How to Backup Bitcoin Wallet in Windows 10/8/7

BiblePay (BBP)

BiblePay (BBP) is a Charity Christian Cryptocurrency that donates 10% of coins to Charity every month, sponsoring hundreds of orphans
[link]

I ruin people's lives for fun, this is my story.

Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper.
High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party.
Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well.
That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home.
That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life.
My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home.
I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me.
I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation.
I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took.
Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired.
I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying:
Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake.
P.S: If you bring the police … the game ends differently. Not in your favor.
I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either.
I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it.
Chapter 2

submitted by idonthavemuchtime12 to mrcreeps [link] [comments]

Ethereum and Bisq

Hello all! This is a copy and paste reposting of something that I just now wrote about on the ethereum subreddit. As such it is mainly geared for an audience of regulars there, but my questions contained within also can fit into this subreddit, I think. My apologies for just copying and pasting, though.
Hello everyone, I am a (very) casual participant in crypto and I have a small amount of ethereum that is currently contained on a website account, and that I need to transfer to a wallet. After that, I then want to look at either selling the ethereum (or perhaps buying more) on Bisq. Some details:
(Forgive me if discussion and asking about Bisq is against the rules, here I used to frequent bitcoin and exchange talk is common there. I'm a newcomer for the most part to this subreddit. )
submitted by jimdexternjasper to bisq [link] [comments]

DONT LOSE YOUR TRX LIKE I DID😩

I wish I didn't do this mistake but I did, and even though nobody will blame anyone but me...
(I know I do for the most part, but I also partly blame Google)
You see I've been using tronlink in chrome for about a year now and I made around $130 from 20 dollars worth of bitcoin I got from coinbase earn program. AND I LOVE IT!
The only thing is the mnemonic keys that I struggle with, I used to store them on a USB, this wallet was no exception, recently I lost this USB due to becoming homeless for awhile and as stupid as I am I carried the USB in my jeans during a rainy winter. (My grandmother, mom and dad all offered me a place to stay so no worries guys) still had my old PC drive at my dad's house from selling it when I was tryna make some bank so I installed it a couple days ago and got back to grinding TRX, bought some BNKR daily+ and so on..
Anyways my girl was using my computer today for finding a part time since we both lost our jobs this year...
and signed in on her Gmail which made her gmail the standard gmail for the CHROME PROFILE(Note this!! Its the little circle next to the extensions in the chrome browser)
So I googled how to change this, I thought I would backup my private key once I was done, should've done it days ago but didn't think of it until today when she was messing around in my browser (Yes I got really nervous since she isn't very computer friendly 😂)
So I stumbled on Google's support tickets and a top answer told me to just delete the chrome profile and setup a new one since history and bookmarks would come back once I signed in...
(They didn't btw, you need sync activated for that, however when you remove the profile it doesn't say that, it just says that you can log on again and it comes back)
But here's where the warning comes in: IT ALSO REMOVES ALL EXTENSIONS! and it says itself that if you dont have your key you won't be getting your wallet back.
Some steps you can take to avoid this situation:
  1. Saving your key somewhere you can access it remotely, like in an email to yourself or in a private document on the cloud.
  2. If you're on windows backup the chrome "Users" folder in the appdata directory (a quick Google search will show you how)
  3. Turn on autobackup on your PC so you can revert the users folder if necessary.
  4. Write your key on a piece of paper and store it somewhere it won't move or be damaged, like a safe or with your mom like I did (she studied to be a lawyer so she's amazing with documents)
  5. Store your trx on binance so you can login using email and recover password if you lose your wallet.
Thanks for reading guys, if you wanna make my day you can donate anything to:
TPYLfp4Xv38Ji61uS2Cg9bV8p9fj1Wb1j8
TL;DR
If you remove your chrome profile on chrome and dont have a backup of anything you will lose your wallet! Your chrome profile is the circle next to the extensions in the chrome browser. (To be extra clear: its to the left of the three dots in the top right corner where you go to settings, history and stuff like that)
Thank you all for letting me be a part of this community and I promise I have 3 backups and stored my key in like 5 places so this won't happen again. I even made a backup of this post if I would accidentally close it 😂
Much love, peace! ❤
Edit: so I found the mnemonic phrases! Turns out I had them on my second drive aswell, but all it shows is 5 empty wallets, I've only had 3 wallets and I have 3 mnemonic phrases... what. The. ⁉️⁉️
submitted by TheRasmusHansson to Tronix [link] [comments]

I ruin people's lives for fun, this is my story.

Let me start by introducing myself, my name is Alex. I am 20 years old and clinically diagnosed with ASPD or Antisocial personality disorder. My diagnosis was given to me back in high school in my Junior year. It was pretty hard making friends or at least keeping them. You see when I try to make friends I usually only go into a relationship because of one thing; to get something in return. You could call it manipulating or deceiving people but, I don’t see it that way. I’ve had many therapists and physiatrists try to help me or figure out what’s wrong with me in the past but, I would just feed them the information they want to hear. Its pretty simple, give them all the shit they need to write down on their little piece of paper and it is music to their ears. Besides that, let us get to the story. Now you see the two key people back in high school were “Mike” and “Connor” and they were it. They had the girls, the popularity, the friends. They both were the biggest athletes in the entire school. This is important because I wanted that, but I couldn’t have it. Call it jealousy or whatever but, who wouldn’t want people to look up at you and have their names written in the daily paper.
High school was a bitch for me. I never had many friends or any real ones at least. I was known as the weird kid but, whatever right. Everyone says high school is tough for everyone. I believe it. Life gets back at people who deserve it though. Now Mike was the quarterback of the football team and he knew everyone and everyone knew him. I one day sent him a message on Snapchat and said: “Hey Mike, I know you don’t know me but, I think you’re a cool guy.” He then replied with “Who are you? Whatcha want dickhead?” I told him “Nothing much man, just thought we could be friends or something, we’re in the same Spanish class.” He said, “Oh, cool your that kid that sits in the back right?” I said, “Yeah, what are you doing?” He then said, “Nothing much man, listen I got a party next weekend with a free crib if you tryna come.” I then told him I’d let him know. This was perfect because I knew exactly what I would do. I planned on seeing Connor there with his girlfriend Liz. That was important because I hated seeing the way Connor would treat her. He just used her for sex and shit and never really respected her. I knew how I would fix that though, and it would be at that party.
Well, I got to the party and there were at least 50 kids there. I saw a couple of familiar faces but couldn’t care at all. I was there for one thing and one thing only. To ruin their relationship. Call me a dick but, he was way worse than me. I once saw Liz come into school with a bruise on her face and knew it was from him. I finally saw them out back near the pool. I had a plan. I would text Connor’s phone from a different number making it look like it was some other chick texting him and Liz would be right there to see it. I went outside and he was drinking, probably already drunk. I could see them from across the pool and haven’t seen Mike yet. I was about to text him and then Mike came up and tapped me on my shoulder with two drinks in his hand. He said “Yooo, Alex you came!” I laughed awkwardly and said, “Yeah man, wouldn’t miss it.” He said, “You want a drink?” Gesturing the second cup to me. I took it and said “Thanks, man.” He said, “I’ll see you around, there’s more beer in the kitchen.” He walked away and now I pulled my phone out. I went on to the app which I would text him from and texted: “Hey Connor, I had a really good night last night with a winkie emoji.” I then sent it waiting for Liz to look over his shoulder. She did and read the message. They started to argue and Liz poured his beer all over his face. My plan was working just right. I then saw Liz walk inside in a rush. I pretended to bump into her and said: “Oh my fault didn’t see you there.” She laughed and said, “Oh my god, it’s you, Alex.” I then laughed as well and said, “You good?” She replied with, “No actually, I just found out Connor was cheating on me with some slut.” I said “Oh, that blows … you want a ride home?” She said, “No I’m good, I’ll just have Grace drive me home.” I preceded with, “You sure, I live super close to here anyways, I was just about to go home too.” She said, “Ok, sure that’s fine.” I then got in my car and we started to talk. I said, “So, how’d you find out?” She said, “Some bitch texted him saying that they slept together last night.” I then said, “Damn, what’s your address by the way?” She then said something that surprised me. “I can’t go home like this, my moms gonna know I’m drunk and I’ll never be able to go out again.” I said, “Well, what you wanna do then?” She said, “Um, I don’t know .. we should go to a park.” I said, “Oh ok, what park?” She gave me the name and we went there. I parked my car in the parking lot and said: “Whatcha tryna do now?” She then said, “Shut up stupid.” Hushing my lips for me. We made out that night and I dropped her back off and went home as well.
That week in school I got a snap from Connor. It was during lunch and I clicked on it. I saw the five words that couldn’t make me happier: “I know what you did.” I replied with, “What? What did I do now?” He said, “you hooked up with Liz.” I left him on open and went about my day. I then saw him in the parking lot after school near my car. He came up to me and screamed in my face: “SO YOU THINK YOU CAN JUST STEAL MY GIRL WITHOUT ME DOING ANYTHING?” I laughed right in his face and said, “Well, she isn’t with you anymore now, is she?” He then yelled: “Well, you think you’re just going to go about your day or something?” I said laughing, “Yeah, I was planning on going to Liz’s house after school.” He then jumped on top of me pinning me to the ground, socking me right in the jaw multiple times. I tried throwing some back but, he had my hands pinned to my side. He got up and said, “Fuck with her again and you won’t be getting up.” I got up with my nose bleeding and got into my car and went home.
That was 2 years ago and boy have I got my revenge. Let me start by saying I have no regrets about what I did. Everything I had done was for my satisfaction. You see I don’t care who’s life I ruin … as long as I get something out of it. Connor graduated high school with not much going for him. He had a job at a car dealership as a mechanic or something like that and never went to college. I never went to college so I won’t judge but, I had other plans after high school. I wanted to ruin Connor’s life, and I never stopped until I completed that process. It started with pretty small things like when I tried ruining his relationship back in high school. He was always a dick and who better to fuck with then a worthless piece of shit like Connor. I messaged him a couple of months ago saying: “Hey old friend … remember me?” He replied with “Yeah, the kid I beat the shit out of … I remember you.” I knew he would say something like this so, I sent him a picture of myself and his sister I photoshopped to look as if we were together. He replied with, “What the hell are you doing with my sister … she doesn’t date weird fucks like you.” I replied with, “Oh well looks like her type changed?” I was just sitting on my computer laughing my ass off from how gullible this kid was. He then messaged his sister Claire, which I thought he would do. “Are you dating a kid named Alex?” I had hacked into her phone which was pretty easy because I sent her a phishing email that looked like a women’s clothing company that I knew she had an interest in because of her Facebook. She clicked it and it then downloaded a key logger onto her phone which would send anything that was on her phone to me directly. I override it and replied as her saying: “Haha, yeah … me and him just started talking.” Everything that was being sent right now would delete as soon as I exited the software. I then texted him saying, “Claire is one beautiful woman, kind of reminds me of Liz…” He then said, “You know you’re a real dick you know ….” I said, “Haha the one who beat the shit out of their girlfriend in highschool right … I’m the dick.” I then said, “Hey how’s life going for you ... washing people’s cars ….” He replied with “Fuck you man … go do something with your time.” I ended the conversation with “Ok bud, I’ll let you know how she is in bed…” Now, this was just the first thing I would do to fuck with Connor’s life. A couple google searches for his name and I now had his address … He was still living with his parents at the time. I then went ahead and waited for him to get done work to order a couple of pizzas to his house and make him pay for them. A couple I mean by ordering 20 pizzas all with extra toppings. That was definitely a pricy delivery. A total of $300 if you want to round up. I called in and said I would pay in cash and my name was Connor; I gave the lady on the phone his address and it was as easy as that. You might be asking why I care so much to fuck with someone’s life … It’s easy, I get joy out of it. You see these were the baby steps to ruin someone’s life.
My next attempt would be going to a personal level. Connor had a laptop at home and I went ahead and hacked it. It was easy knowing how stupid he was. He would fall for anything. So I sent him an email that led him to a link that would automatically download a fake porn movie. He would run the download and I would then have access to everything on his computer. Everything. I had every username and password of every website he used including bank accounts, emails, videogames, documents, social media, and much more. I also could see what he was doing by his webcam which he never turned off. He also had a new girlfriend at the time and her name was Jessica or Jess for short. I planned on ruining their relationship too. One night I logged into one of his bank accounts to see what his balance was … It was $1,243.50. So I went ahead and requested a withdrawal to a website that would transfer it into bitcoin. I requested $500 to see if it would work without causing any attention. The transfer went through and I now had $500 in bitcoin. I went ahead and logged out and disconnected my VPN. I also knew Connors social because he had everything saved on his laptop like his passport, birth certificate, and social security. The next morning I drove over to his house and waiting for him to leave for the morning. I watched him get into his car from a street over and pull out of his driveway. He then sped off to the local bank, I proceeded to follow. I guess he found out $500 had been withdrawn from his account. After he was done in the bank he drove to Dunkin donuts. I then thought of an idea as he was inside. I got out of my car in the same parking lot and went over to his car and took my pocket knife out. I flipped it open and sliced his back tire open. I quickly got back in my car which was parked on the other side of the parking lot and waited for him to come out. He was pissed. I could tell because he just stood there and looked around trying to find the person who had done it. I sat in my car looking at him just snickering to myself. I was getting so much joy from watching him in anger. He took his phone out and called someone. He got back in his car and just sat there. I then saw another car pull in the parking lot about 15 minutes later. It was Jess. She pulled in and parked next to Connor’s car. He got out and sat in the front seat of Jessica’s car. I could care less now to watch so I went out of the back entrance and went back home.
I went onto my computer when I got home to open the software to view Connor’s laptop. I had a feeling that the bank would have told him to look for spyware on his computer when he got home so I made sure to get on before he could. I went ahead and deleted every traceable script that was linking the laptop to the RAT. I had scripted another code to perform as a startup manager which looked like windows software. It wouldn’t be picked up by antivirus so I just copied the RAT onto my new script and loaded onto his laptop remotely. I then went ahead and logged back onto his bank account and it was frozen. I wasn’t surprised. I thought they would have done something like this. I had a backup plan though. I went ahead and logged into his iCloud with his username and password which was conveniently saved from google. I searched for “Wheres my iPhone” and found where Connor was. I saw that he was at some apartment complex not far from me so I left my house and went there. It was dark out at this point and he was inside Jessica’s apartment. I parked my car and got out to search for his car. I took my jacket with me and wrapped it around my hand. I found his shitty old Honda just sitting there with a popped tire still. I took my knife which had a glass breaker and put it right against his window. It then cracked and I hit that window as hard as I could with my hand wrapped in my jacket. It broke and glass was everywhere. His car alarm was going off at this point so I had to do what I did next very fast. I looked inside his glove compartment and found his registration and insurance papers. I stuffed them in my pockets and looked through the center console. I found his wallet and a couple of condoms. I took his wallet and got the hell out of there. I sped out of the apartment complex and went back home fast, hoping no cops would see me.
I got back inside my house and looked inside Connor’s wallet. It had about $40 in cash and a little baggie of weed. There were credit cards in there as well. I had a perfect idea. I went onto a proxy and searched for the same bitcoin website I had recently been on. I went ahead and bought approximately $4,500 worth in bitcoin from every single credit card Connor had. I knew that this would destroy his credit score. I knew he wouldn’t be able to get an apartment with bad credit but, he was still living with his mom anyways. I now had extra resources to destroy Connor’s life. I knew that Connor wouldn’t be able to fix that broken window and most definitely wouldn’t be able to drive to work now because all of his papers to legally drive were now in my possession including his driver’s license. He had no money. I needed to move on with my next step to remove Jess from the equation.
I need to find a flaw in their relationship or something to exploit. I went ahead and completed my research on Jessica. Before I go on, I need to mention that Connor had now pulled the police into this. The bank and the police were now going to try and find out who had been messing with him. They won’t be able to find a link between the two. I know this for sure. Although knowing the police are involved it just made this game more fun. I like the attention that I am causing. Let me get back to what I had found on Jessica. What do you know? She was fucking with another dude. How do I know this you might ask? Well, I went ahead and looked around her Facebook and Instagram followers looking at mostly male followers. I ran a program that looked through her direct messages and found an account of another guy in the area. It looks like they went to the same high school. I looked through the messages and they were all flirts back and forth and she finally told him to message her on Snapchat. I, unfortunately, do not have access at this moment to look into her Snapchat messages but this is enough for now. I went ahead and took some screenshots of the messages and spoofed a text message to her saying “Looks like you got a little problem here don’t you?” Attaching the screenshots. She replied saying, “Who are you??? What do you want??” I simply replied back with “Oh nothing much, just pick who you want to keep … Connor is a dick anyway.” She replied, “You have no business in this … how did you even get into my messages?” I then said, “Don’t worry about it Jess, just tell Connor you guys aren’t working out anymore… and you won’t hear from me again.” A simple blackmail is all it took.
Guess he wasn’t really worth it. Never knew how to treat a woman right anyways. Now that Jess was out of the equation I could go ahead and proceed with ruining his life. I went ahead and called into his work. A lady picked up “Hello, [Name of car dealership] this is Lisa speaking, How may I help you?” I went ahead and said, “Ah yes, I recently had my car worked on here and I would like to make a complaint against one of your workers…” She replied with “Ok sir, and do you know the name of the employee?” I said, “Yes I do, Connor [last name]. I saw a scratch on the back of my car which looked like a key or something pulled the paint off. I saw this as soon as I got home from getting my car maintained on.” She said, “Ok sir, I will go ahead and mark down your complaint and we will handle it accordingly… if you would like you could come back so we can get more info from you and we could have someone take a look at the damage?’ I said, “No that won’t be necessary after what you guys have already done, thanks.” I then hung up the phone. I know that this will most definitely get him fired.
I called him a couple of days after this with a masked voice from software that changed my voice. He picked up and I said, “How’s life been? … Shitty let me guess.” He replied with “Can I ask who the fuck is calling? And why do you care how my life’s been?” I said “Maybe this would help … you missing that $4,500? … Lifes a bitch isn’t it.” He said, “You’re going to be arrested for stealing that money .. the police are looking into it.” I said “Oh, Connor I already know that … I’m three steps ahead of them already. I mean I guess Jess doesn’t want to date poor guys huh?” He said, “How the hell do you even know me … what do you want from me?” I said, “Connor go outside there’s a package for you and maybe a couple of your answers will be in there.” I hung up. Before calling him I made sure that a package with nothing except a USB was in there. It was meant to be plugged in and it would be erased within 1 hour of opening the contents … the contents were a txt file with the title of README.txt. It wasn’t a virus or anything it was just a document meant to be read. Once opened it would have a paragraph saying:
Hello Connor, the man that you were just speaking with knows everything about you and will not hurt you. You are playing the game of life. Its simple. You are a pawn in my game. I pick and choose what you do and how you do it. You may not see it but, everything that has been going on in your life the last couple of months has been of my choosing. I’ve been in the process of taking little bits of your life away. One by one. You see it all started back in high school when I took your little girlfriend away. I made her think you cheated on her. Easy. My next step would be to take away all of your money. Poof just like magic. All gone. Your credit is down the drain. The second step was to take away your transportation. No way to drive without any money. The broken window doesn’t help either. Or maybe no driver’s license. I then took your love life away. Jessica is no longer in your life. Well, maybe you might just go back to work to make more money …. Wrong you see. You no longer have a job. Don’t bother going in tomorrow because there was a report of you “damaging” a customer’s car. You may be reading this pretty upset because you have no way of fighting back. Well, that’s where I come in. I will give you a chance. In order to stop playing my game, I will send you an address and all you have to do is show up. Sounds easy? I hope so, for your own sake.
P.S: If you bring the police … the game ends differently. Not in your favor.
I was almost finished with Connor. I needed to do one more thing before I send him the address. I was never going to let him have an easy way out, no. I planned to make him go to a park that was at least an hour out of the direction. This would be a diversion away from his house so I could carry out my plan. I had recently bought with “Connors” money from the $4,500 that I converted into bitcoin approximately 4 kilos of crack cocaine. It would ship domestically so it wouldn’t be searched by customs. I then planned on having it shipped to a nearby drop zone which was an abandoned factory outside of town. I then would take this and put it into a backpack without putting my fingerprints on it. I then also had a USB that would boot up into the dark web which had all of Connors’s personal info like it was his. I also made the password his most commonly used password for the USB. This would link directly back to Connors’s local IP address which I had set onto the USB. I also remotely bought the drugs with Connors’s laptop. My plan here would be to send in an anonymous tip from a payphone to the local police station that there was a large package of crack cocaine shipped to Connors’s address. I also planted the baggie of weed which had Connors fingerprints on them in the back porch of his house. This would give the police probable cause to search the house for drugs. I would assume that they would have already brought a warrant but, just in case I had done that for precautionary reasons. This all would happen tonight. This is when I would successfully ruin Connor’s life. I would send him to prison for years. He would be sentenced with multiple felonies of drug possession and intent to sell. The large quantity that he would be possessing would give him no parol either.
I had the vendor on the dark web pack baggies of grams pre-bagged and one large quantity as well. This would give him the charge of intent to sell as well. The investigation would come down to that he purchased them from his laptop with his credit cards. Nothing would be traced back to me. I made sure of this because I had corrupted all of my hard drives back at home by microwaving them. There was no personal connection to Connor with me. So, I would not be looked into. I was just a kid from his high school with a thousand other students. I had no connection to anyone in his family either. I went ahead and sent him the name of the park through a random phone number I generated and said, “Connor you have 90 minutes to be here, or the game continues.” I was outside his house a street over waiting for him to leave. I saw him leave which was around 12:30 am and everyone was asleep in his house. I set a timer on my phone for an hour which was my time to plant everything and get out before Connor was home. I then went to his back porch and planted the baggie of weed at his bedroom window. He was stupid enough to leave his window open and I opened it and went inside his room. I had gloves on at this point before I left my car. I dropped the backpack inside his closet and plugged in the USB that I had prepared into his laptop which was sitting on his desk. I then left through his window locking it before stepping out. I made sure the weed was sitting nicely on the outside of his window. I then walked back to my car. I checked the timer on my phone and it was at 35 minutes. I knew he would be at the park before the timer was up. I went to a closed parking lot that I scoped out before planting the evidence which had a payphone. I called in and said, “392 [Street] there is a large number of drugs which is owned by Connor [last name]. I am sending this tip in and would like to keep it anonymous for my safety.” I hung up and left the parking lot immediately. On my way back home I got a text from Connor replying with “I’m here … what do you want me to do to end this stupid game?” I replied with “It easy … take your phone and throw it into the lake … You will receive your money back after this last task is done.” He said, “How do I know you’re going to follow through on your end?” I said, “If you don’t do it, you don’t get your money …you are a player of my game remember, you follow my rules and you can win.” I then sent another message saying, “Tomorrow check the balance of your bank, and all the money will be back where it rightfully belongs. Goodbye now.” This would be the last step in covering up everything I had messaged him. He is just playing every card I told him without even knowing. I then called the phone 5 minutes later to see if it connected me through. I called and it said, “The phone number you’ve dialed is no longer in service … please call back later.” My plan was now complete and Connor will be arrested within the hour. I got home and went to sleep without a problem. I woke up the next morning and turned the news on. The headline was “Breaking News: Man in local [county] was arrested last night for drug trafficking.” This was music to my ears hearing the lady speak about the details of the arrest and hearing her say Connor’s name. She said it like he was some criminal and boy did I love that. I looked up the details of the arrest on google and clicked on the first link. [Connor ****** arrested last night for drug traffiking] I saw his mug shot and it said under it that he could be sentenced up to 25 years and up to $20,000 in fines for intent to sell crack cocaine. This was the end of Connor’s free life. He was now a convicted felon and would never have his original life back. My game was now completed and he was the pawn to complete it.
Chapter 2
submitted by idonthavemuchtime12 to creepypasta [link] [comments]

How Ransomware Encryption Happens & 4 Methods for Recovery

We know how overwhelming it can feel to be the victim of a ransomware attack and how your business cannot operate due encrypted or locked files. This page delivers insight on why your files were encrypted or locked, and the options you have to decrypt ransomware. As a ransomware recovery service provider, we have helped thousands of clients successfully recover their data and decrypt their data.
Evaluating all options will include analyzing the encrypted files, and the least desirable option to pay the ransom demand if necessary. Our process helps provide critical insight into decrypting ransomware and the available options that clients have.
By the end of this piece, it is our goal to show you what is involved to successfully recover your files. This guide outlines what steps and research are necessary to decrypt or unlock your files from a ransomware attack.

You’re the victim of a ransomware attack

You arrive to work and start noticing suspicious alerts coming from your servers, and none of the databases are functional. Your co-workers are frantic and cannot access any of their data. You investigate further and find all of the files on your network are renamed and discover ransom notes, and a screen asking you to email someone if you want your data back. You finally realize that you are a victim of a ransomware attack, and all of your files are locked or encrypted.

3 Common Ways Your Files Were Encrypted or Locked

Ransomware succeeds when businesses have poor security hygiene. Organizations that lack policies & procedures around data security will have a higher risk of ransomware attacks. Here are some of the most common ways to fall victim to a ransomware attack:

Open Remote Desktop Protocol Ports (RDP)

Businesses that have improperly configured network security may leave their Remote Desktop Protocol (RDP) ports open. Unknowingly, this is the equivalent of leaving the front door unlocked when you leave your home: it provides an opportunity for cyber attacks to come through with little deterrence.
Once a hacker is connected to your network, they can install ransomware and additional back doors to access your network at a later date. A large percentage of ransomware attacks still use this method of attack because so many organizations are not even aware of this security vulnerability.

Phishing Attacks

Ransomware can infiltrate your network by a malicious email campaign known as a phishing attack. Ransomware operators use massive networks of internet-connected devices (botnets) to send phishing emails to unsuspecting victims. These emails intend to trick the receiver into clicking on a malicious attachment or link, which can secretly install the ransomware virus or other malware.
Phishing emails are becoming increasingly difficult to detect as cybercriminals find clever ways to make a malicious email look legitimate. This underscores the importance of security awareness training for everyone in the organization, not just the I.T. department.

Compromised Passwords

The ransomware operators may have used previously compromised passwords from employees at your organization to gain unauthorized access to the networks. This derives from the poor security practices of reusing the same passwords for multiple accounts and authentication processes.
If your employees have been using old & weak passwords to access your business data, a cyber criminal can use a previously compromised password to initiate the attack. Remember to always to follow good password hygiene.
The variety of attack vectors highlights the importance of a digital forensics investigation that can help victims understand how the ransomware came onto your computer and what steps you can take to remediate the vulnerability.

4 Options for Ransomware Recovery

In this section, we cover the options to restore files encrypted or locked by ransomware.

1. Recover files with a backup

If your files become encrypted in a ransomware attack, check to see if you have backups to restore and recover (in order).

2. Recreate the data

Even though your files are encrypted by ransomware, you might be able to recreate the data from a variety of sources as outlined below:

3. Breaking the ransomware encryption

The harsh truth is that the majority of ransomware encryption is unbreakable. This impossibility is a tough concept for many of us to accept, given the technological advances of our society.
Does this mean you should skip looking into whether the ransomware encryption can be broken? This option should always be explored if presented by a ransomware recovery firm, although the final choice is yours to make. We will lay out a real life example at Proven Data below to outline why this was a great decision for a company that was infected with ransomware.
While it tends to be rare, there are poorly constructed ransomware encryptions that have been broken by security researchers. If you can avoid paying a ransom, you should at all costs.
There can be flaws in the malware or weaknesses in the encryption. Businesses can look at these options, especially if time is on your side. There are also free ransomware decryption resources that provide tools for previously decrypted ransomware variants. A client of ours had hired a ransomware recovery company to recover their files until we discovered at the very last moment through our analysis that the encryption was breakable. With less than 20 minutes to spare, we saved the client out of paying a $450,000 ransom.

Why can’t most ransomware encryption be broken?

Ransomware is a cryptovirus, which means it uses cryptography in combination with malware to lock your files. Modern cryptography uses sophisticated mathematical equations (algorithms) and secret keys to encrypt and decrypt data. If strong encryption is used, it can take thousands, if not millions of years to break the encryption given the strength of today’s computers.
Encryption is a security tool created with the intent of data protection. It is a defensive tool to provide security, privacy, and authentication. Sadly, ransomware attackers are using it as a weapon against innocent victims.

How do I know if the encryption can be broken?

You can start off with this free ransomware identification resource to determine the feasibility of decryption. You will need to upload the ransom note and a sample file into the ID-Ransomware website, and it will tell you if there is a free decrypter or if it is an unknown ransomware variant. Please note that the tool is not always 100% accurate. If the variant is still under analysis, you will need a malware or encryption analyst to determine whether or not there is a possibility for decryption.
Encryption is designed to be unbreakable, which is why security researchers can’t simply make a tool for ransomware decryption. These unbreakable encryptions protect our bank accounts, trade secrets, government data, and mobile communications, among other things. It would be a significant security concern if there were a master decryption tool that could break encryption algorithms.

4. Paying the ransom to decrypt ransomware files

If the encryption is too strong, the only way to obtain the decryption key for your files is to pay the ransom. Many ransomware victims don’t have time on their side because they are facing significant business disruption. Each minute that passes could be a lost client, or worse for a medical organization.
Here is a list of the most prevalent ransomware variants that are known to be “cryptographically secure,” which means that Proven Data or the security community has confirmed the encryption is unbreakable:

I don’t want to pay the hackers ransom.

Businesses and individuals have the option of choosing not to pay the ransom in a ransomware attack to regain access to their files. For personal, political, or moral reasons, there has been resentment of the ransomware economy, and victims do not have to engage in extortion. If paying the ransom is the only option, you should know what to expect before considering moving forward.

How a ransomware recovery specialist can help

If you do decide to use a ransomware recovery company and if there is one thing you get out of this article, it is this: You should always question how a ransomware recovery company is recovering your data. If you are unsure, asking the right questions will ensure a transparent experience:
A ransomware recovery specialist can analyze your current situation and determine what options are available to you at the time of the inquiry. A competent and experienced ransomware recovery company should be able to provide the following:
Understanding how your files were affected by ransomware in the first place will provide you with the insight needed to prevent another attack. Whether you choose Proven Data or another company to decrypt your ransomware files, it’s important to know what unknowns there may be out there.
Our threat intelligence that we’ve gathered from the thousands of previous cases enable you to make informed decisions in helping restore your data after a ransomware attack. If you require a company with such experience, we’re standing by to assist 24/7.
submitted by Proven_Data to u/Proven_Data [link] [comments]

Groestlcoin 6th Anniversary Release

Introduction

Dear Groestlers, it goes without saying that 2020 has been a difficult time for millions of people worldwide. The groestlcoin team would like to take this opportunity to wish everyone our best to everyone coping with the direct and indirect effects of COVID-19. Let it bring out the best in us all and show that collectively, we can conquer anything.
The centralised banks and our national governments are facing unprecedented times with interest rates worldwide dropping to record lows in places. Rest assured that this can only strengthen the fundamentals of all decentralised cryptocurrencies and the vision that was seeded with Satoshi's Bitcoin whitepaper over 10 years ago. Despite everything that has been thrown at us this year, the show must go on and the team will still progress and advance to continue the momentum that we have developed over the past 6 years.
In addition to this, we'd like to remind you all that this is Groestlcoin's 6th Birthday release! In terms of price there have been some crazy highs and lows over the years (with highs of around $2.60 and lows of $0.000077!), but in terms of value– Groestlcoin just keeps getting more valuable! In these uncertain times, one thing remains clear – Groestlcoin will keep going and keep innovating regardless. On with what has been worked on and completed over the past few months.

UPDATED - Groestlcoin Core 2.18.2

This is a major release of Groestlcoin Core with many protocol level improvements and code optimizations, featuring the technical equivalent of Bitcoin v0.18.2 but with Groestlcoin-specific patches. On a general level, most of what is new is a new 'Groestlcoin-wallet' tool which is now distributed alongside Groestlcoin Core's other executables.
NOTE: The 'Account' API has been removed from this version which was typically used in some tip bots. Please ensure you check the release notes from 2.17.2 for details on replacing this functionality.

How to Upgrade?

Windows
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), then run the installer.
OSX
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes for older versions), run the dmg and drag Groestlcoin Core to Applications.
Ubuntu
http://groestlcoin.org/forum/index.php?topic=441.0

Other Linux

http://groestlcoin.org/forum/index.php?topic=97.0

Download

Download the Windows Installer (64 bit) here
Download the Windows Installer (32 bit) here
Download the Windows binaries (64 bit) here
Download the Windows binaries (32 bit) here
Download the OSX Installer here
Download the OSX binaries here
Download the Linux binaries (64 bit) here
Download the Linux binaries (32 bit) here
Download the ARM Linux binaries (64 bit) here
Download the ARM Linux binaries (32 bit) here

Source

ALL NEW - Groestlcoin Moonshine iOS/Android Wallet

Built with React Native, Moonshine utilizes Electrum-GRS's JSON-RPC methods to interact with the Groestlcoin network.
GRS Moonshine's intended use is as a hot wallet. Meaning, your keys are only as safe as the device you install this wallet on. As with any hot wallet, please ensure that you keep only a small, responsible amount of Groestlcoin on it at any given time.

Features

Download

iOS
Android

Source

ALL NEW! – HODL GRS Android Wallet

HODL GRS connects directly to the Groestlcoin network using SPV mode and doesn't rely on servers that can be hacked or disabled.
HODL GRS utilizes AES hardware encryption, app sandboxing, and the latest security features to protect users from malware, browser security holes, and even physical theft. Private keys are stored only in the secure enclave of the user's phone, inaccessible to anyone other than the user.
Simplicity and ease-of-use is the core design principle of HODL GRS. A simple recovery phrase (which we call a Backup Recovery Key) is all that is needed to restore the user's wallet if they ever lose or replace their device. HODL GRS is deterministic, which means the user's balance and transaction history can be recovered just from the backup recovery key.

Features

Download

Main Release (Main Net)
Testnet Release

Source

ALL NEW! – GroestlcoinSeed Savior

Groestlcoin Seed Savior is a tool for recovering BIP39 seed phrases.
This tool is meant to help users with recovering a slightly incorrect Groestlcoin mnemonic phrase (AKA backup or seed). You can enter an existing BIP39 mnemonic and get derived addresses in various formats.
To find out if one of the suggested addresses is the right one, you can click on the suggested address to check the address' transaction history on a block explorer.

Features

Live Version (Not Recommended)

https://www.groestlcoin.org/recovery/

Download

https://github.com/Groestlcoin/mnemonic-recovery/archive/master.zip

Source

ALL NEW! – Vanity Search Vanity Address Generator

NOTE: NVidia GPU or any CPU only. AMD graphics cards will not work with this address generator.
VanitySearch is a command-line Segwit-capable vanity Groestlcoin address generator. Add unique flair when you tell people to send Groestlcoin. Alternatively, VanitySearch can be used to generate random addresses offline.
If you're tired of the random, cryptic addresses generated by regular groestlcoin clients, then VanitySearch is the right choice for you to create a more personalized address.
VanitySearch is a groestlcoin address prefix finder. If you want to generate safe private keys, use the -s option to enter your passphrase which will be used for generating a base key as for BIP38 standard (VanitySearch.exe -s "My PassPhrase" FXPref). You can also use VanitySearch.exe -ps "My PassPhrase" which will add a crypto secure seed to your passphrase.
VanitySearch may not compute a good grid size for your GPU, so try different values using -g option in order to get the best performances. If you want to use GPUs and CPUs together, you may have best performances by keeping one CPU core for handling GPU(s)/CPU exchanges (use -t option to set the number of CPU threads).

Features

Usage

https://github.com/Groestlcoin/VanitySearch#usage

Download

Source

ALL NEW! – Groestlcoin EasyVanity 2020

Groestlcoin EasyVanity 2020 is a windows app built from the ground-up and makes it easier than ever before to create your very own bespoke bech32 address(es) when whilst not connected to the internet.
If you're tired of the random, cryptic bech32 addresses generated by regular Groestlcoin clients, then Groestlcoin EasyVanity2020 is the right choice for you to create a more personalised bech32 address. This 2020 version uses the new VanitySearch to generate not only legacy addresses (F prefix) but also Bech32 addresses (grs1 prefix).

Features

Download

Source

Remastered! – Groestlcoin WPF Desktop Wallet (v2.19.0.18)

Groestlcoin WPF is an alternative full node client with optional lightweight 'thin-client' mode based on WPF. Windows Presentation Foundation (WPF) is one of Microsoft's latest approaches to a GUI framework, used with the .NET framework. Its main advantages over the original Groestlcoin client include support for exporting blockchain.dat and including a lite wallet mode.
This wallet was previously deprecated but has been brought back to life with modern standards.

Features

Remastered Improvements

Download

Source

ALL NEW! – BIP39 Key Tool

Groestlcoin BIP39 Key Tool is a GUI interface for generating Groestlcoin public and private keys. It is a standalone tool which can be used offline.

Features

Download

Windows
Linux :
 pip3 install -r requirements.txt python3 bip39\_gui.py 

Source

ALL NEW! – Electrum Personal Server

Groestlcoin Electrum Personal Server aims to make using Electrum Groestlcoin wallet more secure and more private. It makes it easy to connect your Electrum-GRS wallet to your own full node.
It is an implementation of the Electrum-grs server protocol which fulfils the specific need of using the Electrum-grs wallet backed by a full node, but without the heavyweight server backend, for a single user. It allows the user to benefit from all Groestlcoin Core's resource-saving features like pruning, blocks only and disabled txindex. All Electrum-GRS's feature-richness like hardware wallet integration, multi-signature wallets, offline signing, seed recovery phrases, coin control and so on can still be used, but connected only to the user's own full node.
Full node wallets are important in Groestlcoin because they are a big part of what makes the system be trust-less. No longer do people have to trust a financial institution like a bank or PayPal, they can run software on their own computers. If Groestlcoin is digital gold, then a full node wallet is your own personal goldsmith who checks for you that received payments are genuine.
Full node wallets are also important for privacy. Using Electrum-GRS under default configuration requires it to send (hashes of) all your Groestlcoin addresses to some server. That server can then easily spy on your transactions. Full node wallets like Groestlcoin Electrum Personal Server would download the entire blockchain and scan it for the user's own addresses, and therefore don't reveal to anyone else which Groestlcoin addresses they are interested in.
Groestlcoin Electrum Personal Server can also broadcast transactions through Tor which improves privacy by resisting traffic analysis for broadcasted transactions which can link the IP address of the user to the transaction. If enabled this would happen transparently whenever the user simply clicks "Send" on a transaction in Electrum-grs wallet.
Note: Currently Groestlcoin Electrum Personal Server can only accept one connection at a time.

Features

Download

Windows
Linux / OSX (Instructions)

Source

UPDATED – Android Wallet 7.38.1 - Main Net + Test Net

The app allows you to send and receive Groestlcoin on your device using QR codes and URI links.
When using this app, please back up your wallet and email them to yourself! This will save your wallet in a password protected file. Then your coins can be retrieved even if you lose your phone.

Changes

Download

Main Net
Main Net (FDroid)
Test Net

Source

UPDATED – Groestlcoin Sentinel 3.5.06 (Android)

Groestlcoin Sentinel is a great solution for anyone who wants the convenience and utility of a hot wallet for receiving payments directly into their cold storage (or hardware wallets).
Sentinel accepts XPUB's, YPUB'S, ZPUB's and individual Groestlcoin address. Once added you will be able to view balances, view transactions, and (in the case of XPUB's, YPUB's and ZPUB's) deterministically generate addresses for that wallet.
Groestlcoin Sentinel is a fork of Groestlcoin Samourai Wallet with all spending and transaction building code removed.

Changes

Download

Source

UPDATED – P2Pool Test Net

Changes

Download

Pre-Hosted Testnet P2Pool is available via http://testp2pool.groestlcoin.org:21330/static/

Source

submitted by Yokomoko_Saleen to groestlcoin [link] [comments]

Please help me figure out what's going on with my electrum wallet.

So today I purchased about $300 worth of BTC using the iOS coinbase app. Immediately afterward, I sent it over to my electrum wallet on my windows computer by scanning the QR code on the receive tab. Usually when I send BTC to my wallet, I get a notification immediately about a new transaction, and the receiving address turns red. This did not happen this time, which was already cause for concern.
I decided to check my BTC address on a blockchain explorer, and it showed one input, and two outputs (one of which was my transaction.) It showed no confirmations. After seeing this, I decided to check electrum again to see if my deposit had shown up yet. It didnt, and now it's just stuck saying "synchronizing." I went to the electrum file on my computer and clicked on "electrum.3.3.8.exe" hoping to open another window of electrum to see if it would synchronize. Nothing happened aside from my already open window of electrum flashing yellow. Now I have a window open on my computer that is the electrum installer. How that happened, I dont even know.
All I've done is create a wallet backup in the files of my computer in case anything happens. I really don't know what to do from here. I literally cannot afford to lose this bitcoin. It was all the money I had. Is it gone forever? Someone please help me figure this out.
submitted by christiyc to BitcoinBeginners [link] [comments]

Verify Electrum Wallet GPG and Download Signature on MacOS Mojave?

A couple years ago, back when Bitcoin and Bitcoin Cash split, I moved my paltry amount of bitcoins into an electrum wallet on my windows machine. That machine has since had a complete death due to overheating, but I had multiple backups of the wallet generating pass phrase so in theory I should be able to access my wallet through Electrum on a different machine. I now have another machine running Mojave, and I want to verify the GPG signature before installing Electrum from the downloadable binary.
Unfortunately, I don't know how to do this and copy-pasting the commands listed in the documentation doesn't do anything because bash can't find the gpg command: https://electrum.readthedocs.io/en/latest/gpg-check.html
I'm at a loss as to how to proceed. I found a tutorial here: https://bitzuma.com/posts/how-to-verify-an-electrum-download-on-mac/ that is a little involved, but it is from 2017 and I'm not sure if it's still up to date.
Edit: For posterity, I used these two sets of instructions to get things properly set up and verified: https://bitzuma.com/posts/how-to-verify-an-electrum-download-on-mac/ , and https://electrum.readthedocs.io/en/latest/gpg-check.html
submitted by Mothman394 to Electrum [link] [comments]

Beware of Lab Bot Data Storage Hackers Scam - A Fake Lab Bet Hack Extortion

Beware of Lab Bot Data Storage Hackers Scam - A Fake Lab Bet Hack Extortion
If you have recently got the extortion emails or messages about "Lab Bot Email", "Data Storage Hackers", "Lab Bot Hack", "Lab Bet Hack" or "Lab Bot Hackers", then you no need to worry, they haven't hacked your anything, it's a just fake extortion sent by scammers to trick you into sending them money. Actually, extortion itself is a criminal activity but we don't know how to categorize those who send fake extortion. So, yes, definitely, Lab Bot Hack messages as shown in the examples below is a scam.

Examples of scam messages: Lab Bot Hackers or Data Storage Hackers:-

"Please do not ignore this message, as it refers to your account (your email address) and cloud storage.
We are a group of data storage hackers.
If you receive this message, we've already hack you.
We are software developers (Login And Backup or often called LAB Bot).
Frequently asked questions (FAQs)
Q: What Is the LAB Bot?
A: LAB is an automated application made by Bot using a special API request; the API can download all the data or files that are related to your cloud storage and send it to our server automatically via hacked email access.
Q: Definitely, you'll think this is impossible!
A: Smartphones, Apple, Windows, etc. All have cloud storage data. Like Google with Gdrive, Microsoft with OneDrive, Apple with iCloud, and all cloud storage directly connected to an email account.
D: Why should you care about LAB Bot?
A: Lab Bot is automatically configured and has a five day grace period. On the fifth day, Lab Bot will accomplish its final task.
i.e., share backup data downloaded to the darknet forum publicly or to e-mail correspondence, contacts, social network, co-worker. (You certainly didn't want everyone to see or know your private files (documents, nude photos, hot videos, or others).
Precisely what should you do?
To prevent all of this thing from happening, you need to send Bitcoin with the amount of 0.22034 Bitcoin - to my bitcoin wallet address. (if you didn't know this, search 'how to buy bitcoin' on Google.)
BTC address:
Scan the QR code with your phone to get the address.
So, to stop the LAB Bot process, it's only in one way; "make payments through Bitcoin in the amount of 0,22034 Bitcoin". You have five days to make a payment, and the time will start when this message opened; LAB Bot will know if you've already read the letter because it uses e-mail trackers."

To find out more details and additional examples of these kinds of phishing messages, please click this link:- https://www.newsonlineincome.com/lab-bot-email-hack-scam/

Beware of Lab Bet Hackers or Lab Bot Hackers or Data Storage Hackers phishing emails
submitted by NewsOnlineIncome to u/NewsOnlineIncome [link] [comments]

Best Ethereum Wallets

Best Ethereum Wallets
When you start using cryptocurrency the number one problem is to find a secure wallet. In this article, we will introduce the most popular Ethereum wallets.

Hardware Wallets

We start with hardware wallets. These wallets provide offline storage for cryptocurrency. This kind of Ethereum wallet is considered to be the most secure.
https://preview.redd.it/86nocaff0mh31.jpg?width=720&format=pjpg&auto=webp&s=7a6d4e9a4ef9945eec416583d487e5553c4377e9

  • Trezor
Originally Trezor was developed for Bitcoin. Now it supports more different cryptocurrencies including Ethereum. This ETH wallet will work in tandem with your MyEtherWallet.Trezor is famous for the features that make it very secure. It provides 2-factor authentication, advanced cryptography and the opportunity to check transaction details before you confirm.
On the other hand, there are a couple of disadvantages. Such as the cost: the Trezor wallet is pretty expensive. If you are not a regular user you probably should consider cheaper wallets. Also, it takes time to access your holdings with this wallet.Thus using Trezor as Ethereum wallet may be a little inconvenient if you are a common user.

  • Ledger Nano S
Ledger Nano S is also a hardware wallet. It connects with any computers via USB. The most important feature of this wallet is security. As well as Trezor it provides 2-factor authentication. Aside from this, this Ethereum wallet has a PIN code to secure the device itself and also you can back up your account on the recovery sheet. Ledger Nano S gives users an opportunity to check details of transactions before the confirmation.
The main disadvantage of the Ledger Nano S wallet is the price. It is cheaper than Trezor, but it is still pricey.

  • KeepKey
KeepKey is a hierarchical deterministic (HD) wallet. It is also in the group of hardware wallets. KeepKey supports a lot of cryptocurrencies.The fact that this is an HD wallet allows users to generate private keys in an unlimited quantity. Undoubtedly this adds to the security level. Moreover, with the help of this device, you review and confirm every transaction. You can also set up a PIN code and a recovery sentence to make sure your holdings are secured enough.
It is easy to start using the KeepKey wallet. You need to download a couple of applications. One is to create a wallet. And with the help of the second one, you will be able to connect to KeepKey through Chrome.
Talking about the disadvantages we should mention the price. It is one of the most expensive wallets on the market to use it as ETH wallet.

Web Wallets

The great thing about web wallets is that you can easily access them. All you need is an internet connection.

  • MyEtherWallet
Unlike the most part of hardware wallets, MyEtherWallet is free. Nonetheless, it provides a high level of security by allowing users to store their keys on their own computers. There is no necessity to give any private information when creating a wallet.This Ethereum wallet interrogates with some hardware wallets such as Ledger Nano S and Trezor. Also, this platform gives an opportunity to write smart contracts.
In addition, MyEtherWallet provides automatic back up. So users should not remember about this by themselves.Moreover, it’s possible to get a paper Ethereum wallet by going to the “Wallet Info” section.
https://preview.redd.it/j7wzg5ki0mh31.png?width=1088&format=png&auto=webp&s=41383744e961877ba6acbf128be7fdcb2f4baf77

  • Coinbase
First of all, Coinbase is an exchange platform. Usually, it is not recommended to store cryptocurrency on the stock platforms. But Coinbase is often considered to be an exception. This platform has a wallet that is suitable for use as ETH wallet. It is easy to use and has an intuitive interface.
One of the major drawbacks of this wallet is that users don’t control their private keys.

  • MetaMask
MetaMask is not just a popular Ethereum wallet. It is a browser extension. It can be installed on a number of browsers such as Chrome, Firefox, and Opera. This form allows accessing your holdings easily.The good thing is that you don’t need to provide personal information for the registration. Also, there is an opportunity to store the private key on your computer.

Desktop Wallets

There are wallets that are made in the form of a software program. They can be installed on your device. Such wallets are called Desktop Wallets.The security level of these wallets is not as good as of hardware ones.

  • Exodus
Exodus is a multicurrency wallet. So it can become your ETH wallet.It is famous for its user-friendly interface. It is a good wallet for those who only start their journey into the cryptocurrency world. Exodus supports ERC20 tokens.Users store their private keys on their computers. This increases the security level. Exodus has a backup feature.
The drawbacks of Exodus are that there is no possibility to add any custom tokens and a small list of ERC20 tokens.

  • Atomic Wallet
Atomic Wallet has a very convenient interface which is suitable even for the beginners. It supports Ethereum and all the ERC20 tokens.The wallet supports atomic swaps. So you can not only have one wallet for Ethereum and all the ERC20 tokens but also exchange them with another user.
Unfortunately, it doesn’t have a hardware wallet yet. So the level of security may not be very high.

https://preview.redd.it/e13whvvl0mh31.png?width=1024&format=png&auto=webp&s=8ee93d65adfcee76b0f8043c6ae1e4c022c16c0b

  • Mist
Mist is the official Ethereum wallet. So it is a full node wallet. Full node wallet downloads the whole Ethereum blockchain on users’ computers. In other words, it downloads all the data about the ETH network. This type of wallet makes any user a full-fledged member of the blockchain.
Mist has developed the way to allow users to interact with their ETH storage easily. It is free. Users don’t provide private information during the process of registration. The only way to access your wallet is to use a password. Your private keys are stored on your computer.The Mist wallet supports smart contracts.

Mobile Wallets

Sometimes it is more convenient to use a mobile wallet, which can be installed on your mobile devices. This type of wallets provides quicker access to your storage wherever you are. Mobile wallets are easier to use than desktop ones, but it is riskier.

  • Jaxx Liberty
Jaxx is free. It supports a lot of cryptocurrencies including ETH. It can work on different platforms such as Linux, Windows, and OSX. There is also an extension for Chrome browser. The interface of Jaxx wallet is simple and good to use.
However, the security of this wallet raises some questions.

  • Coinomi
Coinomi is an Android app. It is easy to use and supports a wide range of cryptocurrencies. With this wallet, you don’t have to think about backup. Coinomi has a feature that helps you to keep all the information. It is secure enough. Your private keys are nowhere but on your device. Coinomi protects the user’s identity when they sign up.
Unfortunately, so far there is only an app for Android.

https://preview.redd.it/4iyn26do0mh31.png?width=1604&format=png&auto=webp&s=7a9d58bb81911aa336aa93320dbdae5f763d4a3e

Paper Wallets

Paper wallets allow printing private keys on paper. And this printed document is used as a wallet. These wallets are not that easy to access. Although the level of security is relatively high.

  • ethaddress
In case you are looking for a way to store your ETH in the most secure Ethereum wallet, but you are not ready to pay for a hardware one, try ethaddress. This wallet is free. It provides a high level of security.

  • WalletGenerator.net
The core of this key-generating wallet is 99% identical to the well-considered bitaddress.org.First of all, it’s necessary to download this website from Github, unpack and open the index.html file directly from your computer. The code version control allows to significantly simplify the mutual verification of the executable code. For more security, disconnect from the Internet at the time of creating your wallet.

How to keep your wallet in security?

Whatever wallet you choose you want it to be as secure as possible. Here are some ideas on how to achieve this:
  • Choose a wallet that suits your requirementsAll wallets are aimed at different goals and ways to use. Some of these wallets offer high security, some provide you with easy access for fast trading. Therefore, you should choose exactly what suits your needs best.
  • Keep your private key safeAlways make sure that your private key is secure and is stored in a safe place. Moreover, do not share your private keys. No, not with friends. Not even with your parents.
  • Set up 2-factor authenticationSome wallets offer this feature to increase the security of your coins. Do not ignore 2-factor authentication, set it up for extra confidence in protection against theft.
  • Backup, backup, and backupNothing protects you better from unforeseen accidents than a good old backup. This way you can keep access to your coins.
  • Store your funds offlineWith all the security levels offline wallets are still the most secure ones. Therefore, it is better to keep large amounts of ETH coins only on offline wallets.

https://preview.redd.it/fg2c449q1mh31.jpg?width=1216&format=pjpg&auto=webp&s=559936b2921ebac41e7cef64187b1920453cf229
To sum up, you should choose the best Ethereum wallet by yourself based on your needs. All wallets have both advantages and disadvantages. Simply decide which feature is more important to you.We wish you an easy choice of the best ETH wallet and the safe storage of coins.

Feel free to follow our updates and news on Twitter, Facebook, Telegram and BitcoinTalk.
Read what the customers say about SimpleSwap on Trustpilot.
Don’t hesitate to contact us with any questions you may have via [[email protected]](mailto:[email protected]).
submitted by SimpleSwapExchange to ethereum [link] [comments]

Documentation - Step by Step Guides - Need Help!

We need help with documentation
  1. We need accurate, up to date, step by step text guides
  2. We need screenshots
  3. and we need Videos!

Proof of Work (POW):
https://www.reddit.com/BiblePay/comments/6umlqq/how_to_mine_biblepay_on_windows/
https://www.reddit.com/BiblePay/comments/6ummuj/how_to_mine_biblepay_on_linux/
https://whitewalr.us/2019/biblepay-nomp-pool-mining.html
https://whitewalr.us/2019/solo-mine-biblepay.html
https://www.biblepay.org/mining/
NOTE: Core wallet can only solo mine (there are future plans to add a stratum connector)

DRAFT (Work in Progress)
https://wiki.biblepay.org/POBH_Setup
https://wiki.biblepay.org/POBH_Setup_Windows
https://wiki.biblepay.org/POBH_Setup_Linux

Proof of Distributed Computing (PODC):
https://wiki.biblepay.org/PODC
https://whitewalr.us/2019/boinc-wcg-join-change-team.html
Old: https://wiki.biblepay.org/Distributed_Computing_2
http://wiki.biblepay.org/Distributed_Computing_Start_Guide
http://wiki.biblepay.org/BOINC_Researcher_Setup
https://wiki.biblepay.org/Getting_Started_With_PODC
http://wiki.biblepay.org/Distributed_Computing

DRAFT (Work in Progress):
https://wiki.biblepay.org/PODC_Setup

Proof of Orphan (POOM):
https://wiki.biblepay.org/POOM
https://wiki.biblepay.org/Paying_For_a_POOM_Sponsored_Child
https://whitewalr.us/2019/biblepay-cameroonone-partnership.html
https://whitewalr.us/2019/cameroonone-poom-charity-donation.html

Healing Campaign:
https://wiki.biblepay.org/BiblePay_Healing_Campaign
https://whitewalr.us/2019/biblepay-gsc-healing.html

Dynamic Whale Staking (DWS):
https://forum.biblepay.org/index.php?topic=468.0

DRAFT (Work in Progress)
https://wiki.biblepay.org/DWS_Setup

How to Buy BiblePay coins (Bitcoin, Exchange, Wallet, Sync, Encrypt, Backup)
https://bitcointalk.org/index.php?topic=2388064.msg51062536#msg51062536

How to Create Proposals (How to Get Funding)
http://wiki.biblepay.org/Create_Sanctuary_2#SUBMIT_PROPOSAL

Masternode
http://wiki.biblepay.org/Create_Sanctuary_2

Anything missing?

You can get paid BBP coins from our monthly budget for working on this!
https://forum.biblepay.org/index.php?board=5.0

Reference:
https://bitcointalk.org/index.php?topic=2388064.msg53424005#msg53424005
submitted by togoshige to BiblePay [link] [comments]

Best Ethereum Wallets

Best Ethereum Wallets
When you start using cryptocurrency the number one problem is to find a secure wallet. In this article, we will introduce the most popular Ethereum wallets.

Hardware Wallets

We start with hardware wallets. These wallets provide offline storage for cryptocurrency. This kind of Ethereum wallet is considered to be the most secure.
https://preview.redd.it/ovlczorz6mh31.jpg?width=720&format=pjpg&auto=webp&s=eba30a80ba4fd2928272f3fa8dcef39da0177a8f

  • Trezor
Originally Trezor was developed for Bitcoin. Now it supports more different cryptocurrencies including Ethereum. This ETH wallet will work in tandem with your MyEtherWallet.Trezor is famous for the features that make it very secure. It provides 2-factor authentication, advanced cryptography and the opportunity to check transaction details before you confirm.
On the other hand, there are a couple of disadvantages. Such as the cost: the Trezor wallet is pretty expensive. If you are not a regular user you probably should consider cheaper wallets. Also, it takes time to access your holdings with this wallet.Thus using Trezor as Ethereum wallet may be a little inconvenient if you are a common user.

  • Ledger Nano S
Ledger Nano S is also a hardware wallet. It connects with any computers via USB. The most important feature of this wallet is security. As well as Trezor it provides 2-factor authentication. Aside from this, this Ethereum wallet has a PIN code to secure the device itself and also you can back up your account on the recovery sheet. Ledger Nano S gives users an opportunity to check details of transactions before the confirmation.
The main disadvantage of the Ledger Nano S wallet is the price. It is cheaper than Trezor, but it is still pricey.

  • KeepKey
KeepKey is a hierarchical deterministic (HD) wallet. It is also in the group of hardware wallets. KeepKey supports a lot of cryptocurrencies.The fact that this is an HD wallet allows users to generate private keys in an unlimited quantity. Undoubtedly this adds to the security level. Moreover, with the help of this device, you review and confirm every transaction. You can also set up a PIN code and a recovery sentence to make sure your holdings are secured enough.
It is easy to start using the KeepKey wallet. You need to download a couple of applications. One is to create a wallet. And with the help of the second one, you will be able to connect to KeepKey through Chrome.
Talking about the disadvantages we should mention the price. It is one of the most expensive wallets on the market to use it as ETH wallet.

Web Wallets

The great thing about web wallets is that you can easily access them. All you need is an internet connection.

  • MyEtherWallet
Unlike the most part of hardware wallets, MyEtherWallet is free. Nonetheless, it provides a high level of security by allowing users to store their keys on their own computers. There is no necessity to give any private information when creating a wallet.This Ethereum wallet interrogates with some hardware wallets such as Ledger Nano S and Trezor. Also, this platform gives an opportunity to write smart contracts.
In addition, MyEtherWallet provides automatic back up. So users should not remember about this by themselves.Moreover, it’s possible to get a paper Ethereum wallet by going to the “Wallet Info” section.
https://preview.redd.it/rtvnw6p37mh31.png?width=1088&format=png&auto=webp&s=46fdf6af91d12fccc41d5a0d3fe3ee32ffce61dd

  • Coinbase
First of all, Coinbase is an exchange platform. Usually, it is not recommended to store cryptocurrency on the stock platforms. But Coinbase is often considered to be an exception. This platform has a wallet that is suitable for use as ETH wallet. It is easy to use and has an intuitive interface.
One of the major drawbacks of this wallet is that users don’t control their private keys.

  • MetaMask
MetaMask is not just a popular Ethereum wallet. It is a browser extension. It can be installed on a number of browsers such as Chrome, Firefox, and Opera. This form allows accessing your holdings easily.The good thing is that you don’t need to provide personal information for the registration. Also, there is an opportunity to store the private key on your computer.

Desktop Wallets

There are wallets that are made in the form of a software program. They can be installed on your device. Such wallets are called Desktop Wallets.The security level of these wallets is not as good as of hardware ones.

  • Exodus
Exodus is a multicurrency wallet. So it can become your ETH wallet.It is famous for its user-friendly interface. It is a good wallet for those who only start their journey into the cryptocurrency world. Exodus supports ERC20 tokens.Users store their private keys on their computers. This increases the security level. Exodus has a backup feature.
The drawbacks of Exodus are that there is no possibility to add any custom tokens and a small list of ERC20 tokens.
  • Atomic Wallet
Atomic Wallet has a very convenient interface which is suitable even for the beginners. It supports Ethereum and all the ERC20 tokens.The wallet supports atomic swaps. So you can not only have one wallet for Ethereum and all the ERC20 tokens but also exchange them with another user.
Unfortunately, it doesn’t have a hardware wallet yet. So the level of security may not be very high.
https://preview.redd.it/a810i9277mh31.png?width=1024&format=png&auto=webp&s=6b57cce28966819ea9922675e0c64180996eb9da

  • Mist
Mist is the official Ethereum wallet. So it is a full node wallet. Full node wallet downloads the whole Ethereum blockchain on users’ computers. In other words, it downloads all the data about the ETH network. This type of wallet makes any user a full-fledged member of the blockchain
Mist has developed the way to allow users to interact with their ETH storage easily. It is free. Users don’t provide private information during the process of registration. The only way to access your wallet is to use a password. Your private keys are stored on your computer.The Mist wallet supports smart contracts.

Mobile Wallets

Sometimes it is more convenient to use a mobile wallet, which can be installed on your mobile devices. This type of wallets provides quicker access to your storage wherever you are. Mobile wallets are easier to use than desktop ones, but it is riskier.

  • Jaxx Liberty
Jaxx is free. It supports a lot of cryptocurrencies including ETH. It can work on different platforms such as Linux, Windows, and OSX. There is also an extension for Chrome browser. The interface of Jaxx wallet is simple and good to use.
However, the security of this wallet raises some questions.
  • Coinomi
Coinomi is an Android app. It is easy to use and supports a wide range of cryptocurrencies. With this wallet, you don’t have to think about backup. Coinomi has a feature that helps you to keep all the information. It is secure enough. Your private keys are nowhere but on your device. Coinomi protects the user’s identity when they sign up.
Unfortunately, so far there is only an app for Android.
https://preview.redd.it/75o14iff7mh31.png?width=1604&format=png&auto=webp&s=280cdfaf6ea98e90f626e7bd9e2c3edbf2fd6ba2

Paper Wallets

Paper wallets allow printing private keys on paper. And this printed document is used as a wallet. These wallets are not that easy to access. Although the level of security is relatively high.

  • ethaddress
In case you are looking for a way to store your ETH in the most secure Ethereum wallet, but you are not ready to pay for a hardware one, try ethaddress. This wallet is free. It provides a high level of security.

  • WalletGenerator.net
The core of this key-generating wallet is 99% identical to the well-considered bitaddress.org.First of all, it’s necessary to download this website from Github, unpack and open the index.html file directly from your computer. The code version control allows to significantly simplify the mutual verification of the executable code. For more security, disconnect from the Internet at the time of creating your wallet.

How to keep your wallet in security?

Whatever wallet you choose you want it to be as secure as possible. Here are some ideas on how to achieve this:
  • Choose a wallet that suits your requirementsAll wallets are aimed at different goals and ways to use. Some of these wallets offer high security, some provide you with easy access for fast trading. Therefore, you should choose exactly what suits your needs best.
  • Keep your private key safeAlways make sure that your private key is secure and is stored in a safe place. Moreover, do not share your private keys. No, not with friends. Not even with your parents.
  • Set up 2-factor authenticationSome wallets offer this feature to increase the security of your coins. Do not ignore 2-factor authentication, set it up for extra confidence in protection against theft.
  • Backup, backup, and backupNothing protects you better from unforeseen accidents than a good old backup. This way you can keep access to your coins.
  • Store your funds offlineWith all the security levels offline wallets are still the most secure ones. Therefore, it is better to keep large amounts of ETH coins only on offline wallets.
https://preview.redd.it/z05sf6ci7mh31.jpg?width=1216&format=pjpg&auto=webp&s=546eed6ba6fc867ff4999d77ef88c6baeaeea8f3
To sum up, you should choose the best Ethereum wallet by yourself based on your needs. All wallets have both advantages and disadvantages. Simply decide which feature is more important to you.We wish you an easy choice of the best ETH wallet and the safe storage of coins.

Feel free to follow our updates and news on Twitter, Facebook, Telegram and BitcoinTalk.Read what the customers say about SimpleSwap on Trustpilot.Don’t hesitate to contact us with any questions you may have via [[email protected]](mailto:[email protected]).
submitted by SimpleSwapExchange to ethtrader [link] [comments]

11-29 21:33 - 'We’re giving away an Apple Watch 5 as a thank you to the cryptocurrency community for supporting Crypto Pro.' (self.Bitcoin) by /u/Bull127 removed from /r/Bitcoin within 21-31min

'''
In the holiday spirit, and as a thank you to the cryptocurrency community, we, at Crypto Pro are giving away a brand new Apple Watch 5 to one lucky bag holder.
[Crypto Pro]1 launched back in 2015 when Bitcoin was priced at $200 a pop, and Dogecoin ranked 7th. We wanted to create a small Apple Watch widget so that everyone can see Bitcoin’s price at the flick of a wrist.
The app has gone a long way since then, and we have the reddit and cryptocurrency community to thank, for giving us both encouragements and constructive feedback to shape what the app is today. So thank you:)

Rules

What is Crypto Pro?

Crypto prices / news / portfolio app designed for iOS. Users can see stats like portfolio gains, losses, and other cool analytics. As well as set price alerts, read news, connect to your exchanges and wallets. [Here's a link to check us out]4 !

How are we different?

We are the only major cryptocurrency app that keeps all the user data on device and doesn't track or analyze it in any way. We believe that privacy is important, and that no one should have access to your portfolio size, market viewing habits, or API keys. Everything is encrypted and stored locally on your phone. When you delete the app, all your data is deleted… the way it should be. (but we have an option to backup to your own iCloud or Dropbox account if you want to).
We also think the design is pretty cool tbh. We got some nice sparklines going, cool charts, real-time pricing, and a bunch of other cool features. Here’s a few pictures I put together with a sample portfolio > [[link]6

What should I comment?

Feedback on the app is always appreciated :) or comment the year you first learnt about Bitcoin, or your price prediction for December 2020, or some just some random gibberish ಠᴗಠ.
Happy [belated] Turkey Day!
- Crypto Pro Team
P.S. Buy the fucking dip.
P.P.S. ^ not financial advice.
'''
We’re giving away an Apple Watch 5 as a thank you to the cryptocurrency community for supporting Crypto Pro.
Go1dfish undelete link
unreddit undelete link
Author: Bull127
1: apps.apple****/a**/id980888**3 2: w*w**ickcou**er.com/coun*do*n/*61207**cryp*o-pr*-*ive*way 3: www*p*cp*tv*cryp*opro_a*p/ 4: a*ps****le.co*/app/id9*08880*3 5: *m*u*.com/*/a*j0l67 6: *m*ur.*om/a/ac*0l6*]^^*
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Feedback on new Nano "cold" storage feature in Q Vault

Hey guys, hope you are well. I'm looking to get some feedback on an idea I just had. A team and I are currently building an open source password manager for Mac, Windows and Linux. (https://qvault.io)
The goal of the manager is to have all the security features and configurations such that cryptocurrency keys can be safely stored inside. For example, offline use, cloud backup integrations, virtual keyboard, etc.
Anyhow, I just finished importing a nano wallet backup into my personal Q Vault. (simply a valid address and the associated seed), and I was thinking I should be able to generate that address and seed from within the vault, in the form of a button that is "generate simple wallet". Not only would it be more convenient, but it would be way more secure (no need to copy/paste the keys into the vault). This would obviously be only for HODLers, because the vault has no capabilities to spend the coins. Once a user wants to move the funds, that seeds would need to be imported into a "hot" wallet like natrium.
Anyhow, I'm thinking of doing this for Bitcoin and Nano first, and maybe adding more coins down the road if the feature is used. What are your guys thoughts?
Go ahead and download the app and play with it if you want to get a feel for how it would work.
submitted by kvothe1956 to nanocurrency [link] [comments]

Bitcoin Wallet - Download, Encrypt, Backup, & Use How to Back Up Your Bitcoin Wallet Introduction to the Bitcoin 2 Wallet, backup and restore

Download the Bitcoin Wallet by Bitcoin.com. A simple, secure way to send and receive Bitcoin. Available for iOS, Android, Mac, Windows, and Linux. Supports Bitcoin Cash (BCH) and Bitcoin (BTC). Software wallet: A software wallet is a wallet that you download to a PC, notebook, or mobile device. Popular Bitcoin Software Wallets include: For Windows: Bitcoin Core, Electrum, ArcBit, Armory A wallet backup protects your bitcoins against computer or software failure. It may also help you retrieve your funds after your device was stolen or lost. There are generally 3 ways to backup a Bitcoin wallet. Different software supports different methods. Make sure you're familiar with your wallet before loading it with bitcoins. If you lose the backup and can't access your wallet for some There are some best practices you can follow to secure your bitcoin: Always backup your wallet. Encrypt your wallet with a strong password. Store wallet backups in multiple locations (USB drive, CD, paper wallet, private cloud, etc.). Backup regularly when backing up a data file (such as wallet.dat). The actual backup of your bitcoin isn’t on the wallet, but a hardware wallet acts like a physical key that you can insert into your computer which then lets the blockchain know who you are (and

[index] [509] [22978] [1177] [20276] [17236] [4836] [4949] [29443] [9510] [2913]

Bitcoin Wallet - Download, Encrypt, Backup, & Use

This is a step by step guide to using the Bitcoin wallet client. How to download it. How to Encrypt is and protect your Bitcoin. How to back up your wallet and put the wallet on multiple computers. This short tutorial explains what a Bitcoin wallet backup is and how to create it on 3 different wallets: Blockchain.info, Bitcoin-QT and MultiBit. For more information and tutorials about Bitocin ... Intro tutorial for those new to Bitcoin 2 giving a quick overview and a tutorial on setting up the wallet on Windows and backing up and restoring the wallet key Twitter @BTC2Bull.

Flag Counter