Find Any Crypto ATM Near You | Crypto ATM Locator

Dropped my first BCH tip in a tip jar today

I dropped my first BCH tip generated from gifts.bitcoin.com in a tip jar at my local Dunkin’ Donuts today. Coincidentally that location (in a gas station) has a crypto ATM so I thought it was a fitting place to drop tip #1. I really hope someone redeems it.
Crossing my fingers!!
submitted by HeavenHellorHoboken to btc [link] [comments]

I ruin people’s lives for fun, this is my story. [Chapter 3]

Chapter 1
Chapter 2
Good morning. It is currently 9 in the morning, and I am just finishing up my coffee at a local shop. I always get the same thing: A large iced coffee with 4 ice cubes and 2 packets of sugar. That concoction makes it the perfect temperature to enjoy.
I tend to do everything by routine, because I like to think it makes me more organized if I do it that way. Life is just a whole bunch of patterns someone has yet to figure out.
I was looking more into Jason’s assets and accounts. I came across something that made me laugh. He has been paying Kiley $1,000 every week. So from my observations, Kiley looks like an escort.
I think that this is helpful, because now I know that she doesn’t have a trustful relationship with him. I mean the money was being paid to the website to hire escorts. I really don’t care about Kiley though. She isn’t important to the game anymore.
I have to go to work in about an hour so I need to finish this up pretty quickly. I wanted to make the process of fucking with Jason long. I went on the dark web for a minute to see if I could come across a device that could withdraw money via ATM from previous accounts that had been connected to said ATM.
If that made any sense, my plan would be to buy this tool, and steal money from Jason’s account. I know I used bitcoin for the last one, but I thought this would be more eventful. I wanted more hands-on experience if you know what I mean.
I forgot to mention that I saw that Jason had a permit for concealed carry, so I need to keep this in mind.
After searching on a couple of the markets that I have accounts with, I finally came across it. It was around $200. I just went ahead, and used the funds that were already on my account to purchase it. It says that it ships domestically, so it should be here in the next few days. I will continue with this update after I get done with my shift.
I have just finished my shift, and I'm exhausted from how pestering my boss is. That prick just loves his sales quotas.
I got a confirmation letter from the vendor to my private email saying:
Your purchase was confirmed and the shipping process will now begin … thanks for doing business.
Fantastic! Now we can get to the fun part. I wanted to look more into his odd transaction with a car wash in Florida. I looked up the car wash, and it was only 2 miles away from Jason’s vacation home. I went ahead and called.
Some women picked up, “JJ’s car wash … how may I help you?"
I replied with, “Good, good. I was just wondering if I could get in contact with the owner? I wanted to come over, and do an evaluation on the value of the land … Is he there right now, or could you possibly give me a phone number to reach him?”
She hesitated, and said, “Uhhh, I'm sorry, sir, I'm not really sure if I can give that info out. Let me ask my manager.”
I interrupted her with, “No, that won’t be necessary. Just give me his email, and I’ll send him the information myself. Thanks.”
She said, “Sure … it's [email protected][redacted].com”
I hung up saying, “Thanks so much for your help. It means a lot. Thanks.”
Some people are just so oblivious to the world that they’ll believe anything they hear. Well, I guess I shouldn’t be complaining because that email is the same as Jason's. He owns some little car wash near his house in Florida. I wanted to look more into this, but thought that for right now it's a waste of time. (Added "that". Apostrophe on "it's", because it's= it is.)
Well, I went ahead and drove over to the nightclub Jason goes to every Wednesday night to see what he was up to there. I disguised myself as much as I could. I mean there were a lot of people here so no one would notice me unless I was face to face with them. I had a hat on and a hoodie. I just looked down at the floor as much as I could. I followed Jason in after he arrived with his driver. He went upstairs where VIPS are only allowed. I kept an eye on him for a while. He then disappeared to a back room which had me curious. I needed to figure a way to get upstairs without anyone questioning my authenticity. I went to the back room where I guess the staff gets ready. I found this work shirt that was black and an extra pair of pants that were a size too big. I had a belt on me so that wasn’t an issue and I put on the clothes and now I looked like a waiter. I went to the bar and said I needed 6 “on the rock” martinis and handed her a tray to put them on. She asked, “You work here?” I said, “Yeah, new … these are going upstairs so make it quick.” She nodded and proceeded to make the drinks. She handed me the tray and I carefully made my way up to one of the security guards at the stairs. I looked at him and said, “These are to go up to Mr. Peterson?. He looked at me up and down and waved his hand towards the stairs allowing me to go. I walked up the stairs with the tray in my hands and walked through the back door that Jason had recently disappeared to. I saw a few ladies that were all intoxicated and a couple of men sitting on the couch. There was a nice electric fireplace next to a computer desk that wrapped around the corner of the room. It was a decently big room with a minibar as well. I walked over towards the men. I said, “Excuse me gentlemen but, I have 6 martinis ready to drink in my hand.” I could tell that they all have been drinking because of the way they were slurring their words. Jason spoke up and said, “Perfect thank you … here’s a tip” handing me a $100 bill I took the money and pocketed it saying, “Thank you .. if you need anything else please call down to the bar.” I walked out. That room was soundproof as well because when I walked out my ears were rushed with loud music from the dance floor. I saw another door to my right and my curiosity peaked and I walked through. It was this long hallway and a little red sign saying “Exit”. Nothing special here so I just walked out back downstairs. I went ahead a walked over to the security guard and asked him something, “Which one of those guys is the owner?” He replied with, “You should know this … Mr. Peterson just took over ownership a few weeks ago.” This caught me off guard and I said, “Oh right … thanks.” I was mind blown because of how many properties this guy owned. Where was he getting all of this money … I mean I know that he owns a security company but, 2 houses, 3 companies that all pay in cash, a personal driver, large bank transactions. All of this wasn’t adding up. I went online and did some research.
I have the suspicion that Jason is laundering money through his businesses. I don’t know who he is cleaning money for but, it’s probably someone who doesn’t want their money fucked with. This could be an issue because if I fuck with Jason’s life and his financial situation that someone else could be looking after him. I don’t fear anyone will find me because I make sure I do everything very securely. I should be getting the atm snipping tool soon and hope to make a move on Jason and uncover his dirt. I’m getting excited just writing this right now knowing that I could possibly ruin not just Jason's life but his whole operation. Before I do begin my adventure I need to make a couple of precautionary steps. I logged onto the dark web and found a trustful hacking service. I would never hire someone to hack unless I didn’t have the skills to do the task. I mean if somehow I turned up dead my plan would still carry out. So I found someone who could “ruin” his life. I’ve been chatting with him now to see what type of services he offers and I found one that fits my purpose. I also told him I wouldn’t buy unless I failed my game, which means death. He understood and told me how it would work. He said I would need to put the money in escrow and I told him if I don’t respond within 2 weeks that the money will be sent automatically. By putting the money in escrow it means I can’t take it out and he can’t accept the payment unless all conditions are met with a third party. I set up a zombie computer to be the third party. Usually the vendor or market your on will have an escrow system but, I wanted to make sure that he would certainly get the money if anything happens to me. So I set the zombie and sent the escrow away. The payment was $600 to do whatever was necessary to either ruin them financially or put them in jail. This hacker could make them be known as a child porn user by encrypting his computer with files that would have him arrested. I was thinking of this option or go to a darker market which would put a price on Jason’s head.
Now that this was all set up I could move on and take Jason’s money. I watched him after work for a few nights to see if he would use an atm. He was at a little food market having lunch and used the atm to withdraw $40. I know this because my little tool tells me. So I watched him from across the street to see when he left. He left after eating and walked back to his car where his driver was waiting. They drove off and I waited about 5 minutes before doing anything. Atm machines have cameras so I needed to cover my face before hacking his account. I checked which account he withdrew from before going inside since I had access to his computer passwords. The account he used had approximately $12,000 in it. I knew going into this that I would only withdraw a couple thousand because I didn’t want the bank instantly freezing his account even though after he noticed, he would call and tell them. So I set up a script that would take $10,000 through tiny transactions with bots and have them located from all over the world so it wouldn’t be able to trace back to me. It would then compile the transactions back to an offshore account that I made. I would set this into action as soon as I withdrew the $2,000 in cash from the atm. This would leave Jason with $0 in his one account. I knew that he had other accounts but, the one that I was targeting had the highest balance.
I put on a bandana and some dark sunglasses with a hoodie on and walked inside. I got myself a little drink and paid in cash making sure to keep my fingers off the handle. I then went over to the atm and placed the tool where you put the card in. It loaded up this menu on the screen and it listed a couple of names from the recent customers that withdrew money. I clicked the arrow down to “Jason Peterson” and typed in the box that said “Custom amount” $2,000. It then went to another screen saying “Please remove your card before money dispenses.” I removed the tool and out came Jasons 2 grand. I put it in my wallet and walked out to my car. I made sure to park in a parking lot that was decently empty with no cameras to catch my plate. I pulled out my phone and went to the Facebook marketplace. I was feeling a new laptop right about now so I started scrolling through. I found one that matched my needs and messaged the seller, “Hey, I am interested in your listing … could we meet today?” He replied back pretty quickly with, “Sure, let’s meet at the [redacted] Starbucks!” The laptop was listed for $250. I told him I would pay in cash and I would be there in 20 minutes. I went to the Starbucks and met with the guy selling it. He was a nice guy who told me he just upgraded so that’s why he was selling it. I asked him to turn it on to make sure it works, which it did. I handed him the cash and wished him well. I walked outside and got into my car. I pulled around to the drive-through and got myself a large coffee with extra cream and sugar. After I got my coffee I went home and got a call from my boss asking where I was today. I told him that I really didn’t feel like working today which he replied telling me to not come back tomorrow and I was finished working there. I had a pretty big smile on my face at this point because now my time would be devoted to ruining Jason’s life.
I poured myself a nice glass of whiskey to end off the night right. I mean this would be the perfect time to celebrate. I just got fired and have over 10 grand in my pocket. I don’t want to get ahead of myself yet. It has been a couple of days since I sent that money in escrow and if I don’t get my job done before the 2 weeks are over then someone else will do it for me. This was like a tiny challenge in the midst of the much bigger challenge. Look at this way. I want to take credit for ruining Jason’s life or all of my work will go to waste. I mean the dark web hacker isn’t watching Jason’s every move and reading him like I was. All he had to do was sit on his ass and type on a computer. In this day and age that’s all you need. Hell, that’s how I ruined Connor’s life. I told you from the beginning that I wanted to up my game. I had the proper funds now to really up my game. In the morning, I went to go to a local Walmart to pick up a few things. I wanted to make a homemade suppressor. I was looking at the prices on the dark web but, if I could save some money doing it, then why not right? So I looked up how to make a homemade suppressor and picked up the right supplies to make it. You need some PVC pipes, steel wool, a drill, and a few other things and you got yourself a suppressor. It didn’t take to long to make and it fits real snug on my .50 caliber sniper rifle. No, I wasn’t going to kill Jason because that would be too easy. I wanted to fuck with him a little longer before really getting down and dirty. Pull his strings like a puppet if you will. My plan was this. I would find a time where Jason was alone and I would call him. I would tell him if he wanted his money back that we would have to meet. I would specify that he and only him would come and if anyone else was to show that his funds would be long gone before he ever got there. I would then drug him with chloroform and take him to a secluded place where no one would find us. I would then tell him to give up all of the information on the people he works for or he and Kiley dies. I thought to introduce that I know Kiley that it would motivate him a little more. Just the strings in his life. If that didn’t work my plan would be to tell him that the police were raiding his house for child pornography which I downloaded on his computer. I would show him his files from my laptop remotely to prove it and if that didn’t work we would figure something else out.
I wanted to move forward with this as soon as possible. I grabbed my car keys and headed out the door. Today I wasn’t going to do anything with Jason. Today I needed to shop. While I was at Walmart this morning I grabbed some bleach and rubbing alcohol to produce the chemical chloroform which would make Jason unconscious. I also picked up some latex gloves for prints. I bought myself a burner phone at a gas station near my apartment too. Now that I have all of my supplies I headed over to a Starbucks. I ordered my usual large coffee with 4 ice cubes and 2 packets of sugar. I brought my new laptop with me and connected it to the free wifi. This laptop wouldn’t be coming home with me. I was going to use this laptop to connect me to Jason’s stock portfolio. After I hacked into it I would sell all of his stocks that were a part of any company he owned leaving him with nothing in return. Basically sweeping the owner's name tag out from under his feet. I would then corrupt the hard drive and throw the laptop in the dumpster. After this, it was time to burn everything he owned to the ground. I wanted to leave him and the people he worked for with nothing in return … absolutely nothing.
submitted by idonthavemuchtime12 to mrcreeps [link] [comments]

Left my first BCH tip today

I gave out my first BCH tip generated from gifts.bitcoin.com in a tip jar at my local Dunkin’ Donuts today. Coincidentally that location (in a gas station) has a crypto ATM so I thought it was a fitting place to drop tip #1. I really hope someone redeems it.
Crossing my fingers!!
submitted by HeavenHellorHoboken to Bitcoincash [link] [comments]

Bitcoin Cash Helpline Phone [email protected]+1【888417≣32O9】⚡️Bitcoin ATM machine Cash Helpline Phone Number Bitcoin Cash Helpline Number Bitcoin Cash Wallet Helpline Phone Number

Bitcoin national ATM Machine Wallet Cash billing mail has been launched for fulfilling requirement of checking the mails through any device. It has made easy for the users to access the account from even a simple computer. With this mail account you can simply “Sign-In” in your account by putting the email address and the password. Once you “Sign In” you can check the activity of your mail account. You can compose, read the incoming mail and also download the large file attachments.















Majority of people has been registered with Bitcoin premium email account because it is completely different from other mail accounts with number of favorable qualities available in it. It is currently considered as one of the leading webmail application that has got the remarkable reputation among the users and it’s effectual Bitcoin email customer support is always available for those users who generally face issues while handling accounts. To update them the customer carenical team attends sessions which over different parts require for the effective support.


Bitcoin Support Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin Support Phone Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin SuPpOrT pHoNe nUmBeR uSa +1𝟴𝟱𝟱-4O9-364O



Bitcoin Support Phone Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin tech support number +1𝟴𝟱𝟱-4O9-364O



Bitcoin Tech Support Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin Support Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin Support Phone Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin tEcH SuPpOrT nUmBeR uSa +1𝟴𝟱𝟱-4O9-364O



Bitcoin Tech Support Number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin tech support phone number USA +1𝟴𝟱𝟱-4O9-364O



Bitcoin Tech Support Phone Number USA +1𝟴𝟱𝟱-4O9-364O



A time came and America on-line grew enough to the peaks of success and become a market leader surpassing all the competitors behind. Therein section, the dial-up association was increasing and therefore the net craze was simply in its initial section. But soon, it came tumbling down. Once the unhealthy section went, in its effort to survive and keep intact, America on-line re-branded itself and become Bitcoin by introducing services like AIM, Bitcoin LOCAL, Bitcoin Video, News and plenty of additional.



Time went, Bitcoin faced the heights however tasted the failure too. Simply in recent years once Verizon purchased Bitcoin, the protection is predicted for the soundness of the corporate. The journey of Bitcoin is incredibly spectacular.



ABOUT Bitcoin EMAIL



Apart from different services, what grew quickly was the e-mail service. Bitcoin email is freely obtainable in additional than 3 dozen languages with entrancing options. This good email is assessed from any browser at any time of the day from any corner of the planet. Simply a couple of years after once Verizon acquired Bitcoin; Bitcoin then undertook Bitcoin under its roof and created ‘Oath’. With most to explore with this outstanding email, ignoring the glitches concerned in it’ll be an injustice. There are infinite users who face some or different troubles whereas victimization a reliable email service. And therefore the credit goes to the Bitcoin Customer Care Phone Number who work around the clock to resolve all types of problems encountered by the users. Commanding troubles for a jiffy have a glance at the wonderful characteristics of Bitcoin Email.



Peculiarities of Bitcoin Email



Ease of looking and victimization Filters: With this exceptional feature, users of Bitcoin Email have the good thing about looking at emails, contacts, and events. They will even create filters for messages and emails.



Allowance for managing your calendars: The users of this email will subscribe, print, produce or maybe add a calendar. They will manage the programs from the calendar and simply edit them too.



The convenience of making folders: through this good email, users will produce a brand new folder, rename it additionally delete it as per their preference.



Saving emails & moving messages: by clicking at the lot of icons, users will merely save their emails and move single or multiple messages to the created folders.



The comfort of deleting multiple emails: not solely the users have the comfort of deleting single or multiple emails at a time however conjointly they will recover any accidentally deleted email at intervals seven days of deletion.



Panel resizing option: users will effortlessly size the panels in Bitcoin email to their feeling. Simply move your pointer to try and do the resizing.



Disable the reading pane: if you don’t need the reading pane on your screen, you’ll disable it by planning to settings then clicking customization.



Personal customization of Bitcoin Email: this is often the most effective feature of all, through this users will customize the approach they need their messages to be displayed in their inbox. Space, previewing, dynamical of font also can be done.



Composing emoji’s: Bitcoin Tech Support a large varies of emojis (pictorial characters) that the users will use in their email messages.



Mouse & Keyboard shortcuts: similar to you are doing the shortcuts in your day to pc works, you’ll equally lie within Bitcoin. The shortcuts embody for list read, contacts, calendars, navigations and others.



The benefits of victimization this good email service don’t finish here, in fact, there are way more of them which may be explored once connection the family of Bitcoin Email. Because the coin has 2 sides, therefore will this email. Wherever there are uncounted advantages, some dis-satisfactory complexities also are concerned. Do not forget that the majority of the troubles are repairable through troubleshooting. For those, who don’t the correct method of resolution is suggested to succeed in out to Bitcoin Tech Support Phone Number that stays active 24×7 on-line. The veteran team of technical specialists has the adequate data to repair all the problems that are confronted by the users. Is your pc activity terribly slowly once putting in Bitcoin Instant Messenger? Have you ever been noticing the looks of error code 102 messages on your desktop screen? If you’ve got, then by contacting Bitcoin Email Customer Support Phone Number, you may be ready to resolve this now. The team of certified and veteran staff is accessible 24×7 to handle no matter reasonably Bitcoin drawback that the purchasers might face. Therefore whenever you’re facing installation or upgrade drawback along with your AIM or your Bitcoin software system, you’ll contact the support service team.



How will technical professionals give assistance in obtaining started with Bitcoin?



Bitcoin is one in all the most effective email services that comes with completely different and distinctive options. It offers personalized mail expertise that may assist you to keep connected along with your colleagues, friends and lots of different persons. Sending and receiving emails with Bitcoin is done sort of a professional. Here are some steps that you are required to follow if you would like to induce started with the e-mail services of Bitcoin. Let’s have a glance at them:







Open your browser and sort mail.Bitcoin.com in it.

Click on “Get FREE Bitcoin” to let the method begin

The next step is to settle on the e-mail address and password for the account Bitcoin account.

In case you are already having an AIM screen name then you’ll use a similar for your existing screen name and password. With this, you may get an AIM Mail address that is able to be supported by the screen name.



In this approach, you’ll produce your own account on Bitcoin and obtain started with it. If you get any drawback in understanding any above-named steps then contact the techies for Bitcoin Tech support service. Right from making a brand new account and dynamical the password, you’ll get all types of facilities from the specialists over the phone.



How Bitcoin Tech Support offers technical assistance to the customers?



It is right the same that if you are victimization any email services that you will even have to face its technical mishaps. There are times once users get pissed off attributable to technical problems like server issues, page not opening, password problems and plenty of additional. The best and quickest answer to those issues is to induce fast facilitate from the techies. Here are some ways in which during which specialists will facilitate Bitcoin users:







We provide period technical support to the Bitcoin users so as to form them get obviate technical glitches

Customers can get tech aid at any day any hour any time. A team of pros are going to be obtainable twenty-four hours therefore the client will create a call to them anytime.

No ought to drift here and there for breakdown the password or account setting problems. Customers will avail of this technical support service right from the comfort of their home.

Technical representatives never let down the client once it involves confronting technical errors.

The entire technical help method is finished in a very speedy manner by professionals.

All the steps and answers are going to be provided to the purchasers over the phone for customer’s convenience.

Our team of specialists is ready to handle all the straightforward and complex issues of Bitcoin with ease.

We instruct the users over the phone to form them stress-free and obtain eliminate technical issues.

By dialing Bitcoin Customer Service Phone Number, you will directly get connected to the techies. With only one call, customers will speak on to the professionals and describe their Bitcoin connected problems.



What types of technical errors would like Bitcoin email customer support?



With Bitcoin email service, you’ll encounter completely different issues such as:







Password lost or forgotten

Problems whereas accounting creation or work in

Not able to connect the significant files or traditional files

Missing mail sign

Image not showing within the emails

Unable to look at the downloads

Account hacking issue

Technical issue of password retrieval or recovery

Getting technical error in sending the e-mail and retrieving the e-mail

Some of the technical glitches are quite common that happens with virtually everybody. Think about selecting the technical support service will facilitate in eradicating of these problems with ease. For handling these problems, correct help and guidance are needed. This may be done by the team of technical representatives.



How to solve the emails retrieval issues of Bitcoin users?







The first step is to logout from the account and once more log in by getting into all the main points.

Check if the Java application scripting and cookies are enabled.

Now, clear the cache, history, and cookies of the net browser.

After this, sign up and take a look at to retrieve the emails.

How to fix the signup problems with Bitcoin emails?



Many times, it’s been seen that users face sign up issues. This drawback is principally happening attributable to an incorrect username and password. In such a problematic scenario, follow these steps:







Firstly, visit the browser and open the home page of Bitcoin.

Secondly, you wish to click on the choice of Forgot password to reset the password of Bitcoin email.

Once you are through with resetting the password, attempt language in once more

Even once resetting the password, you are facing a similar drawback then attempt to clear all the cookies. This can assist you in fixing the check-in problems with Bitcoin.

How Bitcoin phone number is helpful to customers?



Bitcoin Email Tech Support Phone Number permits individuals to induce connected with the specialists directly for sharing their problems. Customers can get around the clock service for troubleshooting the technical issues associated with Bitcoin. The most objective of this Bitcoin client service is to form the purchasers relaxed and stress-free. All you are required to try and do is to offer a fast call to the technical specialists.



How do I reset the Bitcoin email password?



By providing wonderful email services, Bitcoin has become the foremost trustworthy email service suppliers. Bitcoin email service permits causing and receiving emails in a hassle-free manner. Alongside this, there are several latest options that permit the users to customize it. There are times once technical problems associated with Bitcoin email will bother you. One in all the common technical issues is forgetting and losing the Bitcoin password. This may happen with anyone and losing the password isn’t an enormous deal. If you are looking for the ways in which to reset the Bitcoin email password then dialing Bitcoin Customer Support Phone Number would be an excellent plan. You’ll seek advice from the professionals concerning password problems and obtain instant support from them.



Here are some steps that you simply ought to do for resetting the Bitcoin email password:







You need to open the Bitcoin login page.

Now, choose login/Join. After this, you wish to enter your username and click on “next”.

Now, opt for “forgot password” and enter your username then click on next.

You’re required to produce your telephone number that entered at the time of account creation. After this, click on the consequent button.

After this step, you are required to verify your identity through code verification. The code is going to be sent to your telephone number. You’ll get the code through a telephone call or text.

Once you get the code, enter it and click on next.

Now, you will be asked to make a brand new password for your Bitcoin email account.

After getting into the password, click on save.

Bitcoin users also can follow the below-mentioned steps to reset the password through recovery email address.

First of all email a reset link to the “my recovery emails address” and tap “next”.

This will send an email to your various email address that provided as at the time you signed up for Bitcoin.

Now click on shut button.

Now, open your various email account for the password reset message.

Click on the link that you bought within the email. On clicking it, you will get a brand new page.

Enter your new password and saves the changes that you have created.

With a couple of easy steps, you’ll simply reset your Bitcoin account password. For additional technical help, you’ll ring on Bitcoin Email Technical Support Phone Number. Our team of pros can guide you and supply your directions over the phone. Right from a minor technical issue to major ones, our specialists are ready to handle every one of them in a hassle-free manner. So, don’t wait, simply create a telephone call to our team of specialists. We’re obtainable twenty-four hours to assist the purchasers and create them extremely glad in terms of effective answer and immediate help.



Queries that are often asked by Bitcoin email users?



There are plenty of doubts that can occur in a user’s mind while using the Bitcoin email. Some of the very basic queries that are often asked by Bitcoin email users and have hassled them from time to time have been listed below:







What are the steps to create a new Bitcoin email account?

How to resolve the sign-in errors?

How to import messages from Bitcoin?

How to compose emails and send them to different recipients.

What is the way to send attachments?

How to reset the password of the mail?

What can be done if someone has forgotten the mail?

How to create folders to categorize everything?

What are the ways to set up auto-reply?

How to resolve Blerk error 1 in Bitcoin?

Some of the advice to avoid the glitches



It is quite vital to keep your account safe from outside hackers and intruders. Just take some tips that are given below and avoid the common flaws.







Change the password after some time like every month, so that the email ID doesn’t become vulnerable

Timely clean your junks from the folders using the file cleaner

Do not access the emails on public devices such as public desktop, laptop, and if you do, make it sure that you log out.

If you have a personal smartphone, then only save the password, otherwise, don’t save your password.

These are just a few vital tips to help you with ease at the email conflict. For more advice, just contact the Bitcoin Tech Support Phone Number team. Pick up your phone and dial the Bitcoin technical support number for the same. They will be able to resolve the flaws as the technicians are extremely qualified and experienced in handling the queries. They will be able to assist you with a complete solution and provide with the guaranteed solution.



How to resolve Bitcoin error 47-ac-3101?



If users wish to fix the Bitcoin error 47-AC-310 then users can execute the given methods:







First access your system with your admin account.

After that go to ‘Windows Start’ menu, All Programs, Accessories, System Tools’.

Further this click on System Restore Option and provide all the details that have been asked for.

Finally, just save and restart the system.

If users come across any problem, then promptly contact the Bitcoin customer care to avail more guidance on this problem.

How to change the Bitcoin password for the Apple Bitcointing system?



If users are searching for ways to change the Bitcoin email password for Apple Bitcointing Systems, then users can follow the given methods:



For iPhone







First of all, navigate through to the settings à Mail Contacts and Calendar à Bitcoin

Further this user would have to enter their username and then click the option to change the password.

After this user would have to provide the old password and then enter the new password.

Finally, just click to save the password.

For Mac







First fill the login details and sign in to your account

Further this go to settings and choose to change the password

Users would now have the option to create a new password and then save the changes.

How to transfer the Bitcoin contacts to Microsoft Outlook?



If users are looking for the exact methods which would help users transfer Bitcoin contacts to Microsoft Outlook, then they can take up the methods that have given below:







First of all, sign in to Bitcoin account and Choose Contacts.

After that navigate to Tools, then export using CSV option.

Now save the files at the desired location.

Further this Sign in to Outlook.

Now Just Click on the option of CVS

Further Choose the file from the saved location and opt to import.

Basic Needs for Bitcoin Email



When clients wish to start using the services of Bitcoin email, the only thing that they would have to give attention to would be the system needs of this service. It is vital that your device caters to all the necessary system needs of Bitcoin email for it to function efficiently. If your system lacks on these needs, you will face numerous problems while using the Bitcoin Email service. The system needs of Bitcoin email is as given below:



Windows 7 or newer: Bitcoin email works finest with the newest versions of Firefox, Chrome, Safari, and Bitcoin Desktop Gold.



Mac OS X and newer: Bitcoin email works the finest when you have the newest version of Safari, Firefox, and Chrome on your Mac device.



If you are willing to use Bitcoin email on your mobile device, then make sure that you have:







iOS 9.3 or later

Android 4.4 or later

If you wish to know more about the system needs of this service, you can attain the required details by ringing up the Bitcoin email helpline number.



How to Contact Bitcoin Tech Support Phone Number?



Bitcoin offers the client with an efficient way by which they can handle all the difficulties that they might have to face while using Bitcoin email. They give the user with help from highly trained and experienced experts who are capable of offering users with rapid solutions. They make sure that the clients are not caught up with any problem for too long. They read the situation and the cause of the problem and then give solutions which would eradicate the problem from its roots. This service is available all around the clock, and the clients can connect with them at any hour. This service gives users with 100% satisfaction. Moreover, availing this service does not charge the clients any money which makes it all the more convenient. The clients simply have to dial the Bitcoin email tech support number, and they would get all the help that would be required.



How to solve HTTP error 504 in Bitcoin?



Bitcoin email clients enjoy a secured network that leads them to the state of satisfaction. But there are some things that can irritate them and HTTP error 504 is such a difficulty that should be addressed rapidly to keep your Bitcoin account working. Error 504 problem is an HTTP state code that is also known as 504 gateway timeout failure. Sometimes it happens when a server doesn’t get a straightforward response from others in a way to reload the network page. These servers work together to make sure the clear loading of the network page, but a small interference in their communication may lead to this problem. Now user needs to solve the problem at earliest, and user can do so by contacting at Bitcoin customer care number.



Root Cause behind the error 504:



There are plenty pf probable reasons that may cause this problem, and user need to know about these reasons to solve the problem:







The server slowdown may create the problem

Network error may generate the problem at the user’s end

Poor internet connectivity may be the big reasons as well

In a some of the cases, problem may be because of the computer error

Improper DNS configuration may also cause the problem

Proxy server settings could be the one the main reason

Simple solutions to solve the error 504 problem:



Now user have seen the root cause, that may be responsible for the problem so user can simply solve the problem to process the exact solutions that are given below:



Solution 1. Once user gets the 504 error, then they will unable to open to the web page, but user needs to keep refreshing the page and press the F5 key to refresh the page and try to open the page. Sometimes the issue may resolve in a couple of minutes, and the user can successfully open the page, but in some cases, the server problem gets deeper, and it may take a few hours to resolve the problem.



Solution 2. Users should check all the network connections and reset these network devices. If the difficulties are associated with the nighthawk, nighthawk, etc. the user can solve it by rebooting all the connected devices.



Solution 3. Users can review the proxy settings as well to solve the problem. Incorrect proxy settings are one of the possible reasons for the problem, so user needs to monitor the proxy settings. Once the user locates them and solve them, the error will be gone.



HTTP error 504 is generally linked with the server connections so user can’t do much from their end. Users can try at least these steps, and if a user is failed to solve the problem, then they should call at Bitcoin tech support phone number and get the most prominent help easily.
submitted by usacoronadowns to u/usacoronadowns [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

Bitcoin Acquiring Overview - Easy 3-Step Overview to Acquiring Your Very First Bitcoin

Trying to find a Bitcoin Purchasing Guide? Wondering where to start? People have a lot of misunderstandings about bitcoin - the extremely first widely known and accepted cryptocurrency worldwide.

bitcoin kaufen und senden
A great deal of individuals assume for example that just cyberpunks and questionable individuals utilize it. However bitcoin is actually going mainstream with every person from TigerDirect to Expedia.com to Dell as well as also Subway accepting repayments in bitcoin now.
Why so preferred?
Well, bitcoin has a lot of advantages over various other money. As an example, you can send bitcoins to a person as repayment without needing to go through the bank middleman (as well as obtain hit with additional costs). It's also much faster than sending cash via a bank wire or transfer. You can send out bitcoins to a person as well as have them getting the coins in secs.
With every one of this, it's not a surprise that many people are now shopping bitcoin for the first time. However it's not as very easy as going to your bank as well as taking out bitcoins - or mosting likely to a shop and paying some hard-earned cash money for bitcoin.
The system works a bit in a different way than that. This Bitcoin Buying Overview will certainly go over a couple of points you need to recognize prior to you buy - so you can purchase securely and securely.
To start with, while the rate could be over $2000 us per coin, you do not need to purchase an entire bitcoin. The majority of locations will certainly allow you purchase portions of a bitcoin for as low as $20. So you can start off little and go from there as you obtain more comfortable with the way points function.
Second of all, this article is for general purposes just and also not to be taken as financial advice. Bitcoin can be high-risk as well as before making any kind of purchase you should talk to your economic expert to see if it's right for you.
So below are 3 very easy actions to buying Bitcoins:
# 1 Get a Bitcoin Purse
The initial thing to do before you acquire your coins is to obtain a virtual wallet to store your coins. This budget is a string of message that people can make use of to send you bitcoins.
There are a variety of different kinds of budgets consisting of ones you download to your phone or computer, on the internet wallets as well as even offline, cold storage purses.
Most people favor to get a purse on their phone or computer system. Popular budgets consist of Blockchain, Depot, Bitgo MyCelium and Xapo.
Usually it's as simple as downloading the budget to your phone as an app or downloading and install the software to your computer from the wallet's primary website.
# 2 Make a decision Where to Get
There are a number of kinds of locations to get and also every one is a bit various. There are on the internet sellers that will certainly offer you bitcoins directly for cash money (or financial institution cable or credit card).
There are exchanges where you can deal bitcoins from others - comparable to a stock exchange. There are additionally local exchanges that link you up with sellers in your location looking to offer.
There are also ATMs where you go to buy with money as well as get your coins provided to your purse in mins.
Each bitcoin vendor has their advantages and also drawbacks. For instance Atm machines are fantastic for personal privacy, yet they'll bill you approximately 20% on top of the current price, which is absurd. (On a BTC cost of $2000, that $400! So you're paying $2400 instead of $2000).
Regardless of where you choose to get, bear in mind to do your research as well as choose a trusted seller with a good track record and strong customer support. Very first time purchasers will particularly have inquiries as well as might need the extra support to assist them with their first deal.
Take your time as well as research the different locations to purchase before you determine. Aspects to consider include coin rates, added fees, approach of payment and customer service.
# 3 Buy Bitcoin and also Move It To Your Purse
As soon as you have actually discovered a place to acquire, obtain your funds prepared (i.e. you may send a cable transfer or use your Visa to money your account). Then wait on an excellent price. (Bitcoin costs are always changing 24-hour, 7 days a week). After that place your order when you prepare.
When your order is filled as well as you have your coins, you'll intend to send them to your pocketbook. Just enter your bitcoin address and also obtain the seller to send you your bitcoins. You must see them appear in your pocketbook within mins to an hour (depending upon how fast the vendor sends them out).
Voila, you are currently a bitcoin owner. You can now send out coins to spend for various other items as well as solutions, or hold on to them for a wet day.
One last point to keep in mind: bitcoin is still in its infancy. There are big cost swings as well as the currency can be high-risk. Never acquire more bitcoins than you can pay for to lose.
submitted by knakenge to u/knakenge [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

/r/Bitcoin FAQ - Newcomers please read

Welcome to the /Bitcoin Sticky FAQ

You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments.
Some great introductions for new users are My first bitcoin, Bitcoin explained and ELI5 Bitcoin. Also, the following videos are a good starting point for understanding how bitcoin works and a little about its long term potential:
Also have to give mention to Lopp.net, the Princeton crypto series and James D'Angelo's Bitcoin 101 Blackboard series. Some excellent writing on Bitcoin's value proposition and future can be found at the Satoshi Nakamoto Institute. Bitcoin statistics can be found here, here and here. Developer resources can be found here, here and here. Peer-reviewed research papers can be found here. Potential upcoming protocol improvements here. Scaling resources here. The number of times Bitcoin was declared dead by the media can be found here (LOL!), and of course Satoshi Nakamoto's whitepaper that started it all! :)
Key properties of bitcoin

Where can I buy bitcoins?

Bitcoin.org, BuyBitcoinWorldwide.com and Howtobuybitcoin.io are helpful sites for beginners. You can buy or sell any amount of bitcoin and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also, check out the bitcoinity exchange resources for a larger list of options for purchases.
Bank Transfer Credit / Debit card Cash
Gemini Bitstamp LocalBitcoins
Bitstamp Bitit Mycelium LocalTrader
BitFinex Cex.io LibertyX
Cex.io CoinMama WallofCoins
Xapo Spectrocoin BitcoinOTC
Kraken Luno BitQuick
itBit
HitBTC
Bitit
Bisq (decentralized)
Luno
Spectrocoin
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage.
Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".

Securing your bitcoins

With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
Android iOs Desktop
Samouari BreadWallet Electrum
Another interesting use case for physical storage/transfer is the Opendime. Opendime is a small USB stick that allows you to spend Bitcoin by physically passing it along so it's anonymous and tangible like cash.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email!
2FA requires a second confirmation code to access your account, usually from a text message or app, making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
Google Auth Authy
Android Android
iOS iOS

Where can I spend bitcoins?

Check out spendabit or bitcoin directory for some good options, some of the more commons ones are listed below.
Store Product
Gyft Gift cards for hundreds of retailers including Amazon, Target, Walmart, Starbucks, Whole Foods, CVS, Lowes, Home Depot, iTunes, Best Buy, Sears, Kohls, eBay, GameStop, etc.
Steam, HumbleBundle, Games Planet, itch.io, g2g and kinguin For when you need to get your game on
Microsoft Xbox games, phone apps and software
Spendabit, Overstock, The Bitcoin Directory and BazaarBay Retail shopping with millions of results
ShakePay Generate one time use Visa cards in seconds
NewEgg and Dell For all your electronics needs
Bitwa.la, Coinbills, Piixpay, Bitbill.eu, Bylls, Coins.ph, Bitrefill, LivingRoomofSatoshi, Hyphen.to, Coinsfer, More #1, #2 Bill payment
Menufy, Takeaway, Thuisbezorgd NL, Pizza For Coins Takeout delivered to your door!
Expedia, Cheapair, Lot, Destinia, BTCTrip, Abitsky, SkyTours, Fluege the Travel category on Gyft and 9flats For when you need to get away
BitHost VPS service
Cryptostorm, Mullvad, and PIA VPN services
Namecheap, Porkbun For new domain name registration
Stampnik Discounted USPS Priority, Express, First-Class mail postage
Reddit Gold Premium membership which can be gifted to others
Coinmap and AirBitz are helpful to find local businesses accepting bitcoins. A good resource for UK residents is at wheretospendbitcoins.co.uk.
There are also lots of charities which accept bitcoin donations, such as Wikipedia, United Way, ACLU and the EFF. You can find a longer list here.

Merchant Resources

There are several benefits to accepting bitcoin as a payment option if you are a merchant;
If you are interested in accepting bitcoin as a payment method, there are several options available;

Can I mine bitcoin?

Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out.
If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. Bitseed is an easy option for getting set up. You can view the global node distribution here.

Earning bitcoins

Just like any other form of money, you can also earn bitcoins by being paid to do a job.
Site Description
WorkingForBitcoins, Bitwage, XBTfreelancer, Cryptogrind, Bitlancerr, Coinality, Bitgigs, /Jobs4Bitcoins, Rein Project Freelancing
OpenBazaar, Purse.io, Bitify, /Bitmarket, 21 Market Marketplaces
Streamium.io, XOtika.tv NSFW, /GirlsGoneBitcoin NSFW Video Streaming
Bitasker, BitforTip Tasks
Supload.com, SatoshiBox, JoyStream, File Army File/Image Sharing
CoinAd, A-ads, Coinzilla.io Advertising
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins)

Bitcoin Projects

The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
Project Description
Lightning Network, Amiko Pay, and Strawpay Payment channels for network scaling
Blockstream, Rootstock and Drivechain Sidechains
21, Inc. Open source library for the machine payable web
ShapeShift.io Trade between bitcoins and altcoins easily
Open Transactions, Counterparty, Omni, Open Assets, Symbiont and Chain Financial asset platforms
Hivemind and Augur Prediction markets
Mediachain Decentralized media library
Tierion and Factom Records & Titles on the blockchain
BitMarkets, DropZone, Beaver and Open Bazaar Decentralized markets
Samourai and Dark Wallet - abandoned Privacy-enhancing wallets
JoinMarket CoinJoin implementation (Increase privacy and/or Earn interest on bitcoin holdings)
Coinffeine and Bisq Decentralized bitcoin exchanges
Keybase and Bitrated Identity & Reputation management
Telehash Mesh networking
JoyStream BitTorrent client with paid seeding
MORPHiS Decentralized, encrypted internet
Storj and Sia Decentralized file storage
Streamium Pay in real time for on-demand services
Abra Global P2P money transmitter network
bitSIM PIN secure hardware token between SIM & Phone
Identifi Decentralized address book w/ ratings system
BitGo Multisig bitcoin API
Bitcore Open source Bitcoin javascript library
Insight Open source blockchain API
Leet Kill your friends and take their money ;)

Bitcoin Units

One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
Unit Symbol Value Info
millibitcoin mBTC 1,000 per bitcoin SI unit for milli i.e. millilitre (mL) or millimetre (mm)
microbitcoin μBTC 1,000,000 per bitcoin SI unit for micro i.e microlitre (μL) or micrometre (μm)
bit bit 1,000,000 per bitcoin Colloquial "slang" term for microbitcoin
satoshi sat 100,000,000 per bitcoin Smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki.
Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. A complete list of bitcoin related subreddits can be found here
Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval.
Welcome to the Bitcoin community and the new decentralized economy!
submitted by BinaryResult to Bitcoin [link] [comments]

11-18 22:43 - 'List of bitcoin person-to-person (P2P) Exchanges (e.g., Bisq, HodlHodl, LocalCoinSwap, etc.)' (self.Bitcoin) by /u/cointastical removed from /r/Bitcoin within 2807-2817min

'''
Following is a list of P2P exchanges for trading Bitcoin. Common payment methods include bank transfer, cash deposited in the seller's bank account, in-person cash (face-to-face) trades as well as payment networks such as Zelle, Alipay, even Cash App and PayPal, for example.
Any that I am missing?
Altcoin-only P2P Trading exchanges
AggregatoSearch and Helper Sites
Note: If you use one of the above P2P OTC trade "matchmaking" services, please [trade with caution]45 and do your own due diligence.
This list does not include exchanges not in English (e.g., [58Coin]46 ), deserted or defunct marketplaces (e.g., Cancoin), not-yet launched (e.g., [OTCBoss]47 , [Zismo.io]48 ), ones that operate only through [dark markets]49 , or online-only [DEX/decentralized exchanges]50 ([another list of DEXes]51 ).
Also, there are a number of variants that I didn't list:
Additions, corrections, and other feedback welcome and can be submitted via [e-mail]88 .
[Note: This post is a continuation of an [earlier post]89 that has since been archived and locked. There is also a [corresponding post on Medium]90 with this information as well.]
'''
List of bitcoin person-to-person (P2P) Exchanges (e.g., Bisq, HodlHodl, LocalCoinSwap, etc.)
Go1dfish undelete link
unreddit undelete link
Author: cointastical
1: bisq.n*tw**k 2: HodlHo**.c*m 3: lightnin*n*t*orkstor*s*co*/w*ll*ts 4: local**i**wap.com 5: www.l*cal*igh*n*n*.ne* 6: lightni*gn****rk*tores.c*m/wa*lets 7: a*o*adesk.*om 8: *ounte**netwo*k 9: *a*l*fcoi*s.com 10: pa*fair.i* 11: bu*cryp*o.**day 12: www.*it***ck.co*buy 13: *emi*a*o.com 14: *o*al*oin.io/buy-sel*-bit*o** 15: my*el*um*com*lt/he*p.h*ml 16: *ww.**ce*ium.*om/lt/*/ 17: L*calBitco*n*.*om 18: *tc.huob*.**/en-us/*r*d*/buy-b*c/ 19: otcb*c.com/*ell_o*fers*currency=****a*p;*iat_c**r*ncy=*n***mp;*ayment_**pe=all 20: c*y*togem.gl**al 21: liber*l*o*ns.co* 22: *ww.co*ncola.co*/buy-b**c**n 23: wazirx.co****p 24: www*g*o*tus.**m/p2p 25: bitz*ato.c*m/p** 26: bu*coins.afric*/*** 27: w***swapngo*org 28: red**t.c*m*C*sh4Cas* 29: *e*d*t.**m/r*C*sh4**sh/co*ments/6zz7r7 30: redd*t*com***ftC*rdE*change 31: re*dit.com/gi*t**rd*x**ange/*omme*t*/2*ig0*/ 32: *eddit**om/BitMa*k** 33: redd*t.com/*/giftca*d**cha*ge/comm*n**/2***0n/ 34: b**halo.or* 35: op*nbazaar.c*m/discove*/re***ts*?t**e=cr**t*cur*ency 36: *o***mone*o.co/buy_m*nero 37: *ocalet*ereu*.co* 38: a*p*d*ther.io 39: ***a*.bitcoin.com 40: trustless*e*hfi**x.co*/*tc 41: **c.Hubi.c*m 42: ww*.kucoin**om/o*c 43: co*ne*t*d.io 44: Exc*an*eRa*es*pro 45: w*w**ry*to***order*com/2019*02/08**h*ngs-you*wa*t-t***now-before-buying-bit*oi*s-from-a-p*p-ma*k**p**c* 46: c2c.**ex*com 47: ga*.c**/*TCBOSS 48: *ismo*io 49: 99*itco*ns.c**/ac*ess*ng-da*k-net**nder*minu*es-be*i*n*r*-gui*e 50: www.*rypt*mo***w*com/2*19*02/06/li**-of-d*x-*rypt*-exc*an*es 51: distribu**d.*i***b.*o/index 52: www.b***oinpi**de/bit*oi*-*tore 53: w*w.*hehouseo***kamo*o**o*/*n/standort 54: *u*Bitcoin.Lon**n 55: *u*olo.io 56: y*p*cx 57: bi*co*nd*a*er*.com.au/b*y***tcoins.h*ml 58: w*w.c**ptop*ug*n*lewoo*.com 59: *ebito**com 60: c*in*fy.c*m 61: coi*corn*r.*o* 62: *pp.*ub*ter.com/n**o*debu* 63: bi*tyliciou**c*m 64: b*tir*lan*.ie 65: m*ney.k*na*io 66: www.lite*it.*u/***buy 67: *oni*.com 68: *rypto*o*cher.*o 69: getsat***i*org/ 70: li*htningne**orkst*r*s.*om*wallet* 71: w*w.b*tquic*.co/qu**k*buy 72: *as*.ap*/bi*coin 73: w*w.*ardcoin*.co* 74: cry*tovou***r.io 75: bitof.**/ 76: *zte.co/ve*dor*.*t*l 77: fa**bitco*ns.***/#*ocations 78: lib**tyx.c*m 79: www.ri*ewall*t*com*loc*t*o*s 80: Co*nA*MRadar**om 81: ww**c*ins*ar.c*m/b*tcoin 82: coinm*.com*k*os*s 83: www*sbb.c*/en*st*tion-se*vic*s/services**urther-**r*i*es*ticket-*a**ine-serv*ces/b*tc*i*.**m* 84: pur**.io 85: Lam*um.i* 86: *ii*p*y.com 87: *e*ium.com/*c**ntastical/bit*o*n-cry**o-o*c-**a**n**desks-7f77276*6dc 88: *oin***[email protected]*mail.*om 89: redd*t***m/Bitcoin/c*mm**ts*b2*j6k 90: m*dium.co****ointa*tic*l*p2p-otc-e*change*-*-g-lo*al*itco**s-*i*q-hodlho*l*etc-*0f293a*c7**
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Emergent Coding FAQ

Background reading
  1. https://youtu.be/-MMQUspVduo ELI5 with pictures.
  2. https://youtu.be/ZSkZxOJ5HPA Hello World using Emergent Coding
  3. https://codevalley.com/whitepaper.pdf This document treats Emergent coding from a philosophical perspective. It has a good introduction, description of the tech and is followed by two sections on justifications from the perspective of Fred Brooks No Silver Bullet criteria and an industrialization criteria.
  4. Mark Fabbro's presentation from the Bitcoin Cash City Conference which outlines the motivation, basic mechanics, and usage of Bitcoin Cash in reproducing the industrial revolution in the software industry.
  5. Building the Bitcoin Cash City presentation highlighting how the emergent coding group of companies fit into the adoption roadmap of North Queensland.
  6. Forging Chain Metal by Paul Chandler CEO of Aptissio, one of startups in the emergent coding space and which secured a million in seed funding last year.
  7. Bitcoin Cash App Exploration A series of Apps that are some of the first to be built by emergent coding and presented, and in the case of Cashbar, demonstrated at the conference.
  8. A casual Bitcoin Cash interview that touches on emergent coding, tech park, merchant adoption and much more.
How does Emergent Coding prevent developer capture?
A developer's Agent does not know what project they are contributing to and is thus paid for the specific contribution. The developer is controlling the terms of the payment rather than the alternative, an employer with an employment agreement.
Why does Emergent Coding use Bitcoin BCH?
  1. Both emergent coding and Bitcoin BCH are decentralized: As emergent coding is a decentralized development environment consisting of Agents providing respective design services, each contract received by an agent requires a BCH payment. As Agents are hosted by their developer owners which may be residing in one of 150 countries, Bitcoin Cash - an electronic peer-to-peer electronic cash system - is ideal to include a developer regardless of geographic location.
  2. Emergent coding will increase the value of the Bitcoin BCH blockchain: With EC, there are typically many contracts to build an application (Cashbar was designed with 10000 contracts or so). EC adoption will increase the value of the Bitcoin BCH blockchain in line with this influx of quality economic activity.
  3. Emergent coding is being applied to BCH software first: One of the first market verticals being addressed with emergent coding is Bitcoin Cash infrastructure. We are already seeing quality applications created using emergent coding (such as the HULA, Cashbar, PH2, vending, ATMs etc). More apps and tools supporting Bitcoin cash will attract more merchants and business to BCH.
  4. Emergent coding increases productivity: Emergent coding increases developer productivity and reduces duplication compared to other software development methods. Emergent coding can provide BCH devs with an advantage over other coins. A BCH dev productivity advantage will accelerate Bitcoin BCH becoming the first global currency.
  5. Emergent coding produces higher quality binaries: Higher quality software leads to a more reliable network.

1. Who/what is Code Valley? Aptissio? BCH Tech Park? Mining and Server Complex?
Code Valley Corp Pty Ltd is the company founded to commercialize emergent coding technology. Code Valley is incorporated in North Queensland, Australia. See https://codevalley.com
Aptissio Australia Pty Ltd is a company founded in North Queensland and an early adopter of emergent coding. Aptissio is applying EC to Bitcoin BCH software. See https://www.aptissio.com
Townsville Technology Precincts Pty Ltd (TTP) was founded to bring together partners to answer the tender for the Historic North Rail Yard Redevelopment in Townsville, North Queensland. The partners consist of P+I, Conrad Gargett, HF Consulting, and a self-managed superannuation fund(SMSF) with Code Valley Corp Pty Ltd expected to be signed as an anchor tenant. TTP answered a Townsville City Council (TCC) tender with a proposal for a AUD$53m project (stage 1) to turn the yards into a technology park and subsequently won the tender. The plan calls for the bulk of the money is to be raised in the Australian equity markets with the city contributing $28% for remediation of the site and just under 10% from the SMSF. Construction is scheduled to begin in mid 2020 and be competed two years later.
Townsville Mining Pty Ltd was set up to develop a Server Complex in the Kennedy Energy Park in North Queensland. The site has undergone several studies as part of a due diligence process with encouraging results for its competitiveness in terms of real estate, power, cooling and data.
  1. TM are presently in negotiations with the owners of the site and is presently operating under an NDA.
  2. The business model calls for leasing "sectors" to mining companies that wish to mine allowing companies to control their own direction.
  3. Since Emergent Coding uses the BCH rail, TM is seeking to contribute to BCH security with an element of domestic mining.
  4. TM are working with American partners to lease one of the sectors to meet that domestic objective.
  5. The site will also host Emergent Coding Agents and Code Valley and its development partners are expected to lease several of these sectors.
  6. TM hopes to have the site operational within 2 years.
2. What programming language are the "software agents" written in.
Agents are "built" using emergent coding. You select the features you want your Agent to have and send out the contracts. In a few minutes you are in possession of a binary ELF. You run up your ELF on your own machine and it will peer with the emergent coding and Bitcoin Cash networks. Congratulations, your Agent is now ready to accept its first contract.
3. Who controls these "agents" in a software project
You control your own Agents. It is a decentralized development system.
4. What is the software license of these agents. Full EULA here, now.
A license gives you the right to create your own Agents and participate in the decentralized development system. We will publish the EULA when we release the product.
5. What kind of software architecture do these agents have. Daemons Responding to API calls ? Background daemons that make remote connection to listening applications?
Your Agent is a server that requires you to open a couple of ports so as to peer with both EC and BCH networks. If you run a BCH full node you will be familiar with this process. Your Agent will create a "job" for each contract it receives and is designed to operate thousands of jobs simultaneously in various stages of completion. It is your responsibility to manage your Agent and keep it open for business or risk losing market share to another developer capable of designing the same feature in a more reliable manner (or at better cost, less resource usage, faster design time etc.). For example, there is competition at every classification which is one reason emergent coding is on a fast path for improvement.
It is worth reiterating here that Agents are only used in the software design process and do not perform any role in the returned project binary.
6. What is the communication protocol these agents use.
The protocol is proprietary and is part of your license.
7. Are the agents patented? Who can use these agents?
It is up to you if you want to patent your Agent the underlying innovation behind emergent coding is _feasible_ developer specialization. Emergent coding gives you the ability to contribute to a project without revealing your intellectual property thus creating prospects for repeat business; It renders software patents moot.
Who uses your Agents? Your Agents earn you BCH with each design contribution made. It would be wise to have your Agent open for business at all times and encourage everyone to use your design service.
8. Do I need to cooperate with Code Valley company all of the time in order to deploy Emergent Coding on my software projects, or can I do it myself, using documentation?
It is a decentralized system. There is no single point of failure. Code Valley intends to defend the emergent coding ecosystem from abuse and bad actors but that role is not on your critical path.
9. Let's say Electron Cash is an Emergent Coding project. I have found a critical bug in the binary. How do I report this bug, what does Jonald Fyookball need to do, assuming the buggy component is a "shared component" puled from EC "repositories"?
If you built Electron Cash with emergent coding it will have been created by combining several high level wallet features designed into your project by their respective Agents. Obviously behind the scenes there are many more contracts that these Agents will let and so on. For example the Cashbar combines just 16 high level Point-of-Sale features but ultimately results in more than 10,000 contracts in toto. Should one of these 10,000 make a design error, Jonald only sees the high level Agents he contracted. He can easily pinpoint which of these contractors are in breach. Similarly this contractor can easily pinpoint which of its sub-contractors is in breach and so on. The offender that breached their contract wherever in the project they made their contribution, is easily identified. For example, when my truck has a warranty problem, I do not contact the supplier of the faulty big-end bearing, I simply take it back to Mazda who in turn will locate the fault.
Finally "...assuming the buggy component is a 'shared component' puled from EC 'repositories'?" - There are no repositories or "shared component" in emergent coding.
10. What is your licensing/pricing model? Per project? Per developer? Per machine?
Your Agent charges for each design contribution it makes (ie per contract). The exact fee is up to you. The resulting software produced by EC is unencumbered. Code Valley's pricing model consists of a seat license but while we are still determining the exact policy, we feel the "Valley" (where Agents advertise their wares) should charge a small fee to help prevent gaming the catalogue and a transaction fee to provide an income in proportion to operations.
11. What is the basic set of applications I need in order to deploy full Emergent Coding in my software project? What is the function of each application? Daemons, clients, APIs, Frontends, GUIs, Operating systems, Databases, NoSQLs? A lot of details, please.
There's just one. You buy a license and are issued with our product called Pilot. You run Pilot (node) up on your machine and it will peer with the EC and BCH networks. You connect your browser to Pilot typically via localhost and you're in business. You can build software (including special kinds of software like Agents) by simply combining available features. Pilot allows you to specify the desired features and will manage the contracts and decentralized build process. It also gives you access to the "Valley" which is a decentralized advertising site that contains all the "business cards" of each Agent in the community, classified into categories for easy search.
If we are to make a step change in software design, inventing yet another HLL will not cut it. As Fred Brooks puts it, an essential change is needed.
12. How can I trust a binary when I can not see the source?
The Emergent Coding development model is very different to what you are use to. There are ways of arriving at a binary without Source code.
The Agents in emergent coding design their feature into your project without writing code. We can see the features we select but can not demonstrate the source as the design process doesn't use a HLL.
The trust model is also different. The bulk of the testing happens _before_ the project is designed not _after_. Emergent Coding produces a binary with very high integrity and arguably far more testing is done in emergent coding than in incumbent methods you are used to.
In emergent coding, your reputation is built upon the performance of your Agent.
If your Agent produces substandard features, you are simply creating an opportunity for a competitor to increase their market share at your expense.
Here are some points worth noting regarding bad actor Agents:
  1. An Agent is a specialist and in emergent coding is unaware of the project they are contributing to. If you are a bad actor, do you compromise every contract you receive? Some? None?
  2. Your client is relying on the quality of your contribution to maintain their own reputation. Long before any client will trust your contributions, they will have tested you to ensure the quality is at their required level. You have to be at the top of your game in your classification to even win business. This isn't some shmuck pulling your routine from a library.
  3. Each contract to your agent is provisioned. Ie you advertise in advance what collaborations you require to complete your design. There is no opportunity for a "sign a Bitcoin transaction" Agent to be requesting "send an HTTP request" collaborations.
  4. Your Agent never gets to modify code, it makes a design contribution rather than a code contribution. There is no opportunity to inject anything as the mechanism that causes the code to emerge is a higher order complexity of all Agent involvement.
  5. There is near perfect accountability in emergent coding. You are being contracted and paid to do the design. Every project you compromise has an arrow pointed straight at you should it be detected even years later.
Security is a whole other ball game in emergent coding and current rules do not necessarily apply.
13. Every time someone rebuilds their application, do they have to pay over again for all "design contributions"? (Or is the ability to license components at fixed single price for at least a limited period or even perpetually, supported by the construction (agent) process?)
You are paying for the design. Every time you build (or rebuild) an application, you pay the developers involved. They do not know they are "rebuilding". This sounds dire but its costs far less than you think and there are many advantages. Automation is very high with emergent coding so software design is completed for a fraction of the cost of incumbent design methods. You could perhaps rebuild many time before matching incumbent methods. Adding features is hard with incumbent methods "..very few late-stage additions are required before the code base transforms from the familiar to a veritable monster of missed schedules, blown budgets and flawed products" (Brooks Jr 1987) whereas with emergent coding adding a late stage feature requires a rebuild and hence seamless integration. With Emergent Coding, you can add an unlimited number of features without risking the codebase as there isn't one.
The second part of your question incorrectly assumes software is created from licensed components rather than created by paying Agents to design features into your project without any licenses involved.
14. In this construction process, is the vendor of a particular "design contribution" able to charge differential rates per their own choosing? e.g. if I wanted to charge a super-low rate to someone from a 3rd world country versus charging slightly more when someone a global multinational corporation wants to license my feature?
Yes. Developers set the price and policy of their Agent's service. The Valley (where your Agent is presently advertised) presently only supports a simple price policy. The second part of your question incorrectly assumes features are encumbered with licenses. A developer can provide their feature without revealing their intellectual property. A client has the right to reuse a developer's feature in another project but will find it uneconomical to do so.
15. Is "entirely free" a supported option during the contract negotiation for a feature?
Yes. You set the price of your Agent.
16. "There is no single point of failure." Right now, it seems one needs to register, license the construction tech etc. Is that going to change to a model where your company is not necessarily in that loop? If not, don't you think that's a single point of failure?
It is a decentralized development system. Once you have registered you become part of a peer-to-peer system. Code Valley has thought long and hard about its role and has chosen the reddit model. It will set some rules for your participation and will detect or remove bad actors. If, in your view, Code Valley becomes a bad actor, you have control over your Agent, private keys and IP, you can leave the system at any time.
17. What if I can't obtain a license because of some or other jurisdictional problem? Are you allowed to license the technology to anywhere in the world or just where your government allows it?
We are planning to operate in all 150 countries. As ec is peer-to-peer, Code Valley does not need to register as a digital currency exchange or the like. Only those countries banning BCH will miss out (until such times as BCH becomes the first global electronic cash system).
18.
For example the Cashbar combines just 16 high level Point-of-Sale features but ultimately results in more than 10,000 contracts in toto.
It seems already a reasonably complex application, so well done in having that as a demo.
Thank you.
19. I asked someone else a question about how it would be possible to verify whether an application (let's say one received a binary executable) has been built with your system of emergent consensus. Is this possible?
Yes of course. If you used ec to build an application, you can sign it and claim anything you like. Your client knows it came from you because of your signature. The design contributions making up the application are not signed but surprisingly there is still perfect accountability (see below).
20. I know it is possible to identify for example all source files and other metadata (like build environment) that went into constructing a binary, by storing this data inside an executable.
All metadata emergent coding is now stored offline. When your Agent completes a job, you have a log of the design agreements you made with your peers etc., as part of the log. If you are challenged at a later date for breaching a design contract, you can pull your logs to see what decisions you made, what sub-contracts were let etc. As every Agent has their own logs, the community as a whole has a completely trustless log of each project undertaken.
21. Is this being done with EC build products and would it allow the recipient to validate that what they've been provided has been built only using "design contributions" cryptographically signed by their providers and nothing else (i.e. no code that somehow crept in that isn't covered by the contracting process)?
The emergent coding trust model is very effective and has been proven in other industries. Remember, your Agent creates a feature in my project by actually combining smaller features contracted from other Agents, thus your reputation is linked to that of your suppliers. If Bosch makes a faulty relay in my Ford, I blame Ford for a faulty car not Bosch when my headlights don't work. Similarly, you must choose and vet your sub-contractors to the level of quality that you yourself want to project. Once these relationships are set up, it becomes virtually impossible for a bad actor to participate in the system for long or even from the get go.
22. A look at code generated and a surprising answer to why is every intermediate variable spilled?
Thanks to u/R_Sholes, this snippet from the actual code for: number = number * 10 + digitgenerated as a part of: sub read/integeboolean($, 0, 100) -> guess
; copy global to local temp variable 0x004032f2 movabs r15, global.current_digit 0x004032fc mov r15, qword [r15] 0x004032ff mov rax, qword [r15] 0x00403302 movabs rdi, local.digit 0x0040330c mov qword [rdi], rax ; copy global to local temp variable 0x0040330f movabs r15, global.guess 0x00403319 mov r15, qword [r15] 0x0040331c mov rax, qword [r15] 0x0040331f movabs rdi, local.num 0x00403329 mov qword [rdi], rax ; multiply local variable by constant, uses new temp variable for output 0x0040332c movabs r15, local.num 0x00403336 mov rax, qword [r15] 0x00403339 movabs rbx, 10 0x00403343 mul rbx 0x00403346 movabs rdi, local.num_times_10 0x00403350 mov qword [rdi], rax ; add local variables, uses yet another new temp variable for output 0x00403353 movabs r15, local.num_times_10 0x0040335d mov rax, qword [r15] 0x00403360 movabs r15, local.digit 0x0040336a mov rbx, qword [r15] 0x0040336d add rax, rbx 0x00403370 movabs rdi, local.num_times_10_plus_digit 0x0040337a mov qword [rdi], rax ; copy local temp variable back to global 0x0040337d movabs r15, local.num_times_10_plus_digit 0x00403387 mov rax, qword [r15] 0x0040338a movabs r15, global.guess 0x00403394 mov rdi, qword [r15] 0x00403397 mov qword [rdi], rax For comparison, an equivalent snippet in C compiled by clang without optimizations gives this output: imul rax, qword ptr [guess], 10 add rax, qword ptr [digit] mov qword ptr [guess], rax 
Collaborations at the byte layer of Agents result in designs that spill every intermediate variable.
Firstly, why this is so?
Agents from this early version only support one catch-all variable design when collaborating. Similar to a compiler when all registers contain variables, the compiler must make a decision to spill a register temporarily to main memory. The compiler would still work if it spilled every variable to main memory but would produce code that would be, as above, hopelessly inefficient.
However, by only supporting the catch-all portion of the protocol, the code valley designers were able to design, build and deploy these agents faster because an Agent needs fewer predicates in order to participate in these simpler collaborations.
The protocol involved however, can have many "Policies" besides the catch-all default policy (Agents can collaborate over variables designed to be on the stack, or, as is common for intermediate variables, designed to use a CPU register, and so forth).
This example highlights one of the very exciting aspects of emergent coding. If we now add a handful of additional predicates to a handful of these byte layer agents, henceforth ALL project binaries will be 10x smaller and 10x faster.
Finally, there can be many Agents competing for market share at each of classification. If these "gumby" agents do not improve, you can create a "smarter" competitor (ie with more predicates) and win business away from them. Candy from a baby. Competition means the smartest agents bubble to the top of every classification and puts the entire emergent coding platform on a fast path for improvement. Contrast this with incumbent libraries which does not have a financial incentive to improve. Just wait until you get to see our production system.
23. How hard can an ADD Agent be?
Typically an Agent's feature is created by combining smaller features from other Agents. The smallest features are so devoid of context and complexity they can be rendered by designing a handful of bytes in the project binary. Below is a description of one of these "byte" layer Agents to give you an idea how they work.
An "Addition" Agent creates the feature of "adding two numbers" in your project (This is an actual Agent). That is, it contributes to the project design a feature such that when the project binary is delivered, there will be an addition instruction somewhere in it that was designed by the contract that was let to this Agent.
If you were this Agent, for each contract you received, you would need to collaborate with peers in the project to resolve vital requirements before you can proceed to design your binary "instruction".
Each paid contract your Agent receives will need to participate in at least 4 collaborations within the design project. These are:
  1. Input A collaboration
  2. Input B collaboration
  3. Result collaboration
  4. Construction site collaboration
You can see from the collaborations involved how your Agent can determine the precise details needed to design its instruction. As part of the contract, the Addition Agent will be provisioned with contact details so it can join these collaborations. Your Agent must collaborate with other stakeholders in each collaboration to resolve that requirement. In this case, how a variable will be treated. The stakeholders use a protocol to arrive at an Agreement and share the terms of the agreement. For example, the stakeholders of collaboration “Input A” may agree to treat the variable as an signed 64bit integer, resolve to locate it at location 0x4fff2, or alternatively agree that the RBX register should be used, or agree to use one of the many other ways a variable can be represented. Once each collaboration has reached an agreement and the terms of that agreement distributed, your Agent can begin to design the binary instruction. The construction site collaboration is where you will exactly place your binary bytes.
The construction site protocol is detailed in the whitepaper and is some of the magic that allows the decentralized development system to deliver the project binary. The protocol consists of 3 steps,
  1. You request space in the project binary be reserved.
  2. You are notified of the physical address of your requested space.
  3. You delver the the binary bytes you designed to fill the reserved space.
Once the bytes are returned your Agent can remove the job from its work schedule. Job done, payment received, another happy customer with a shiny ADD instruction designed into their project binary.
Note:
  1. Observe how it is impossible for this ADD Agent to install a backdoor undetected by the client.
  2. Observe how the Agent isn’t linking a module, or using a HLL to express the binary instruction.
  3. Observe how with just a handful of predicates you have a working "Addition" Agent capable of designing the Addition Feature into a project with a wide range of collaboration agreements.
  4. Observe how this Agent could conceivably not even design-in an ADD instruction if one of the design time collaboration agreements was a literal "1" (It would design in an increment instruction). There is even a case where this Agent may not deliver any binary to build its feature into your project!
24. How does EC arrive at a project binary without writing source code?
Devs using EC combine features to create solutions. They don't write code. EC devs contract Agents which design the desired features into their project for a fee. Emergent coding uses a domain specific contracting language (called pilot) to describe the necessary contracts. Pilot is not a general purpose language. As agents create their features by similarly combining smaller features contracted from peer, your desired features may inadvertently result in thousands of contracts. As it is agents all the way down, there is no source code to create the project binary.
Traditional: Software requirements -> write code -> compile -> project binary (ELF).
Emergent coding: Select desired features -> contract agents -> project binary (ELF).
Agents themselves are created the same way - specify the features you want your agent to have, contract the necessary agents for those features and viola - agent project binary (ELF).
25. How does the actual binary code that agents deliver to each other is written?
An agent never touches code. With emergent coding, agents contribute features to a project, and leave the project binary to emerge as the higher-order complexity of their collective effort. Typically, agents “contribute” their feature by causing smaller features to be contributed by peers, who in turn, do likewise. By mapping features to smaller features delivered by these peers, agents ensure their feature is delivered to the project without themselves making a direct code contribution.
Peer connections established by these mappings serve to both incrementally extend a temporary project “scaffold” and defer the need to render a feature as a code contribution. At the periphery of the scaffold, features are so simple they can be rendered as a binary fragment with these binary fragments using the information embodied by the scaffold to guide the concatenation back along the scaffold to emerge as the project binary - hence the term Emergent Coding.
Note the scaffold forms a temporary tree-like structure which allows virtually all the project design contracts to be completed in parallel. The scaffold also automatically limits an agent's scope to precisely the resources and site for their feature. It is why it is virtually impossible for an agent to install a "back door" or other malicious code into the project binary.
submitted by nlovisa to EmergentCoding [link] [comments]

How to Host a Bitcoin Depot ATM in your Business Best Passive income for 2019/2020 Bitcoin ATM's HOW TO Video Bitcoin ATMs - How To Use Them How to Use a Bitcoin ATM Bitcoin ATM - I went to a Bitcoin ATM! How does it work?

Bitcoin ATM kiosks are machines which are connected to the Internet, allowing the insertion of cash or a credit card in exchange for Bitcoin. They look like traditional ATMs, but they do not connect to a bank account and instead connect the customer directly to a Bitcoin exchange for a localized and convenient way to purchase Bitcoin in person. Find Bitcoin ATM locations easily with our Bitcoin ATM Map. For many Bitcoin machines online rates are available. Producers. Genesis Coin (3065) General Bytes (2622) BitAccess (877) Coinsource (516) Lamassu (499) All producers; Countries. United States (6698) Canada (808) United Kingdom (273) Austria (152) Switzerland (84) Quickly and easily find Bitcoin and Altcoin ATMs with our Cryptocurrency ATM Locator Map. Find a Bitcoin ATM Near You. We operate 100+ BTM locations across the United States in every major city. 24 hour locations, instant transactions. Bitcoin ATMs are the easiest way to buy bitcoin with cash! There are many ways to get started with Bitcoin but one the most accessible options is to find an ATM supporting coin purchases with local fiat. Also read: Bitcoin.com Partners With Mecon Cash

[index] [13615] [20648] [6250] [2052] [2623] [19302] [4475] [22591] [30732] [14844]

How to Host a Bitcoin Depot ATM in your Business

Bitcoin ATMs oh my! OpEd 4 - Duration: ... Local Bitcoin ATM Company Thriving Despite Price Of Coin Having Dropped - Duration: ... Location: United States Restricted Mode: ... Video capturing a Bitcoin ATM and how to use it. Spend your Bitcoin on Amazon and save 20% off using www.bitcart.io. Just a video for fun, sharing my experience with the Bitcoin ATM at OutPost Gamecenter in Ghent. They put the ATM at the darkest place possible, so it's really dark though. I wanted to know how it ... Make great passive income with bitcoin ATM's turnkey business and easily manage your machine from anywhere 24/7. More explainers videos to come!! www.localbitcoinnow.com. Bitcoin ATMs are a great way to earn passive income at your business location. Zero risk investment. Apply to host a bitcoin ATM at your business to see if your location qualifies for our host program

Flag Counter