Well, it can be a lot of things. You perhaps make websites for shops/restaurants/hair dressers/dentists, or you work for a big company and work on their web application, like Outlook, Discord or Spotify (which can all be accessed via a browser: their web app). You can also work with design and user experience, instead of programming. Being a web developer can mean so many different things, it's impossible to name them all. But most web developers are just developers: they program. They make websites, and they either sell the websites to companies (as a consultant) or you work full/part-time for a company.

I can not provide in-depth information about every single thing, but I can give you some pointers. The very basics any web developer should know is this:

HTML (HyperText Markup Language) - it's what almost all websites use as a foundation. This is not a programming language, but it is a markup language. If you want to build websites, you pretty much have to know this language. Don't worry though, it is easy. Not so much to learn. You can learn all about it in a few weeks.

CSS (Cascading Style Sheets) - it's what will add colors and shapes to your website. If you want to focus more on design (also known as front end development) then this is where you want to gain a lot of knowledge.

Python - A very simple language to learn. This language is very often the first programming language that developers start using. You can use it for a lot of things. This language is used in the back of a lot of websites. Google has been using Python for years and still is. It's great for web scraping and making web requests. If you want a language to practice your algorithms, then this language is awesome.

PHP - This used to be a very popular language, but not so much these days. However, it is very good to know how this works because it's very simple to learn and also very functional in some cases. If you want to transmit or withdraw information from a database to your website, then this (in combination with SQL) is a great way to do so. Whenever you make a login system or a contact form, the data must be sent somehow to a recipient or a database. PHP will help you do that. It is a server-side language, which means it will run in the back of the website.

SQL - To be able to communicate with databases (for example: save data, update data, or insert data) you can use different languages for that. But SQL is probably the most widely used language for this. It is basically just a bunch of commands that you tell your website or app to do. If you have a web shop for example, you will need a database to store all your product information in. You can for example use MySQL as your database and then use the SQL language to extract data from your database and publish it as a list of products on your website.

JavaScript - Perhaps the most powerful language at the moment. Anyone who is good at JavaScript will be able to learn most other modern programming languages. In recent years, the demand for good JavaScript developers has skyrocketed. It's because more applications are becoming web based, and JavaScript is probably among the most useful languages to use. You can use it for so many things. Previously JavaScript was only being run on the client side of the website (that means in the user's browser). But in recent years, there has been massive development of this language and you are now able to build servers, connect to databases and do very powerful web applications using just this language. A great tutorial for JavaScript was made by Tony Alicea: https://www.youtube.com/watch?v=Bv_5Zv5c-Ts This video is "just" 3.5 hours, but it's the intro. There is a much longer version of it, and you can download it for free if you search for it. Just find it as a torrent and watch it. It's probably the best tutorial I have seen for JavaScript.

C# - It's pronounced as "C Sharp". This language has been dominating the software engineering market for decades at this point. Everyone loves it. It's relatively easy to learn and you can build a lot of stuff in C#. It's very much like JavaScript, but focuses more on application development rather than website development. I would however try to avoid learning this language if you have very slow internet, since you will most likely be sending a ton of files back and forth. But if application (computer & phone) is your thing, then this language is great. There are so many tutorials on this, but there is 1 channel on YouTube which teaches a lot of the basics in C# (and many other languages) and that channel is called ProgrammingKnowledge. Sure, his C# videos may be old now but most of it is still relevant and useful. You will learn a lot by watching his videos. It's always good to start from the beginning and then when you're familiar with that, you can learn more about the recent updates in C#. https://www.youtube.com/watch?v=V2A8tcb_YyY&list=PLS1QulWo1RIZrmdggzEKbhnfvCMHtT-sA

Java - This is pretty much 90% identical to C# as I wrote above. Widely used, relatively easy to learn the basics and there's plenty of jobs. If you like making android apps, this language is for you.



Part 2: Technologies and useful tools

To become a web developer you will need a few tools. You need a text editor, a FTP client, a SSH client and some other things. Also a good browser.

Text editor: Visual Studio Code, Atom, Sublime Text, Brackets - There are many different text editors but at the moment, I highly recommend Visual Studio Code. It has so many built-in features it's honestly the only thing you may need.Don't forget to install Notepad++ as well - this very basic editor is so handy when you just quickly need to edit some files.

File archiving: WinRar, 7-Zip - You need some way of archiving projects and send it to your customer or employer. These are basic tools anyone should use. I personally use Winrar.

FTP (File Transfer Protocol): FileZilla - This tool will allow you to connect to your website's file manager and upload your files to it. There are many tools for connecting to an FTP server but this is the most popular one, it's simple and it works great.

VPS (Virtual Private Server): Amazon Web Services, Google Cloud - If you want to practice building web applications or want to host your own website as a fun project, it's great to use a VPS for that. Both Amazon and Google offers 365 days of free VPS usage. All you need is a credit card. However, they will not charge you, as long as you stay below the free tier limit. A VPS is basically a remote computer that you can connect to. I highly recommend that, if you have a slow internet connection. Those VPS-servers (by Amazon and Google) usually have 500mbit/s internet speed, which is faster than most countries in the world. You simply connect to them via Remote Desktop, or by SSH. Depending on what type of server you are using (Windows or Linux).

SSH (Secure Shell): Solar-PuTTY, PuTTY - If you for example have a web server where you store applications and files, a great way to connect to it is by using SSH. PuTTY is pretty much the standard when it comes to SSH clients. But I really love the version created by SolarWinds. When you download that one, do not enter your personal details. Their sales people will call you and haunt you! Haha.

File Searching: Agent Ransack - When you have many files and try to locate a specific document or file, you may want to use something like Agent Ransack. Much faster than the traditional search feature in Windows and it is much more accurate.

IDE / Code Editor: Visual Studio - Great tool to use when you want to create applications in C# for example. Do not confuse this with Visual Studio Code. These are two very different tools. This tool (Visual Studio) is more designed for Windows applications. Not just websites. I only recommend getting it if you plan to make programs for Windows.

Web host & domain: NameCheap, Epik, SiteGround - If you develop websites on your own, or maybe want to create a portfolio website, you will need a domain name and web hosting. I have personally used all of these 3 and they are very cheap. NameCheap has some of the cheapest domains and great web hosting for a low price. Their support is also great. Same with SiteGround. And if you want to buy a domain anonymously (with Bitcoin for example), then you can use Epik. Low prices and great customer service on all these 3 websites.

Web Server: XAMPP, Nginx - If you plan to practice PHP, you will need to have a web server on your local computer. If you have Windows, I would highly recommend installing XAMPP (Apache). It is very easy to use for beginners. If you're on Linux, I would recommend Nginx. Also check our PhpMyAdmin if you want to quickly setup a MySQL database locally.Bonus tip: If you use Visual Studio Code to create websites in HTML, CSS and JavaScript: then install the extension "live server" and you can run your applications on a live server without setting it up yourself. Tutorial: https://www.youtube.com/watch?v=WzE0yqwbdgU

Web Browser: Mozilla Firefox, Microsoft Edge Insider, Google Chrome - You need one of the latest web browsers to create websites these days. Since I prefer privacy over functionality, I've always loved Firefox. But recently, Microsoft has been improving its new version of Edge a lot (based on Chromium) and it's also very popular. If you want all your personal details to be saved and have good tools for web development, then use Google Chrome. Don't forget to utilize the built-in developer tools. You can access it in any of these browsers by pressing F12.



Other things you may want to look into:

Web services, SSL certificates, Search Engine Optimization, Databases, API, Algorithms, Data Structures



Part 3: Learning platforms

https://www.youtube.com/

https://www.w3schools.com/

https://leetcode.com/

https://stackoverflow.com/



If you want to learn in-depth about algorithms, data structures and more. Then you can take a look at the curriculum of the top-tier universities of USA. Such as: UC Berkeley, Harvard and MIT. These courses are very hard and are specifically for people who want to become experts in software engineering. You can enroll some of them for free, like the one on Harvard. And by having a such diploma (which costs $90 extra) can get you a lot of job opportunities. You can enroll those courses if you want, but it can have a fee. But just take a look at what they are studying and try do their exercises, that is 100% free. Get the knowledge. It's mostly on video too! These course below are the very same courses that many of the engineers at Facebook, Google, Amazon, Apple, Netflix, Uber, AirBnb, Twitter, LinkedIn, Microsoft, etc. has taken. It's what majority of people in Silicon Valley studied. And it's among the best classes that you can take. These course are held by some of the world's best professors in IT.



UC Berkeley: CS 61a & CS 61b:

https://inst.eecs.berkeley.edu/~cs61a/fa19/

Video playlist here: https://www.youtube.com/watch?v=0_LryzvBxFw&list=PL6BsET-8jgYVAaK0jGVTWr9R5g7kSMQ8i

https://inst.eecs.berkeley.edu/~cs61b/fa19/

Videos: https://www.youtube.com/channel/UCNBSbBTFx8nFahcQyZOYOgQ



Harvard University: CS50 (free enrollment --- 90$ to get a certificate).

https://online-learning.harvard.edu/course/cs50-introduction-computer-science



MIT (Massachusetts Institute of Technology): 6.006

https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-006-introduction-to-algorithms-fall-2011/

Held by Erik Demaine. One of the best - if not THE best - professor at MIT. Just look at this resume. It's almost 50 pages long! https://erikdemaine.org/cv.pdf



Part 4: Finding jobs

https://www.linkedin.com/

https://marketing.hackerrank.com/

https://www.glassdoor.com/index.htm

Facebook groups for web developers, freelancing, remote work, etc.

Portfolio / Code Sharing / Source Control:

https://github.com/



Part 5: Other types of jobs you can work with (remotely) - with/without coding experience

SEO (Search Engine Optimization)

Translations (Spanish/Portuguese, etc.)

Affiliate Marketing (look into Clickbank.com - and use Facebook Ads to promote products)

Design (web design, photo design, etc.)

Copywriting (write sales letters for companies)

Database manager (monitor and administrate a company's database)

YouTube - make YouTube videos to gain views. Views = Money.

Dropshipping (use Shopify.com for example) and sell products in a webshop. Benefit with dropshipping is that you don't personally store the products.

Customer support

more...? Banking, economics, etc.



You can find information about all of the things I have mentioned by using YouTube or Google search.

Hope it helps.



And I hope that in 1 year, there will be at least some new web developers in Brazil, Venezuela and other countries in South America.
submitted by jesuskater to memezuela [link] [comments]

Stablecoins Are Not as Safe as You Think. How Your USDT, PAX, BUSD Get Frozen in a Moment

Stablecoins Are Not as Safe as You Think. How Your USDT, PAX, BUSD Get Frozen in a Moment
Being created on the basis of blockchain, stablecoins were considered to be a safe haven for investors… until recently. Why is their immunity elusive and how does the Financial Action Task Force (FATF) plan to control them?
Established in 1989 by the G7, the FATF inter-governmental organization develops policies to resist money laundering and financing of terrorism. It sets standards and implements legal and regulatory measures to combat illegal financial transactions.
They developed recommendations for the monitoring of money laundering and keep revising them regularly. In case of non-compliance, law enforcement is executed via regional financial organizations. As of 2019, there are 39 full members of FATF, including the USA, UK, Australia, most EU countries, Singapore, India and the Russian Federation.
Since 1st July, the FATF organization has been headed by Marcus Pleyer. During the last FATF meeting, the new president expressed his concerns about global stablecoins and organizations that issue them. Although the organization had already dealt with these cryptocurrencies, it highlighted that, “it is essential to continue closely monitoring the ML/TF risks of so-called stablecoins, including anonymous peer-to-peer transactions via unhosted wallets”.
Is it ever possible to control crypto wallets that are not hosted on online exchanges? – you’d ask. We’re used to the fact that cryptocurrencies are outside the reach of banks and governments. However, when it comes to stablecoins, things are different.

It’s in the code

What makes stablecoins special is that they are pegging to fiat currency, for example, 1 TUSD = $1 USD. This means that such assets should be backed up by real money stored in the bank accounts of the issuing organization. Consequently, stablecoin creators need to comply with the requirements of the SEC, FATF and other controlling agencies, if they are to operate in the cryptocurrency sphere and be authorised to sell stablecoins. Transparent reports are not the only requirement, stablecoins must also provide the possibility of account blocking.
Surprisingly, this feature is implemented in each stablecoin. The experts from QDAO DeFi are covering several stablecoin protocols that enable this function.

OMNI-based USDT

Issued by Tether Limited, USDT is a stablecoin that was originally created to be worth $1 with each token backed by a $1 real fiat reserve. The currency was successfully promoted and added to major cryptocurrency exchanges but stayed a controversial asset. Despite the claims of Tether Limited, they failed to provide any contractual right or other legal claims to guarantee that USDT can be swapped for dollars or be redeemed.
In April 2019, Tether’s lawyers explained that each USDT was backed by only $0.74 in cash or equivalent assets. No audit of dollar collateral was done. A month before that, it changed the backing to include loans to affiliate companies. The scandal also involved the Bitfinex exchange that was accused of using USDT funds to cover $850 million in funds lost since 2018. They were also accused of manipulating USDT to push the BTC price.
Tether is available on five blockchains: Omni, Ehereum, EOS, Tron and Liquid. Only the latter does not have a freezing feature. Omni was the first protocol for USDT. Blocking of users’ accounts is possible, thanks to the following piece of code:

https://preview.redd.it/uqho45l33om51.png?width=690&format=png&auto=webp&s=c0feebdae086b0deeccde05278eaf3cc760f9e2b
Apparently, it’s used to blacklist addresses and contracts.

PAX

The concerns about PAX were centered around the notorious MMM BSC Ponzi scheme. Before the widespread adoption of DeFi services, it was the second-largest gas consumer after Ethereum. Out of 25,000 daily transactions, 5,000 were performed by MMM BSC. It was reported to be a scam but none of the accounts were frozen. Does it mean PAX lacked the resources to regulate illicit activities?
Evidently, not. The protocol code has a LAW ENFORCEMENT FUNCTIONALITY function that allows for the freezing/unfreezing of contracts or burning assets on blacklisted accounts. It turns out, anyone risks having their PAX coins destroyed during an investigation process while their accounts stay blocked.

History of frozen accounts

In 2019, the ZCash Foundation and Eric Wall conducted research on the privacy of stablecoins and revealed several frozen addresses. It’s not clear why exactly they were blocked. Most probably, it happened shortly after the exchange withdrawal – users took this action after witnessing platforms being hacked.

https://preview.redd.it/pkbruqm83om51.png?width=838&format=png&auto=webp&s=b068c5b8c5e5439892eaf5feefa3fbc93c694c8c
USDT was implicated at least twice in scandals to do with freezing. In April 2019, about $850 million in Tether dollars sent by Crypto Capital Corp. were frozen by a New York court. Tether and Btfinex were accused of participating in a cover-up to hide about $850 million worth in clients’ funds. By July 2020, Tether had frozen 40 Ethereum addresses with millions of USDT (some of them are shown in the screenshot above).
The Centre Consortium was the next to follow their lead; about a month ago, it blacklisted an address with USDC worth $100,000. That was done in response to law enforcement.
Yet, it’s not only Europe and the USA imposing control over cryptocurrencies. Since June 2020, the Chinese government managed to block several thousands of users’ bank accounts. It was done to resist illicit activities, especially money laundering. On some of those accounts, no activity had been detected for several months. Meanwhile, prior to April 2020, Chinese residents moved over $50 billion worth of crypto outside the country borders – more than is officially allowed (a maximum of $50,000 per person).
The authorities claim that USDT and other stablecoins are often used in illegal activities. Together with the People’s Bank of China (PBOC), they are developing new ways of investigating digital crimes and money laundering operations involving exchanges and crypto wallets. Local financial bureaus and police are working tight-lipped about investigating startups and crypto exchanges. And they are succeeding at it.
In July 2020, Chinese authorities confiscated BTC, ETH and USDT worth $15 million from people who allegedly ran a fake cryptocurrency scheme.
By the way, not only corporate accounts are being closed. One investor claims his account had been frozen after using yuan to purchase crypto. Also, users who transfer illegally obtained money outside of the mainland in large amounts are under suspicion. Does it mean the Chinese government has started tightening the screws on cryptocurrency users?

DAI, USDT on Liquid and USDQ are the main options for stablecoin deposits

So, where can you store your crypto assets? USDT on Liquid and DAI are not the only solutions available. Consider making a deposit in USDQ, the stablecoin of the QDAO ecosystem. Like other stablecoins, it’s 1-to-1 pegged to USD. However, it cannot be frozen by a government, financial organization or anyone from the QDAO team. You can check it yourself by reading our Smart contract and USDQ Audit.
In QDAO, users’ accounts are never frozen by a single person – all account issues are solved by the entire QDAO community, with the help of a QDAO governance token.
In case of blocking (the chances of which are almost non-existent), you can address the QDAO community and get timely help.

Bottom Line

With FATF taking this new course of action, we might witness serious pressure on stablecoin providers. Some projects will resist it, but it’s still not safe to store your assets in popular stablecoins, especially USDT. Your account can be frozen by authorities for dozens of reasons without the possibility of retrieval.
Yet, there are a number of reliable alternatives and USDQ stablecoin is one of them. QDAO DeFi platform users feel free to manage their crypto reserves and make profitable deposits.
Want to be the first to hear QDAO DeFi news and updates? Visit our website and stay in touch with us on social media: Twitter, Facebook, Telegram and LINE (for the Japanese-speaking community).
submitted by QDAODeFi to u/QDAODeFi [link] [comments]

I ruin people's lives for fun, this is my story.

Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper.
High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party.
Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well.
That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home.
That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life.
My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home.
I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me.
I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation.
I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took.
Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired.
I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying:
Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake.
P.S: If you bring the police … the game ends differently. Not in your favor.
I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either.
I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it.
Chapter 2

submitted by idonthavemuchtime12 to mrcreeps [link] [comments]

I ruin people's lives for fun, this is my story.

Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper.
High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what are you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party.
Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well.
That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home.
That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life.
My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home.
I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me.
I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation.
I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took.
Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired.
I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying:
Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake.
P.S: If you bring the police … the game ends differently. Not in your favor.
I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either.
I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it.
Chapter 2
submitted by idonthavemuchtime12 to creepypasta [link] [comments]

NeuronChain is a fourth-generation decentralized blockchain system and an independent financial network.

NeuronChain is a fourth-generation decentralized blockchain system and an independent financial network.
NeuronChain is a fourth-generation decentralized blockchain system and an independent financial network. NeuronChain is a lightning-fast financial ecosystem with a vision to build a tomorrow’s financial system by creating a borderless world by cutting out intermediaries and providing access to billions of people underserved by the current financial system:
1️⃣ #NeuronEx is a P2P Exchange that connects crypto and fiat worlds. It allows to buy, sell or exchange Bitcoin, Ethereum and other cryptocurrencies easily and safely with more than 200 Payment Methods. Moreover, you can increase your trading income by becoming an Agent of NeuronChain.
2️⃣ The Neuron Wallet is a decentralized multi-currency wallet , which enables a customer to deposit, exchange and transact with various cryptocurrencies and with fiat funds through embedded fiat cards (in nearest future). The first version of the decentralized app will have the following parameters:
- BIP 44, BIP 47;
- crypto portfolio statistic;
- SegWit support;
- conversion between cryptocurrencies;
- embedded exchange;
- guaranteed security and anonymity;
- simplified process of depositing and withdrawing currencies;
- Crypto API for integration with third-party services.
Coming soon update version will have:
- conversion from/into fiat money;
- transparent cross-border remittance;
- debit/credit card support.
3️⃣ Agent Network. NeuronChain has a wide and constantly developing partner network. Agents are everyday people or businesses providing fiat liquidity to the network, in exchange for a commission. The option to connect Agents and clients through the NeuronChain network, requires no cash deposit or pickup points that need to be arranged within the platform. Agent Network allows users to exchange any amount of crypto or fiat money immediately by connecting them to one of the NeuronEX Agents.
#CryptoNeuroNews #NeuronChain #NeuronInteresting #Finance#crypto #bitcoin #cryptocurrency #blockchain
https://preview.redd.it/yo20ut8d1t951.jpg?width=1200&format=pjpg&auto=webp&s=cad93bd28a0b683b27745cb6d129b19748c90c53
submitted by neuronchain to u/neuronchain [link] [comments]

Using the Internet to Donate to Andrew Yang - Cryptocurrency, BAT, and the Brave Browser

Hi y'all,
Yesterday, I stumbled across a post on this sub that piqued my interest in alternative methods of donation. While most candidates have mentioned very little (or nothing) about cryptocurrency, Andrew Yang has a future-oriented policy outline posted on his campaign website (https://www.yang2020.com/policies/digital-asset-regulation/). As the most technologically capable candidate, it's time that we add cryptocurrency into the mix of contributions to Yang's campaign. Although crypto's relative anonymity poses a few challenges with campaign finance regulations, there is a way that we can put crypto to work legally and effectively to support Andrew.
This post will focus on the usage of the Brave browser and the associated utility token, BAT (Basic Attention Token.) Brave is a web browser developed by a team lead by the creator of JavaScript and co-founder of Firefox. The project is focused on issues such as data ownership, privacy, and security. In general, it meshes well with Yang's policies. One of the unique features of Brave is the ability to earn BAT by enabling ads. Brave blocks ads by default, but users can opt-in to receive pop-ups for relevant ads based on locally-stored browsing data. These are shown as a small notification at the edge of the screen, typically at a rate of no more than 5 per hour. For each ad shown, the user will be paid in BAT. Earned BAT are deposited into your wallet once per month, normally around the end of the first week.
After payment, there are multiple options:
Here's how to earn BAT using Brave to support Andrew:
  1. Download Brave browser. Note: There is a referral program for browser downloads. By using a referral link, the referrer will earn $7.50 after ~30 days of use by the downloader. I know that many of us here will happily pass this along to to Yang campaign! ☺️ Work together to utilize this benefit. In order to generate a referral link, you must sign up to be a Brave creator at https://creators.brave.com/. As Reddit users, all of you are capable of signing up to be a creator!
  2. Opt-in to Brave ads following the instructions at https://support.brave.com/hc/en-us/articles/360026648512-How-do-I-opt-in-to-Brave-Ads-
  3. Set up your account at Uphold. You must verify your identity using a driver's license, passport, etc. There are regulations in the US related to knowing your client that Uphold must follow. Initiate this process by clicking the Brave Rewards button > "Verify Wallet" to the right of the address bar. (It's an orange/pink/purple triangle.) This should bring you to uphold.com where they will guide you through creating an account.
  4. After your account is verified on Uphold, ensure that your Brave wallet is synced with Uphold. The "Verify Wallet" text should update to say "Wallet Verified". Your earned BAT will now sync to Uphold.
  5. Once you have BAT in your Uphold wallet, there are a couple of options to get this money to Andrew:
    1. Withdraw to your bank account. You will then use the standard method for donating to Andrew Yang at yang2020.com/donate. Note that there will be a bit of a delay between withdrawal and funds arriving in your account. Uphold also has a 1.95% withdrawal fee.
    2. Convert to Bitcoin on Uphold and donate using CryptoFWD.org. This option allows you to use crypto for the entire process. This is the most "futuristic" option, but be aware that you are donating to a super PAC instead of the campaign directly. CryptoFWD is associated with u/HumanityFWD (HumanityFWD.org). They have posted some background on their organization at https://www.reddit.com/YangForPresidentHQ/comments/cl7cqj/the_humanity_forward_fund_the_yanggang/?utm_source=share&utm_medium=web2x. This is a great option for anyone who has reached the legal donation maximum.
  6. Keep using the internet as normal! Earn BAT and continue to donate your rewards.
Please let me know if you have any questions! I know this reads like an ad for multiple items, but I'm really hoping that we can use this technology to continue Andrew's momentum.
___
TL;DR
  1. Download Brave browser (using a Yang supporter's referral code if possible.)
  2. Earn BAT (cryptocurrency) by viewing ads - check out this link for an example ad. You won't be stuck with unskippable 10 second videos or anything, it's basically a push notification.
  3. Convert BAT to USD and donate to Andrew OR convert BAT to BTC and donate to CryptoFWD.
submitted by --_-_____-_--__-__-- to YangForPresidentHQ [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

How To Withdraw Money in Jazzcash Easypaisa From Bitcoin Perfect Money www.arifshop.com Bitcoin ATMs - How To Use Them - YouTube Problem with withdrawing bitcoins from bitskins to a bitcoin wallet! (Help needed!) How to remain anonymous while using bitcoin - YouTube How to buy Bitcoin Anonymously (2019-2020). Easy ways to ...

The Bitcoin Casino is extremely easy to use and navigate. The purple and yellow color scheme give the site a unique feel. The yellow text pops out prominently, so you are not straining to read what is on the screen. Bitcoin Casino’s menu system is very clear, with only a handful of options being there to choose from. Transfer and withdraw bitcoin from blockchain easily without paying any charges of conversion, highest rates are offered & an instant transaction is provided. Buy sell online marketplace with current live price exchange bitcoin to cash converter btc to usd quick payout and fund transfer how to turn crypto to dollar. Bitcoin to Paypal instant Exchange. Anonymous and private instant exchange ... Bitcoin ATM kiosks are machines which are connected to the Internet, allowing the insertion of cash or a credit card in exchange for Bitcoin. They look like traditional ATMs, but they do not connect to a bank account and instead connect the customer directly to a Bitcoin exchange for a localized and convenient way to purchase Bitcoin in person. Common locations for Bitcoin ATMs are inside of a ... In the following text, not only will we give you the top 10 best Bitcoin casino options, but we'll also go over the most important things you need to know about the safety and security of this payment method, its upsides and downsides, the mobile payments and deposits, and everything else you could possibly need as if you are a complete beginner in the online casino world. We also focus on the ... Keep in mind, you cannot withdraw or send bitcoin from apps like Robinhood, Revolut etc. They don't actually sell bitcoin, they sell a number pegged to the bitcoin price. Remember: not your keys, not your bitcoin! If you cannot even send bitcoin to an address that you are in control of (like you can from an exchange to your own wallet) - you don't actually possess/control any bitcoin. Also ...

[index] [14478] [12017] [3084] [21266] [49689] [20617] [46786] [36614] [14391] [17579]

How To Withdraw Money in Jazzcash Easypaisa From Bitcoin Perfect Money www.arifshop.com

Small tutorial on online exchanges that do not require from thier customers any ID nor set limits to your transaction. There are quite a few, Google knows. T... How to buy Bitcoin Anonymously (2019-2020). Easy ways to buy Bitcoin without ID. ***ARE YOU CURIOUS ABOUT HOW I MADE $1,006 From $100, THEN $257,000 From $1,... Bitcoin debit card from http://BitPlastic.com enables you to withdraw bitcoin anonymously from ATM machines all over the world. Anonymize bitcoin and shop on... Buy & Withdraw your bitcoin with cash With PCS Mastercard & Other... Anonymous, quick BITCOIN CENTRAL SINCE 2011 Http://bitcoin-central.com/ MY ALL-ENCOMPASSING GUIDE TO GETTING STARTED WITH BITCOIN: https://www.btcsessions.ca/post/how-to-buy-sell-and-use-bitcoin-in-canada Today I check out anothe...

#