Award-Winning Filmmaker Torsten Hoffmann Launches Bitcoin

A few stories about Brian Krebs: The independent cybercrime journalist who exposes criminals on the internet

First, a bit of introduction before we get into the living drama that is Brian Krebs.
Brian Krebs has been a journalist for decades, starting in the late 90s. He got his start at The Washington Post, but what he's most famous for are his exposes on criminal businesses and individuals who perpetuate cyber crime worldwide. In 2001, he got his interest in cybercrime piqued when a computer worm locked him out of his own computer. In 2005, he shifted from working as a staff writer at The Washington Post's tech newswire to writing for their security blog, "Security Wire". During his tenure there, he started by focusing on the victims of cybercrime, but later also started to focus on the perpetrators of it as well. His reporting helped lead to the shutdown of McColo, a hosting provider who provided service to some of the world's biggest spammers and hackers. Reports analyzing the shutdown of McColo estimated that global spam volume dropped by between 40 and 70 percent. Further analysis revealed it also played host to child pornography sites, and the Russian Business Network, a major Russian cybercrime ring.
In 2009, Krebs left to start his own site, KrebsOnSecurity. Since then, he's been credited with being the first to report on major events such as Stuxnet and when Target was breached, resulting in the leakage of 40 million cards. He also regularly investigates and reveals criminals' identities on his site. The latter has made him the bane of the world of cybercrime, as well as basically a meme, where criminals will include references like Made by Brian Krebs in their code, or name their shops full of stolen credit cards after him.
One of his first posts on his new site was a selection of his best work. While not particularly dramatic, they serve as an excellent example of dogged investigative work, and his series reveal the trail of takedowns his work has documented, or even contributed to.
And now, a selection of drama involving Krebs. Note, all posts are sarcastically-tinged retellings of the source material which I will link throughout. I also didn't use the real names in my retellings, but they are in the source material. This took way too long to write, and it still does massively condense the events described in the series. Krebs has been involved with feuds with other figures, but I'd argue these tales are the "main" bits of drama that are most suited for here.

Fly on the Wall

By 2013, Krebs was no stranger to cybercriminals taking the fight to the real world. He was swatted previously to the point where the police actually know to give him a ring and see if there'd actually been a murder, or if it was just those wacky hackers at it again. In addition, his identity was basically common knowledge to cybercriminals, who would open lines of credit in his name, or find ways to send him money using stolen credit cards.
However, one particular campaign against him caught his eye. A hacker known as "Fly" aka "Flycracker" aka "MUXACC1" posted on a Russian-language fraud forum he administered about a "Krebs fund". His plan was simple. Raise Bitcoin to buy Heroin off of a darknet marketplace, address it to Krebs, and alert his local police via a spoofed phone call. Now, because Krebs is an investigative journalist, he develops undercover presences on cybercrime forums, and it just so happened he'd built up a presence on this one already.
Guys, it became known recently that Brian Krebs is a heroin addict and he desperately needs the smack, so we have started the "Helping Brian Fund", and shortly we will create a bitcoin wallet called "Drugs for Krebs" which we will use to buy him the purest heroin on the Silk Road. My friends, his withdrawal is very bad, let’s join forces to help the guy! We will save Brian from the acute heroin withdrawal and the world will get slightly better!
Fly had first caught Krebs' attention by taunting him on Twitter, sending him Tweets including insults and abuse, and totally-legit looking links. Probably either laced with malware, or designed to get Krebs' IP. He also took to posting personal details such as Krebs' credit report, directions to his house, and pictures of his front door on LiveJournal, of all places.
So, after spotting the scheme, he alerted his local police that he'd probably have someone sending him some China White. Sure enough, the ne'er-do-wells managed to raise 2 BTC, which at the time was a cool $200 or so. They created an account on the premiere darknet site at the time, The Silk Road under the foolproof name "briankrebs7". They found one seller who had consistently high reviews, but the deal fell through for unknown reasons. My personal theory is the seller decided to Google where it was going, and realized sending a gram of dope into the waiting arms of local law enforcement probably wasn't the best use of his time. Still, the forum members persevered, and found another seller who was running a buy 10 get 2 free promotion. $165 of Bitcoin later, the drugs were on their way to a new home. The seller apparently informed Fly that the shipment should arrive by Tuesday, a fact which he gleefully shared with the forum.
While our intrepid hero had no doubt that the forum members were determined to help him grab the tail of the dragon, he's not one to assume without confirmation, and enlisted the help of a graduate student at UCSD who was researching Bitcoin and anonymity on The Silk Road, and confirmed the address shared by Fly was used to deposit 2 BTC into an account known to be used for money management on the site.
By Monday, an envelope from Chicago had arrived, containing a copy of Chicago confidential. Taped inside were tiny baggies filled with the purported heroin. Either dedicated to satisfied customers, or mathematically challenged, the seller had included thirteen baggies instead of the twelve advertised. A police officer arrived to take a report and whisked the baggies away.
Now, Fly was upset that Krebs wasn't in handcuffs for drug possession, and decided to follow up his stunt by sending Krebs a floral arrangement shaped like a cross, and an accompanying threatening message addressed to his wife, the dire tone slightly undercut by the fact that it was signed "Velvet Crabs". Krebs' curiosity was already piqued from the shenanigans with the heroin, but with the arrival of the flowers decided to dive deeper into the сука behind things.
He began digging into databases from carding sites that had been hacked, but got his first major breakthrough to his identity from a Russian computer forensics firm. Fly had maintained an account on a now-defunct hacking forum, whose database was breached under "Flycracker". It turns out, the email Flycracker had used was also hacked at some point, and a source told Krebs that the email was full of reports from a keylogger Fly had installed on his wife's computer. Now, because presumably his wife wasn't part of, or perhaps even privy to her husband's illicit dealings, her email account happened to be her full legal name, which Krebs was able to trace to her husband. Now, around this time, the site Fly maintained disappeared from the web, and administrators on another major fraud forum started purging his account. This is a step they typically take when they suspect a member has been apprehended by authorities. Nobody knew for sure, but they didn't want to take any chances.
More research by Krebs revealed that the criminals' intuition had been correct, and Fly was arrested in Italy, carrying documents under an assumed name. He was sitting in an Italian jail, awaiting potential extradition to the United States, as well as potentially facing charges in Italy. This was relayed to Krebs by a law enforcement official who simply said "The Fly has been swatted". (Presumably while slowly removing a pair of aviator sunglasses)
While Fly may have been put away, the story between Krebs and Fly wasn't quite over. He did end up being extradited to the US for prosecution, but while imprisoned in Italy, Fly actually started sending Krebs letters. Understandably distrustful after the whole "heroin" thing, his contacts in federal law enforcement tested the letter, and found it to be clean. Inside, there was a heartfelt and personal letter, apologizing for fucking with Krebs in so many ways. He also forgave Krebs for posting his identity online, leading him to muse that perhaps Fly was working through a twelve-step program. In December, he received another letter, this time a simple postcard with a cheerful message wishing him a Merry Christmas and a Happy New Year. Krebs concluded his post thusly:
Cybercrooks have done some pretty crazy stuff to me in response to my reporting about them. But I don’t normally get this kind of closure. I look forward to meeting with Fly in person one day soon now that he will be just a short train ride away. And he may be here for some time: If convicted on all charges, Fly faces up to 30 years in U.S. federal prison.
Fly ultimately was extradited. He plead guilty and was sentenced to 41 months in jail

vDOS and Mirai Break The Internet

Criminals are none too happy when they find their businesses and identities on the front page of KrebsOnSecurity. It usually means law enforcement isn't far behind. One such business was known as vDOS. A DDOS-for-hire (also known as a "booter" or a "stresser") site that found itself hacked, with all their customer records still in their databases leaked. Analysis of the records found that in a four-month time span, the service had been responsible for about 8.81 years worth of attack time, meaning on average at any given second, there were 26 simultaneous attacks running. Interestingly, the hack of vDOS came about from another DDOS-for-hire site, who as it turns out was simply reselling services provided by vDOS. They were far from the only one. vDOS appeared to provide firepower to a large number of different resellers.
In addition to the attack logs, support messages were also among the data stolen. This contained some complaints from various clients who complained they were unable to launch attacks against Israeli IPs. This is a common tactic by hackers to try and avoid unwanted attention from authorities in their country of residence. This was confirmed when two men from Israel were arrested for their involvement in owning and running vDOS. However, this was just the beginning for this bit of drama.
The two men arrested went by the handles "applej4ck" and "Raziel". They had recently published a paper on DDOS attack methods in an online Israeli security magazine. Interestingly, on the same day the men were arrested, questioned, and released on bail, vDOS went offline. Not because it had been taken down by Israeli authorities, not because they had shut it down themselves, but because a DDOS protection firm, BackConnect Security, had hijacked the IP addresses belonging to the company. To spare a lot of technical detail, it's called a BGP hijack, and it basically works by a company saying "Yeah, those are our addresses." It's kind of amazing how much of the internet is basically just secured by the digital equivalent of pinky swears. You can read some more technical detail on Wikipedia. Anyway, we'll get back to BackConnect.
Following the publication of the story uncovering the inner workings of vDOS, KrebsOnSecurity was hit with a record breaking DDOS attack, that peaked at 620/Gbps, nearly double the most powerful DDOS attack previously on record. To put that in perspective, that's enough bandwidth to download 5 simultaneous copies of Interstellar in 4K resolution every single second, and still have room to spare. The attack was so devastating, Akamai, one of the largest providers of DDOS protection in the world had to drop Krebs as a pro bono client. Luckily, Google was willing to step in and place his site under the protection of Google's Project Shield, a free service designed to protect the news sites and journalists from being knocked offline by DDOS attacks.
This attack was apparently in retaliation for the vDOS story, since some of the data sent in the attack included the string "freeapplej4ck". The attack was executed by a botnet of Internet of Things (or IoT) devices. These are those "smart" devices like camera systems, routers, DVRs. Basically things that connect to the cloud. An astounding amount of those are secured with default passwords that can be easily looked up from various sites or even the manufacturers' websites. This was the start of a discovery of a massive botnet that had been growing for years.
Now time for a couple quick side stories:
Dyn, a company who provides DNS to many major companies including Twitter, Reddit, and others came under attack, leaving many sites (including Twitter and Reddit) faltering in the wake of it. Potentially due to one of their engineers' collaboration with Krebs on another story. It turned out that the same botnet that attacked Krebs' site was at least part of the attack on Dyn
And back to BackConnect, that DDOS protection firm that hijacked the IP addresses from vDOS. Well it turns out BGP Hijacks are old hat for the company. They had done it at least 17 times before. Including at least once (purportedly with permission) for the address Aka, "leet". It turns out one of the co-founders of BackConnect actually posted screenshots of him visiting sites that tell you your public IP address in a DDOS mitigation industry chat, showing it as They also used a BGP Hijack against a hosting company and tried to frame a rival DDOS mitigation provider.
Finally, another provider, Datawagon was interestingly implicated in hosting DDOS-for-hire sites while offering DDOS protection. In a Skype conversation where the founder of Datawagon wanted to talk about that time he registered and got sued for it, he brings up scanning the internet for vulnerable routers completely unprompted. Following the publication of the story about BackConnect, in which he was included in, he was incensed about his portrayal, and argued with Krebs over Skype before Krebs ultimately ended up blocking him. He was subsequently flooded with fake contact requests from bogus or hacked Skype accounts. Shortly thereafter, the record-breaking DDOS attack rained down upon his site.
Back to the main tale!
So, it turns out the botnet of IoT devices was puppeteered by a malware called Mirai. How did it get its name? Well, that's the name its creator gave it, after an anime called Mirai Nikki. How did this name come to light? The creator posted the source code online. (The name part, not the origin. The origin didn't come 'til later.) The post purported that they'd picked it up from somewhere in their travels as a DDOS industry professional. It turns out this is a semi-common tactic when miscreants fear that law enforcement might come looking for them, and having the only copy of the source code of a malware in existence is a pretty strong indicator that you have something to do with it. So, releasing the source to the world gives a veneer of plausible deniability should that eventuality come to pass. So who was this mysterious benefactor of malware source? They went by the name "Anna-senpai".
As research on the Mirai botnet grew, and more malware authors incorporated parts of Mirai's source code into their own attacks, attention on the botnet increased, and on the people behind it. The attention was presumably the reason why Hackforums, the forum where the source code was posted, later disallowed ostensible "Server Stress Tester" services from being sold on it. By December, "Operation Tarpit" had wrought 34 arrests and over a hundred "knock and talk" interviews questioning people about their involvement.
By January, things started to come crashing down. Krebs published an extensive exposé on Anna-senpai detailing all the evidence linking them to the creation of Mirai. The post was so big, he included a damn glossary. What sparked the largest botnet the internet had ever seen? Minecraft. Minecraft servers are big business. A popular one can earn tens of thousands of dollars per month from people buying powers, building space, or other things. It's also a fiercely competitive business, with hundreds of servers vying for players. It turns out that things may have started, as with another set of companies, two rival DDOS mitigation providers competing for customers. ProTraf was a provider of such mitigation technology, and a company whose owner later worked for ProTraf had on at least one occasion hijacked addresses belonging to another company, ProxyPipe. ProxyPipe had also been hit with DDOS attacks they suspected to be launched by ProTraf.
While looking into the President of ProTraf, Krebs realized he'd seen the relatively uncommon combination of programming languages and skills posted by the President somewhere else. They were shared by Anna-senpai on Hackforums. As Krebs dug deeper and deeper into Anna-senpai's online presence, he uncovered other usernames, including one he traced to some Minecraft forums where a photoshopped picture of a still from Pulp Fiction contained the faces of BackConnect, which was a rival to ProTraf's DDOS mitigation business, and another face. A hacker by the name of Vyp0r, who another employee of ProTraf claimed betrayed his trust and blackmailed him into posting the source of another piece of malware called Bashlite. There was also a third character photoshopped into the image. An anime character named "Yamada" from a movie called B Gata H Hei.
Interestingly, under the same username, Krebs found a "MyAnimeList" profile which, out of 9 titles it had marked as watched, were B Gata H Hei, as well as Mirai Nikki, the show from which Mirai derived its name. It continues on with other evidence, including DDOS attacks against Rutgers University, but in short, there was little doubt in the identity of "Anna-senpai", but the person behind the identity did contact Krebs to comment. He denied any involvement in Mirai or DDOS attacks.
"I don’t think there are enough facts to definitively point the finger at me," [Anna-senpai] said. "Besides this article, I was pretty much a nobody. No history of doing this kind of stuff, nothing that points to any kind of sociopathic behavior. Which is what the author is, a sociopath."
He did, however, correct Krebs on the name of B Gata H Kei.
Needless to say, the Mirai botnet crew was caught, but managed to avoid jailtime thanks to their cooperation with the government. That's not to say they went unpunished. Anna-senpai was sentenced to 6 months confinement, 2500 hours of community service, and they may have to pay up to $8.6 million in restitution for their attacks on Rutgers university.

Other Stories

I don't have the time or energy to write another effortpost, and as is I'm over 20,000 characters, so here's a few other tidbits of Krebs' clashes with miscreants.
submitted by HereComesMyDingDong to internetdrama [link] [comments]

Help with possible hacking email.

I received this email from my own address in to my spam folder on Sunday. As it is in my spam I have only just noticed it.
I wouldn't normally be worried about these sorts of emails but I received an email on Sunday from Microsoft informing me they had blocked someone from accessing my account and I changed my password.
The email isn't present in my sent items from this email address. However, normally if an email address is spoofed I can click on it and see the real email address behind it. When i do this to this email, it just shows my address again. The 'to' address is listed as 'kory35'.
I haven't torrented anything for months, however I do use usenet for movies and tv. I also scan with windows defender, malwarebytes, and ccleaner weekly.
I realise this may be a stupid spam email, but it has me a little worried. Can anyone shed any light for me?
My nickname in darknet is kory35. I hacked this mailbox more than six months ago, through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from [removed] is [removed]
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history. Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit. You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching. Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right? If you are of the same opinion, then I think that $892 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): [removed] As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device. Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours! After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson. Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere! Good luck!
submitted by throwawayzzz12345zzz to techsupport [link] [comments]

Log of AMA with Skycoin

boldninja Let's all give a warm welcome to @synth from and for taking the time to do this AMA
synth *hello
mike Hi Synth
jakethepanda Hey @synth
thrice.pi Hey synth
dr10 Hi
boldninja I think we can start - you guys know the drill. Give him some time to respond (no more than 2-3 questions on backlog so he can catch up)
dr10 How would you - shortly & in easy words - sum-up the advantages of SkyCoin to magazines and non-crypto people?
mgaruccio Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
michaelthecryptoguy Whassup @synth
tranzer hi synth. I have a question - are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC? What would you say is the 1 unique feature that Skycoin has?
synth It is very difficult, because Skycoin is a very large project and already has +6 years of development. Different parts of the project have different objectives.
The cryto, coin part is about solving the problems with the existing consensus algorithms. Being able to do +300 transactions a second, transactions in seconds instead of minutes (faster than credit cards), eliminating miners, eliminating block rewards (eliminating inflation) and eliminating 51% attack and the other problems with mining.
then there are other repos and experimental projects under such as a meshnet and distributed VPN prototype, where people will be paid coins for forwarding traffic. Also prototypes of distributed social media application, with peer to peer data replication and different experimental projects. Research into immutable data structures for next generation internet. Some of them are very radical.
dr10 How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
mgaruccio So how much exists today? Could I build an app on the platform if I wanted to?
mike In terms of the rate of progress, what is currently your greatest limiting factor - like funding, manpower, currently available technology?
Can you explain a bit about the mesh net? Is it just an mpls network between nodes or is there something deeper going on?
It is not actually a meshnet. It is software defined networking, it is much more powerful than just meshnet. Its a new type of networking and new completely new protocol and networking namespace, independent of the existing internet.
It supports source routing, while the existing internet does hot potato routing, so never achieves optimal latencies.
It supports multi-homing, which IPv6 does not (Which is critical for when we have gigabit or terabit networking and multi-redundant bandwidth paths)
It has default oppurunistic crypto, both link layer and end to end; so everything is encrypted by default, unlike the current internet.
It has store and forward networking and will operate in Africa or even under conditions where latencies are in the minutes or hours and packet loss is excessive. Where existing protocols cannot operate reliability. It is much more robust than IPv4/IPv6 or TCP/ip
It has improved privacy. If a packet takes a route that is 10 hops, each hop only knows the previous node in the route and the next node in the route. It is not like IPv4 where each packet gives the source and destination. The privacy level is something that does not exist on the current internet.
IP addresses are replaced by public key and no one can read traffic to a destination, without knowing the private key of the public key that identifies the destination. The system does not need 3rd parties or certificate authorities. The design is a revolution.
are those coins that are not in circulation in any cold wallets since only a portion is currently available according to CMC?
The coins are locked into 100 addresses, each with 1 million coins each. And they are released sequentially.
There is a complicated locking procedure and releasing new coins requires unamious consent and a shared secret among a group of developers. Anyone in the shared secret group can block distribution of more coins (to stop the problem that killed NXT). So by design the coins were supposed to be difficult to distribut, there had to be a good reason or justification before a distribution would be approved.
mike What are the hardware requirements to operate a wireless Skywire (the name for the protocol described above) Node?
arc-over-water nxt i think is doing ok..
How does the Network consensus algorithm Obelisk work and differ from widely known algorithms like Proof of Work and Proof of Stake?
PoS and PoW use miners. Miners receive new coins every block as a block reward. So miners are making money and will fight to control the network. An everyone will suffer because the newly created coins represent inflation.
Skycoin was designed to eliminate mining and eliminate the inflation. No block rewards, no new coins. And we needed to develop a new consensus algorithm to do that and there are only a few methods that work, for these constraints. The consensus algorithm is based upon Ben-Or's randomization procedure for achieving consensus in a distributed system, with some improvements for detecting adversarial or malicious nodes who are trying to prevent the consensus process.
There are white papers on about the specifics. I would call it "network consensus" and it uses a sort of Web of Trust (WoT), where if the people creating blocks are doing a bad job or attacking the network, then the community can get rid of them. At the same time, the people who control the network, do not have any real power to attack the network except by slowing down transactions and being annoying, so even if they become malicious the only issue is how to get rid of them and select new people.
mike Any idea when Skywire will be released and ready to test on hardware nodes (testnet or mainnet)?
mgaruccio So if there is no block reward what is the incentive to run a node?
vega What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
michaelthecryptoguy Do you have an idea on the specs of a node that would be required? In the beginning? What about with 10,000 users? (edited)
nxt i think is doing ok..
There were three people that each owned 30% of the coin. One decided he wanted out and began dumping. NXT was over 150 million I think. When he started dumping, it basicly killed NXT.
Skycoin's distribution was designed to stop dumping by the founders and early people.
After Skycoin gets to 30% of the total coins distributed, there will probably a hard time lock on the remaining coins, so that a maximum of 5% of the remaining coins can be released per year. So the distribution for the other 70% of the coins will take a minimum of 14 years (and could be longer).
We cannot even sell the rest of the coins, because if we sold 10% of the total now at $5 per coin, it would be 50 million or something and we cannot spend or even use that amount of money. Not at this stage.
Ethereum spent 30 million or 70 million in their first year or two after the ICO and then nearly went bankrupt. Silicon Valley wages and offices etc. We have been very conservative and have kept costs down and kept them responsible. Now we have coins like EOS and they want to raise a billion dollars and have not produced anything yet, do not hav a blockchain and I have no idea what they would spend that money on, but they are throwing $350,000 parties in time square for marketing/PR etc...
arc-over-water what prevents you from selling? anybody can spend that amount of money?
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
What will be the actual function of Skycoin (the coin itself)? Will the coin be used as currency, as transfer of value in and between all these various developing functionalities, semi-separate projects to tie them all together or it's function will be more limited?
Yes. Bitcoin has no purpose. An altcoin does two things - check your balance - send money to other people
Two features - check balance - send
For a coin to have value, people need to be forced to buy it to consume specific services. There has to be stuff for people to spend the coin on, that there is demand for.
So Bitcoin is really just a purely speculative asset. It generates no cashflow and its value is determined by perception or social convention.
Ideally, Skycoin would start off as a "better Bitcoin" (faster, more secure, new algorithm, simplier, etc), then over time we would build up an ecosystem and have some type of backing and tie the coin's value into the network and usebase.
The mesh netork (skywire) is good, because it gives something for people to do to get coins and it allows people to consume the coins. You can run your internet traffic through a VPN that tunnels over Skywire and maybe it will be a nominal amount (actually absurdly small amount of money), but there would be real economic activity and a real userbase and community using the coin. Not just speculation.
Later on the scope is much wider.
arc-over-water So the skycoin wallet will be a VPN for our internet usage?
nxt is a newer platform than sky, market value is $220 million plus $166 million, I get what you are saying but the evidence is wrong. Community is huge and active in Nxt. But you say it is killed, i dont get it?
What I am saying, is that NXT would be a lot further along than it is now and probably around where Ethereum is, except for that mistake in the distribution and keeping it too concentrated. It set them back by years. They did not consider what the impact on the price would be, over the long term, when one of the early whales started selling off or decided he wanted out.
arc-over-water But they did the same again with IOTA, same lead dev.. Its over a $Billion
they released and let the market price distribute
So the skycoin wallet will be a VPN for our internet usage?
The VPN is just one application, that uses bandwidth over Skywire. There are several things in development.
This is a BBS like 4chan, that is completely distributed, with CXO.
It will run over Skywire also, This is like building a whole new internet from scratch. The apps that run on it are going to specialized and privacy focused, etc GitHub skycoin/bbs Contribute to bbs development by creating an account on GitHub.
mike So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
arc-over-water so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
rockyj !calculate
slackbot Custom Response
So if there is no block reward what is the incentive to run a node?
running a consensus node does not cost anything. You can run it on a raspberry pi.
The important thing is that if the people doing consensus are doing a bad job, that the community can get rid of them and replace them. The other important thing, is that they can be audited and determined automatically if they are obeying the protocol.
the miners in skycoin are not very powerful and cannot do anything except slow down transactions. They are unable to spend other people's money without their private keys, so the consensus/mining nodes are almost irrelevent. It is not like Bitcoin where the miners can hold the network hostage or act selfishly (driving up the transactions fees for their own personal benefit and delaying any innovations that would improve bitcoin for everyone, etc).
So Skycoin is a Proof of Resource coin where its value is actually backed by provision of a useful service, in this case private and secure networking? Are there plans to add decentralized storage and even distributed processing to it?
We have decentralized storage, which is called CXO. But only the bandwidth is monetized by Skywire. We do not nickle and dime and try to attach a coin cost to every API call. Everything that should be free is free. So its a different philosphy.
On top of CXO we also have distributed social media applications (simmilar to Steemit)
CXO is very similar to IFPS, but simplier and designed for our internal infrastructure and with our crypto standards, instead of being a mismash.
mike Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network, in effect reducing their impact on consensus?
looks like you answered the question above while I was typing...
tranzer How many tx/s can skycoin handle? What are block times?
thrice.pi 300 right? ^
arc-over-water on your website it says you will have a NON- Turing complete lisp language?
so these 100 separate million coin accounts will be 100 ICOs or how is the distribution patterned? is it written into the code or up to the devs?
We will have a distribution page, up on the website soon. Its complicated.
Skywire, is designed to pull coins out of circuation, through a sort of tithe on network activity and it does automatic buy backs effectively. So the distribution will actually peak and then decline. But one distribution is from the locked coins, and the locked coins are freed, then circulate, then end up at the foundation (from the skywire tithe are pulled out of circulation), but still count towards the free float.
The coin holders also receive a coinhour dividend and there will be a market rate conversion between coin hours and Skycoins and coinhours are the actual currency for the Skywire network. If you do not have enough coin hours, then you sell Skycoin for CoinHour at the market rate, to purchase bandwidth; but if you have a lot of coins then you have enough coin hours for downloading movies or VPN or whatever you are doing and it is essentially free.
So there is a dual level economic structure. Both with coin buybacks to pull coins out of circulation and with a dividend or incentive to encourage users to hold the coin if they are using the network.
arc-over-water so there will be two currencies, holding one reserves the other
Is it possible for Skycoin to choose the best paths and route around bad or slow nodes as damage to the network
Yes. This is very important.
The person dialing a connection, chooses the path of the connection!
You can choose the lowest latency path for video games or Skype, and choose highest throughput paths for video downloads etc. Or can choose paths through specific nodes or facilities or countries, for security concerns and to minimize the number of points that the traffic could be intercepted at.
mike Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
dr10 When do you plan to be able to present your planned technology and services to the masses? When can they use what you try do accomplish?
on your website it says you will have a NON- Turing complete lisp language?
That is probably an error. LOL. We will have a new website soon.
There is no scripting language on the skycoin blockchain. Each transaction is constant time (for efficiency and security and to achieve the highest transaction rate and to keep the coin simple).
However, we have a language called CX in development, which is a next generation language that is beyond "smart contracts" and the toy things on ethereum. It uses immutable datastructures and is something completely new. Most of the skycoin "smart contracts" will probably be off blockchain or in personal blockchains and we do not want to shove all the data onto the main chain, because forcing everyone to download everyone one elses contracts it the world is just spamming the blockchain to death. There are better ways to do it.
Will Skycoin still have the node subsidy plan for setting up and registering the mesh nodes like originally planned?
Yes. We are going to get from 20% to 30% distributno of the coins, through network incentives for people running Skywire nodes, consensus nodes and services.
I think this is going to be massive for marketing. And it is the best way to get the coins out to the users, instead of all the coins being held by whales
samuelvihollandia I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
arc-over-water Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
I read how you suggest Skycoin could be used for VPN connections, is this the largest use case you see?
No. This is just something easy, that we have working. Its not the largest applicatoin at all.
80% of internet traffic right now is bitorrent and the bitorrent sites are being systematically shutdown and driven off the internet. They wont go away, but will jut go underground. (largest music tracker, with 800k people) was just shut down, bakabt (largest anime tracker) has gone closed registration, Nyantorrent etc...
User communities of millions of people will be migrating from the clearnet (the existing corporate shit-net) to the "new internet". We are going to see people migrating by the millions, whole user communities of millions of people.
arc-over-water Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background? - Maidsafe is open and clear so is IOTA and Stellar etc. Can you let us know who you and your team are? Especially you are talking about 15 year and up obligations..
techbytes Do we need to hold skycoin to run Skywire nodes or consensus nodes like masternodes from other coins?
Maidsafe has been working on the redesign of the net for about ten years, what are you doing the same and what different?
Maidsafe is in version 2 or 3. Maidsafe will not have a real coin until version 9. Each version takes them about two or three years. Maidsafe will not be "done" or ready for atleast 18 years at this rate.
Skycoin has been in development for ~6 years and the meshnet for 4 years and it will be finished in a few months. To the poin that people can start using it.
Skycoin is similar to maidsafe in the objective, but has a different approach and architecture and primitives. We did not try to do everything, but focused on a smaller, tractable core and got that done.
There will be multiple projects in this space, but few teams are able to plan on the time horizon necisary for building a new internet or able to design each of the components of a system this large, or figure out how to do it so that it is useful at each stage of construction of a project that may take a decade. (edited)
mike Can you see a way for Ark and Skycoin to build on each other in a synergistic manner? I'm all for not reinventing the wheel, especially when it looks like it will be replaced with antigravity like Skycoin.
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
arc-over-water are you up to date on Maidsafe, they are nearly out of Alpha and its more like release early next year? But that being said, Maidsafe says once it is released it is like a virus or AI type, so does Tau Chain, and also Autonomic by HunterMinerCrafter, are we heading towards AI with Maid, Sky Tau and Autonomic?
dr10 smartbridge now! :kappa:
mike So Skycoin would act as a sort of global decentralized cloud server to build on top of.
To communicate, it is more like sharing encrypted files to selected recipients than it is sending messages or hosting sites on a specific server.
Are you a corporation or foundation or charity? Registered? I am not sure i have seen anything about who you are? What is the dev team size? Background?
I think there are over ~60 people who have worked on Skycoin or have made major contributions. Its really a project from the darknet.
Many of the contributors are anonymous. Some of them have security clearances and were in the military industrial complex and one of them worked at the San Diego Naval Defence Research Lab and a lot of the idea for the networking protocols came out of public sector academic researched, funded from there.
We also have a lot of very very early Bitcoin people, hardcore crypto people that predate Bitcoin and an Ethereum core developer, etc..
On the Chinese side we have an early investor in Alibaba and telecom investor. And are doing pilot with china aviation group (owns four publicly traded airline companies) and apparently now Sinopec (which is 2nd largest publicly traded corporation in world).
Then we have people who are part of israeli and US intelligence and are probably doing some sort of money laundering or phychological operations background, who just showed up for some reason. This group seems very interested in the "applications" of these coins and how to improve tranaction privacy and the specifics of the CoinJoin protocol implementation. We got a lot of advice from people experienced in forensic accounting and what they wanted to see and where they felt Bitcoin was deficient and where it leaked metadata.
Then a bunch of PHD level people doing research into distributed database consensus algorithms and another group doing programming language research.
Then a lot of people from the deep darknet, anon, frog twitter and cipher punks and bitorrent communities. (really should be listed as two seperate groups). And people from the Russian darknet community. We have like eight Ivans. (edited)
I see Skycoin as essentially replacing TCP/IP and providing mesh network type functionality at the hardware level, Ark would run on top of it as a top level application layer.
Yes. The key functionality is two things - connecting to people by public key (networking) - distributing self validating, immutble data peer to peer (transactions, blocks etc... content addressible storage)
And you can build almost anything on those two building blocks. The whole internet will eventually be rewritten on top of those primitives and it will replace many of the existing protocols.
arc-over-water Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
samuelvihollandia Are you planning to enter a different exchange market soon?
arc-over-water Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.. (edited)
thrice.pi with all these outside parties that helped to build skycoin and bring it where it is today who are the main core team who will help to keep all these cool features running. Will these outside parties be recruited for the long haul?
Who is the entity that is funding this? I think you have done 2 ICOs? How much did you receive? The first was 10c and the second was @ 50c per coin, released 6 million, is that correct?
The people who funded the project for the first four years, were early bitcoin and deep crypto people; who were unhappy with the fact that Bitcoin and the other alts did not seem concerned about the core issues at all. They gave us over 1200 bitcoin I think, over several years and did not ask for anything in return.
The early Skycoin devs were doing academic research, architecture and new algorithms. Prototyping and simulation. The later stage people were more project managers and doing implementation.
We did four ICOs for small amounts, to fund development and to allow developers working on the project to buy in. The first ICO I remember was at $0.10 per coin and the price now is about $4.00 per coin, so its up ~35x or 40x, but when you consider the Bitcoin price going from $100 to $3000, the increase has not been so much. lol (edited)
arc-over-water With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
mike Would Intel Edison or Joule, or Samsung Artik 10 work well as a Skywire wireless node? They have 2 Gb-8 Gb RAM, 8-64 Gg eMMC storage, 802.11n wireless, bluetooth, and some with Zigbee?
Have you personally been in Sky from the start? What members have? Who allocates the ICO money etc... I hope you understand that decentralization with investment is a two edged sword, we invest in people but we cannot know these people.... So... we question.
I think there wer three different groups that merged together in first three years, that had similar objectives. Because the code was in different language. There was python, C code and then eventually golang and the golang code became the basis for the current codebase.
The way the coin allocations work, is that it requires unamimious consent for releasing coins and it has to be for a specific, ear marked purpose and can be blocked by any of the devs.
Then there is a pool of coins in bitcoin for various project managers to allocate. And that is an operational fund for paying developers, contractors, marketing etc. Then different people have different responsibilities.
Then we also have corporate funding and sponsorship and some companies paying our full time devs etc, which helps a lot.
arc-over-water Silicon Valley (TV SHOW) recently had their decentralized web running on a network or refrigerators? So i would guess, smart phones, smart gadgets? Home gadgets etc could add services and receive rewards from Sky?
mike best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors. Even chip designers now don't really know what they're putting into the chips since they just drag and drop black boxes known as IP cores into the ASIC designs.
With the price up 35x in about 1 year, is it not now time to cool the run up and release another ICO? At what amount of coins released and what procedure?
I think the Skycoin price has been doubling every 40 days, for as long as I can remember. However, it will still be years before it is in the top 20, its still a long way to climb. It took bitcoin years to go from 0 to $1, even though it was growing at 1% per day the whole time for six years.
best would be a totally open source and publicly audited manufactured system on a chip for the nodes to prevent any backdoors.
we are going to use arm
arc-over-water IOTA is also working on their own hardware for nodes etc, Trinary asset is JINN
synth all intel and AMD systems have remote management engine backdoors. So they are not safe for storing large amounts of coins.
We also have alpine linux and special version of linux, that is 6 MB and has everything that is needed for running our toolchain. It will not have any binary blobs in the kernel or anything that we cant compile from source. It does not have systemd and does not have gli, but uses musl. And does not have openssl.
mike so looks like the Samsung Artik 5 and 10 can run it no problem, they're ARM based. 25x35x4mm package for the Artik 10, Artik 5 is smaller, less powerful but has 2 separate antenna ports, nice for mesh networking with an omni and a directional antenna.
earlyarkinvestor how does Ark compare to Lisk?
synth uploaded this image: 1923810435.jpg Add Comment
earlyarkinvestor isn't Lisk trying to achieve interoperability between blockchains as well
synth uploaded this image: 1433594905.jpg Add Comment
synth uploaded this image: 1432540863.jpg Add Comment
synth uploaded this image: 2049465686.jpg Add Comment
mike nice! looks like an ARM based server rack
let me know if you need any help with it, see you're on solidworks, which I run as well.
synth this is the skycoin cluster; it has 8 CPU boards; 4 cores per CPU, 2 GB of ram per CPU and 64 bit ARM processor. Only one program will run on each individual board, so there is compartmentalization and a physical gap so that compromising one process on a system does no allow all other processes on the system to be compromised
mike looks like 2 ethernet ports per board.
synth and the hardware does not have the qualcom backdoors and is actually chinese equipment; and the backdoors are normally at the kernel level because they are not at hardware backdoors yet
mike do they have SATA ports, maybe M.2 for storage?
synth and we will hav an ARM openwrt router eventually too
this model does not have SATA, but we have a model with SATA; you could hook up 16 2 TB drives, lol and download half the piratebay to your cluster (edited)
the skycoin infrastructure is cluster based and designed for running across +300 computers, with one "node" deployed per computer. Eithe a CXO storage node, or a skywire SDN/meshnet node, or a VPN end point node or a consensus network, or skycoin node, etc. We have multiple node/application types.
so this is a "personal cloud' by itself
its not like StoreJ where you have other people storing your stuff; you are going to have ~5 clusters and 300 computers and can store your own files, on your own internet, on your own hardware. You do not need to go outside of your own network.
mike Have thought it'd be nice to have a board with an array of M.2 sockets to run SSD arrays without all the cables, have the busses shielded in circuit board.
synth yes, i think there will be m.2 eventually
these actually use a microSSD for storage, and its 48MB/s
mike any idea on the pricing on your ARM boards in quantity? We are looking at Intel for Bitseed V3, but ARM would be good to stay with, especially using your boards if there is SATA.
arc-over-water Do you have a general idea of usable functions to be released next in what order? The first release was the Coin and wallet, then the ICOs and can you give a general future with dates if you can
synth the boards are $30 each and the memory for solid state, is actually more than the the cost of the CPU/RAM/board now. Which is sort of insane.
mike so you have microSSD, what's maximum size? we shipping 1with Tb hard drives right now
synth Bitseed mike is going to help with this; so we can pool the boards and do a custom PCB
mike yes, that's where we see the price jumps, is in RAM and eMMC costs.
and it's hard to find low cost boards with SATA
synth try the orange pi
the price goes up 30% for SATA
mike yes, very nice specs.
synth eventually, we will make one that has custom PCB and is a pluggable blade server, I think.
mike I like the Samsung Artiks for the tiny form factor for drone routers, cubesat/picosat possibilities.
but like the fact that you are controlling much deeper down the supply chain with your boards.
synth we only need ram, CPU, then microSD slot; and that is it. so the wifi and all this other stuff is just crap and its junk. We only have communication, storage and computation. So should be minimialist.
submitted by Jarunik to ArkEcosystem [link] [comments]

NB: Каталог onion сайтов

Русскоязычные ресурсы, или где есть ссылки на русскоязычные ресурсы в TOR.
Каталоги, wiki, поисковики:
http://hss3uro2hsxfogfq.onion/ Поисковик в сети TOR
http://zqktlwi4fecvo6ri.onion — HiddenWiki
http://dirnxxdraygbifgc.onion/ — Каталог онион сайтов домен в клирнете, но ищет в tor. По факту каталог с мордой поисковика
http://kpynyvym6xqi7wz2.onion/links.html— Сборник адресов сайтов, в том числе и онион. Много мертвого, но покопаться можно
Торговые площадки и сервисы:
https://blockchainbdgpzk.onion — Зеркало в онион известного онлайн биткоин-кошелька. Дает из под тора регистрировать кошелек и делать переводы. Есть миксер. Интерфейс русифицирован.
http://rusilkusru6f57uw.onion —Russian SilkRoad. Торговая площадка на базе форума.Работает без JavaScript. Для продавцов статус дилера бесплатный, ежемесячных платежей нет, комиссия по факту сделки(платит продавец или покупатель по договоренности). Есть автоматический прием платежей. Моментальные магазины есть.
http://r2d2akbw3jpt4zbf.onion —R2D2. Торговая площадка на базе форума. Раньше регистрация была по инвайтам. Для работы требует включенного в браузере JavaScript. Статус продавца платный + комиссия (платит продавец или покупатель по договоренности). Автоматического приема платежей нет. Моментальных магазинов нет.
http://amberoadychffmyw.onion —Amberoad. Торговая площадка на базе форума. Для работы частично требует включенного в браузере JavaScript. Для продавцов статус дилера платный + комиссия(платит продавец или покупатель по договоренности) + ежемесячные платежи. Автоматического приема платежей нет. Моментальных магазинов нет.
http://www.lwplxqzvmgu43uff.onion— Runion. До недавнего времени информационный ресурс по безопасности. Сейчас добавили платные услуги по торговле. Написано, что есть автоматическая торговля. Комиссию платит продавец или покупатель по договоренности.
http://malina2ihfyawiau.onion —Malina. Торговая площадка на базе форума. Для работы требует включенного в браузере JavaScript. Статус продавца платный + комиссия (платит продавец или покупатель по договоренности). Автоматического приема платежей нет. Моментальных магазинов нет.
http://rospravovkdvaobr.onion —Росправосудие. Зеркало известного сайта в онионе.
http://ajyltarwd6xmvhlu.onion —Русский чат. Тематика не указана.
http://xz5sdhbwrm4vvkxh.onion —Киберберкут в онионе.
Englisn onion
Introduction points, forums, links, search engines, information, chat, personal blogs”normal sites”
The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
The Uncensored Hidden wiki http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page
Vault 43 (useful) http://vault43z5vxy3vn3.onion/
Imperial Library of TOR http://xfmro77i3lixucja.onion/
Yet another tor directory http://bdpuqvsqmphctrcs.onion/
Grams (search) http://grams7enufi7jmdl.onion/
The Hub (forum) http://thehub7dnl5nmcz5.onion/
Agora Forum http://lacbzxobeprssrfx.onion/
Onion soup (links n stuff) http://soupksx6vqh3ydda.onion/
TORUM (forum) http://torum4kqr55yqui6.onion/
Overchan (alittle of everything it seems) http://oniichanylo2tsi4.onion/
TORCH (search) http://xmh57jrzrnw6insl.onion/
French IRC Tor http://fitwebwmjekqsyrw.onion/
TORsearch http://kbhpodhnfxl3clb4.onion/
Yacy (search) http://yacy2tp5a2dhywmx.onion/
OnionDir (links) http://dirnxxdraygbifgc.onion/
Burnout (links) http://burnoutxf6o2yvsw.onion/
TOR Hidden Service (search) http://msydqstlz2kzerdg.onion/search/
Q&A(like yahoo answers) http://pequ3i77q5l4w4sw.onion/
Benji’s Blog http://sonntag6ej43fv2d.onion/en
Secret Stash (blog) http://dn4hcr3qhlpaiygr.onion/
Cruel Onion forum (forum for “bad* things) http://cruel2ijkqggizy5.onion/forum/
The Plague (links and things) http://zseijor556d5t4yf.onion/
Dark News (forum) http://xhb4vpn4a67sug7t.onion/
Spreadit (looks alittle like reddit) http://jdl3nf2hr3ehzyoc.onion/
Wizardry & Steamwork (search) http://kaarvixjxfdy2wv2.onion/
Myles Braithwaite http://gvvsa367g2zkzjj3.onion/
TOR links http://torlinkbgs6aabns.onion/
Nudist Paradise (site for nudists) http://qvchmzewlf4efhcw.onion/
DeepWeb Ministries (religios site) http://hxnibog5m2ocjeef.onion/
SIN Strategic INtelligence Network (be prepared for any situation) http://4iahqcjrtmxwofr6.onion/
Add any link (links) http://vizpz65utiopch7t.onion/
Shadow Life (news) http://shadow7jnzxjkvpz.onion/
Usenet file search http://wbyi72yt6gitdcqd.onion/
Liberty blog (free blogs) http://crylibertytwta4s.onion/
Intel Exchange (forum) http://rrcc5uuudhh4oz3c.onion/
GUROChan (message board) http://gurochanocizhuhg.onion/
Maxima Culpa (virtual confessions) http://nsmgu2mglfj7za6s.onion/
Onion DIR (links) http://chl7b5p6rr64po3s.onion/
Leonhard Weese (personal blog) http://liongrasr5uy5roo.onion/
YHIMA (links) http://ogbinmlotgjwgkeo.onion/
Sanctioned Suicide (forum) http://suicideocymrgxq7.onion/
anon confessions http://confessx3gx46lwg.onion/
OnionNet (links news etc) http://ubbchzof2pxs4swi.onion/
Surveilance Law http://7vrl523532rjjznj.onion/
BLue Onion (books) http://blue3237xytrz5rk.onion/blueonion/
The Hidden Forum http://ewd5a7hnvc4necnf.onion/index.php
SImple Store http://dharyyzdhok5eudi.onion/store/
Bad Ideas Forum http://7x5rg44gkhtovwjt.onion/forum/index.php
FUD (discussion board) http://bssjumzkbj3vlhiy.onion/
Hidden links http://hidhost5gk6w7ahf.onion/hidlinks/links.php
Facebook on tor? https://facebookcorewwwi.onion/
FBI Chan http://fbichanc6yfagl4l.onion/
Readers Club http://c3jemx2ube5v5zpg.onion/
Weblog http://6e3i6bqjgnmtn3fu.onion/
Marketplaces and stores
EasyCoin – Bitcoin Wallet with free Bitcoin Mixer. http://easycoinsayj7p5l.onion/
WeBuyBitcoins – Sell your Bitcoins for Cash, PP and more. http://jzn5w5pac26sqef4.onion/
OnionWallet – Anonymous Bitcoin Wallet and Bitcoin Laundry. http://ow24et3tetp6tvmk.onion/
EuCanna – ‘First Class Cannabis Healthcare’ http://rso4hutlefirefqp.onion/
Peoples Drug Store – The Darkweb’s Best Drug Supplier! http://newpdsuslmzqazvr.onion/
Smokeables – Finest Organic Cannabis shipped from the USA. http://smoker32pk4qt3mx.onion/
CannabisUK – UK Wholesale Cannabis Supplier. http://fzqnrlcvhkgbdwx5.onion/
DeDope – German Weed and Hash shop. (Bitcoin) http://kbvbh4kdddiha2ht.onion/
BitPharma – EU vendor for cocaine, speed, mdma, psychedelics. http://s5q54hfww56ov2xc.onion/
Brainmagic – Best psychedelics on the darknet. http://ll6lardicrvrljvq.onion/
NLGrowers – Coffee Shop grade Cannabis from the netherlands. http://25ffhnaechrbzwf3.onion/
Kamagra for Bitcoin – Same as Viagra but cheaper! http://k4btcoezc5tlxyaf.onion/
Mobile Store – unlocked iphones and other smartphones. http://mobil7rab6nuf7vx.onion/
UK Guns and Ammo – Selling Guns and Ammo from the UK. http://tuu66yxvrnn3of7l.onion/
Rent-A-Hacker – Hacking, DDOS, Social Engeneering etc. http://2ogmrlfzdthnwkez.onion/
Onion Identity Services – Selling Passports and ID-Cards. http://abbujjh5vqtq77wg.onion/
HQER – High quality euro bills replicas / counterfeits. http://y3fpieiezy2sin4a.onion/
USD Counterfeits – High quality USD counterfeits. http://qkj4drtgvpm7eecl.onion/
USA Citizenship – Get a real USA passport. http://xfnwyig7olypdq5r.onion/
Apples4Bitcoin – Cheap Apple products for Bitcoin. http://tfwdi3izigxllure.onion/
ccPal – CCs, CVV2s, Ebay, Paypals and more. http://3dbr5t4pygahedms.onion/
EuroGuns – Your #1 european arms dealer. http://2kka4f23pcxgqkpv.onion/
UK Passports – Original UK Passports. http://vfqnd6mieccqyiit.onion/
USfakeIDs – High quality USA Fake Drivers Licenses. http://en35tuzqmn4lofbk.onion/
Tech, technology, computers, hackers for hire, hacking/anarchy related materials
MacLemon (security, news, links) http://fzybdgczph7xfdnr.onion/
TOR Status – Tor network status http://jlve2y45zacpbz6s.onion/
TorPGP public key server http://torpgp3ujaysucll.onion/
Altera Praxis (not sure what this is tbh) http://ncivdawfxihoh7sj.onion/about.html
keybase (some sort of hackestalker tool idk) http://fncuwbiisyh6ak3i.onion/
Tor Web Devolper (for hire) http://qizriixqwmeq4p5b.onion/
Web Programmer (for hire) http://kobrabd77ppgjd2r.onion/
Ozy’s Hacking Service (hacker for hire) http://ozy7mnciacbc5idc.onion/
Pioopioo’s Services (hacker for hire) http://rowtogxp2akwem6n.onion/
Hacker place http://hackerw6dcplg3ej.onion/
Parazite (anarchy info mainly) http://kpynyvym6xqi7wz2.onion/
DNS support forum http://mj6vjwhtyahcj6fx.onion/
BitMessage mail gateway http://bitmailendavkbec.onion/
Keys Open Doors http://wdnqg3ehh3hvalpe.onion/
Hidden Service howto http://nfokjgfj3hxs4nwu.onion/
JRAT (java remote administration tool) http://jratoc334zo7zgis.onion/
FILTH (fuck i love to hack) http://om2ak3coziov3dbc.onion/forum/index.php
Onion Domains & MD5sums http://xlmvhk3rpdux26dz.onion/
Soylent News http://skgmctqnhyvfava3.onion/
Bluish Coder http://mh7mkfvezts5j6yu.onion/
Cable Viewer (idk what this is but its techy) http://leakager742hufco.onion/
Xerbot http://xfthw4bq7lx2y726.onion/
Hack Canada http://hackcanl2o4lvmnv.onion/
Imperial anarchist despotism http://rgeo5wj7gneidzh3.onion/
Directory Listing Denied (anon web ftp) http://wtutoxfznz45gf6c.onion/
Anarplex (some kind of computer anarchy) http://y5fmhyqdr6r7ddws.onion/
GhostDeveloper (freelance programmer) http://develggxuazrcokn.onion/
SKS Onion key server http://lbnugoq5na3mzkgv.onion/index.html
GNUPG http://ic6au7wa3f6naxjq.onion/
Cat facts http://2v7ibl5u4pbemwiz.onion/
Chess (game) http://theches3nacocgsc.onion/
Necro town (links n stuff) http://nekrooxwwskakacj.onion/
Encryption Password Generator http://pwgenmwi7eqsys76.onion/ jabber http://yz6yiv2hxyagvwy6.onion/
M5S leaks http://33pvcdba2nm3afnj.onion/
A cgi proxy http://x5yd2gfthlfgdqjg.onion/
FIT French IRC TOR http://fit2v7z4plpfyh2h.onion/
The Linux Documentation Project http://3c2rvufmbcggnqi6.onion/
Crypto Party http://cpartywvpihlabsy.onion/
Hive Archives http://thehivemwon6a5mp.onion/
txtorcon (python contril library for tor) http://timaq4ygg2iegci7.onion/
Rhodium (science stuff) http://rhodiumio4b7b4rm.onion/
Hackerspace Prague http://pmwdzvbyvnmwobk5.onion/
Political, activists, groups, journalism, whistle blowing etc
Youth Rage forum http://neyigf7eragkp5nq.onion/forum/
Associated Whistleblowers http://w6csjytbrl273che.onion/#/
Community X recruitment http://gp5tycij54ri7xcz.onion/
Code Green (ethical hacktivism) http://pyl7a4ccwgpxm6rd.onion/
Infodio Leaks http://ymi7h25hgp3bj63v.onion/#/
Wiki Leaks http://zbnnr7qzaxlk5tms.onion/
Zwitterion’s Domain http://3il6wiev2pnk7dat.onion/
Secure wildlife whistle blowing http://ppdz5djzpo3w5k2z.onion/#/
Freedom of the press foundation http://freepress3xxs3hk.onion/
the loli advocacy server http://lolikaastbgo5dtk.onion/
Global Leaks http://h73hx2munq7q465s.onion/#/
Tactical Technology http://hrkdpwrkh3lbow2l.onion/
Fund the islamic struggle http://teir4baj5mpvkg5n.onion/
Internet Governance Transparency http://k52lcjc5fws3jbqf.onion/
We fight censorship http://3kyl4i7bfdgwelmf.onion/
Anon Insiders http://imtrjn3qe2tzh5ae.onion/
Map Mos Maiorum (refugee help) http://iuektur6bicvfwcq.onion/ushahidi/
wiki leaks http://jwgkxry7xjeaeg5d.onion/
Anonymity, Security
includes secure email, chat, etc Anonet wiki http://xz2rtmpjjwvdw44p.onion/
Secure Messaging http://sms4tor3vcr2geip.onion/
MailTor http://mailtoralnhyol5v.onion/src/login.php
Lelantos email http://lelantoss7bcnwbv.onion/
Onion Mail http://p6x47b547s2fkmj3.onion/
JitJat (messaging) http://jitjatxmemcaaadp.onion/login.php
TOR PasteBin http://postits4tga4cqts.onion/
RetroShare chat server http://chat7zlxojqcf3nv.onion/
ProtectTOR55 http://protector55z5s7j.onion/
Zerobin http://zerobinqmdqd236y.onion/
TOR chat roulette http://tetatl6umgbmtv27.onion/
SIGAINT (email) http://sigaintevyh2rzvw.onion/
Offshore mail server http://inocncymyac2mufx.onion/
web/irc chat thing http://6ejbuiwnp77gu67h.onion/
FreeFor (chat) http://tns7i5gucaaussz4.onion/
Volatile (chat n stuff) http://vola7ileiax4ueow.onion/
Hosting, web, file, image
Onionweb File Hosting (100mb limit) http://3fnhfsfc2bpzdste.onion/
Hidden Hosting http://7zzohostingx4mes.onion/
Free Hosting links http://a5ok374pjcq7bsyp.onion/
Darknet services http://darknet4x3hcv5zp.onion/
Infernet Dark Hosting http://a5ok374pjcq7bsyp.onion/
IMG.BI (image hosting) http://imgbifwwqoixh7te.onion/
Secure Drop http://v6gdwmm7ed4oifvd.onion/
CYRUSERV http://cyruservvvklto2l.onion/
Free TOR Hosting http://zuxtem3jcv2fvmgk.onion/
Home Hosting (how to) http://dmru36nvfgtywx47.onion/
Real Hosting http://hosting6iar5zo7c.onion/
TorSafe (file hosting) http://torsafeiwttlkul6.onion/accounts/login/
Real Hosting http://ezuwnhj5j6mtk4xr.onion/
TOR VPS http://torvps7kzis5ujfz.onion/index.php/TorVPS
Kowloon (hosting) http://kowloon5aibdbege.onion/
Onion Pastebin http://pastetorziarobi7.onion/
Popfiles (file hosting) http://popfilesxuru7lsr.onion/
Hidden Hosting http://offshore6gq7ykr7.onion/
Darknet Solutions (hosting and design) http://darknet47je5xwm6.onion/
Onion uploader (file hosting up to 100mb) http://nk3k2rsitogzvk2a.onion/
Media, music, movies, art, cartoons, comics etc*
Skeletor.bit http://okzatvfk2jzgvmf4.onion/
Yay Ponies http://ponieslzi3ivbynd.onion/
HFS (music) http://wuvdsbmbwyjzsgei.onion/
Sea Kitten Palace (torrents) http://wtwfzc6ty2s6x4po.onion/
Manga http://negimarxzov6ca4c.onion/
Comics http://7etxnv26hro7mmuu.onion/
Deep Tune (music) http://tune4xs6mj2evcr6.onion/
TorFlix (movies) http://jl4m7ubpotnu2yos.onion/
No name, not sure if its music or speak but its mp3’s http://xf3fjq4b7j6pswuq.onion/
Gone Things (printable images) http://32ixi6myw3things.onion/
ORVoice (music) http://orvoicemur72h7rx.onion/TO
Index of (music) http://uuxrei5or65anucg.onion/
My little pony http://mlpfimf74svi6y4q.onion/s01/
The audiobook vault http://xmctuxj7dsymumwf.onion/
DOXBIN http://doxbinbircrfbqvg.onion/ This is a big list of peoples personal information basicly, seems like a dump for info that hackers might want to retreive at a later date, but also seems like a show off site. Im not sure how to interpret all this
Riseup http://zsolxunfmbfuq7wf.onion/rc/
Thunder’s Place (penis enlargement) http://thundersplv36ecb.onion/
Smart5 (forum, for what idk though) http://smart5ywvuwbmzfd.onion/
German TOR Library (documents, files, on what subject idk) http://pqfja3rzroprkfq6.onion
Dying Breed (forum, idk what for) http://g6o7aurv4c3ixalq.onion/index.php
Hers some random cords. lat/long http://4k2oq3fswx35a72s.onion/
Zyprexa kills http://tdkhrvozivoez5ad.onion/
Cat out of the bag http://vkpriz2cjzymgpsp.onion/
XL33tVill3 (links and idk what) http://tt75atziadj4duff.onion/sindex.html
i really dont know what to say http://rjzdqt4z3z3xo73h.onion/
Solar display http://zgypn3izock2oqny.onion/
GIF files (global intelligence files) http://gkqmy7ioqptiru5o.onion/gifiles/
Hacked http://7o46qra2jkz3k3kx.onion/
GreatDumps http://www.greatobxvv7etokq.onion/?
International journal of proof of concept or GTFO http://pocgtfo7tu77thrp.onion/
Elize chatbot http://opnju4nyz7wbypme.onion/
Cryptome (im not sure where to put this so its here) http://y6q2mnorhmsfdm3r.onion/
Pastebin http://5aklnwbibkhrtbs6.onion/
submitted by Jayson_Roger to JRHarbor [link] [comments]

[Table] IAmA: I am Mikko Hypponen, a computer security expert. Ask me anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2014-12-02
Link to submission (Has self-text)
Questions Answers
Do you still do malware analysis as a part of your day job ? Do you have some advices for someone searching a job in the field ? You need to pick your focus area. What do you want to do? Penetration testing? Encryption? Malware analysis? Forensics? Underground intelligence? Counter-espionage? Then you need to find mentors and coaches. The easiest way to do this is via online forums dedicated to your focus area. For example, check
SANS has some great online resources for people starting up in this area: check them out.
Do you see malware analysis as a growth field for careers? Why? Good malware analysts will always get a job. And malware isn't going to go away any time soon.
It's not just security companies who are hiring people in this field. Many large companies and telcos have their own CERT teams which hire malware analysts.
Is it true that it isn't a huge challenge to modify malware in a way that it is not detected by any current anti virus program, so that people building bot nets or infiltrating computers with Trojans usually smuggle them past virus scanners? It's trivial to modify existing malware so that traditional antivirus programs won't detect it any more. It only takes couple of minutes.
That's why antivirus programs have been moving towards behaviour-based detection models as well as towards reputation-based detection models.
Do note that testing behaviour-based blocking is hard. That's why it's misleading when people post links to sites such as Virustotal as evidence that particular file is 'not detected by AVs'. There's no way to know if a particular antivirus would have blocked the file, unless you would try to run it.
"As far as we can see, this program has never been executed by anyone else anywhere. You are the first person on the planet to run this file. This is highly unusual. We will block this file, even though we can't find any known malware from the file"
The only problem with this scenario are software developers, who compile their own programs. They obviously are the first persons on the planet to run a particular program - as they made it themselves! They can easily whitelist their output folder to avoid this problem though.
Can you recommend any behaviour-based or reputation-based blocking software in particular (for Windows and/or OS X)? Well, our own antivirus has these built in.
Europol's cybercrime taskforce recently took down over a hundred darknet servers. Did the news shake your faith in TOR? People use Tor for surfing the normal web anonymized, and they use Tor Hidden Service for running websites that are only accessible for Tor users.
Both Tor use cases can be targeted by various kinds of attacks. Just like anywhere else, there is no absolute security in Tor either.
I guess the takedown showed more about capabilities of current law enforcement than anything else.
I use Tor regularily to gain access to sites in the Tor Hidden Service, but for proteting my own privacy, I don't rely on Tor. I use VPNs instead. In addition to providing you an exit node from another location, VPNs also encrypt your traffic. However, Tor is free and it's open source. Most VPNs are closed source, and you have to pay for them. And you have to rely on the VPN provider, so choose carefully. We have a VPN product of our own, which is what I use.
I use a VPN regularly from work to bypass filters, and at home to avoid those pesky cease-and-desists. Although I'm not a infosec professional I've always heard that how secure you are using a VPN is directly related to whether or not their logs of your traffic can be traced back to you. How secure in your opinion are VPN providers (such as PIA which I personally use)? And in wake of the prevalence of government surveillance now can VPN providers claims of 'not keeping logs' be trusted to protect privacy? Use a VPN provider you trust. Someone who's been in the security business for a long while. Also, aim for a vendor who doesn't store logs of user activity.
Do you keep logs on the VPN? Freedome stores no logs.
How safe are current smart phones and how secure are their connections? Are special phones used by politicians really safe, or do they get hacked as well? The operating systems on our current phones (and tablets) are clearly more secure than the operating systems on our computers. That's mostly because they are much more restricted.
Windows Phones and iOS devices don't have a real malware problem (they still have to worry about things like phishing though). Android is the only smartphone platform that has real-world malware for it (but most of that is found in China and is coming from 3rd party app stores).
It is interesting the Android is the first Linux distribution to have a real-world malware problem.
Lot's of people are afraid of the viruses and malware only simply because they are all over the news and realtively easy to explain to. I am personally more afraid of the silently allowed data mining (i.e. the amount of info Google can get their hands on) and social engineering style of "hacking". Companies like Google and Facebook make money by trying to gather as much information about you as they can. But Google and Facebook are not criminals and they are not breaking the law.
How would you compare these two different threats and their threat levels on Average Joes point of view - which of them is more likely to cause some harm. Or is there something else to be more afraid of even more (govermental level hacks/attacks)? There are different problems: problems with security and problems with privacy. Security problems come from criminals who do break the law and who directly try to steal from you with attacks like banking trojans or credit card keyloggers. Blanket surveillance of the internet also affects us all. But comparing these threats to each other is hard.
Thoughts on bitcoin from a security standpoint? Bitcoin is interesting, in many different ways.
I do believe in cryptocurrencies. It might not be Bitcoin that changes the world, but something built on that will.
We see Bitcoin in our line of work all the time. Wallet theft. Ransomware where Bitcoin are used to pay the ransoms. Mining trojans.
However, that's just like blaming cash for being too handy for drug dealers.
Bitcoin is just a tool. Can be used for good or bad.
Favorite debugging tool? I've always had a soft spot for the old DEBUG.EXE that shipped with MS-DOS...
E0100 B0 13 CD 10 68 00 A0 07 31 FF B1 C8 E8 20 00 51.
E0110 B9 40 01 E8 19 00 D8 C3 DF 1C D8 E3 8A 04 DF 1C.
E0120 32 04 24 1F AA E2 EC 59 E2 E2 83 07 10 EB D9 89.
E0130 0C DF 04 D9 C0 DE 07 DE 74 04 D9 FE DE 4C 14 C3.
Is this real? Link to No, that's not how you break into a system in the real world.
Another timely rebuttal of movie hacking, speaking about the ads for the upcoming Black Hat movie: Link to - this one is written by Dan Tentler.
With the rise of the Internet of Things, what measures can we take to better secure ourselves in regards to home devices (laptops, smart-tvs, etc)? Well, you won't be running an antivirus on your washing machine or toaster, that's for sure.
The real-world attacks against IoT devices are still limited - mostly because the ways of making money by hacking washing machines and so are limited.
As a result, the IoT security solutions aren't really widely available yet. They will be in the future though.
Is it unethical to release viruses that kill viruses? Or would it be hard to tell the good buys from the bad guys (eventually)? The idea of a 'good virus' has been discussed to death already years ago. The consensus is that anything good that could be done with self-replicating code could be done better without the replication.
See Dr. Vesselin Bontchev's seminal paper on this: Link to
I have a dream. Link to Nice pic...
Linux distributions generally don't need antivirus, but apart from the fact that most malware is written for Windows, why do you think this is? If linux became the popular choice on desktops, do you think it would be as prone to malware as Windows is? How about OS X? Most mobile malware IS written for Linux, since most smartphones run Linux.
So first and foremost, it's a question of market shares.
After that it's a question of attacker skillsets. If the attackers have been writing Windows malware since Windows XP, they aren't likely to stop and switch easily to OS X or Linux unless they have to. And they don't have to.
What's your take on security researchers withholding their findings regarding state sponsored malware for 'global security concerns'? Kaspersky and Symantec both withheld information about Reign malware. Is this common? Is it ethical? Why are security companies beholden to the intelligence community and not the people who pay them for their services and advice? How can this conflict of interest be resolved while retaining independence and integrity? Nobody was withholding detection. Everybody detected all Regin-related files they had, and protected the end users. Which one would you rather have us to do? Sign an NDA, get the samples and protect our users? Or not sign the NDA and not protect our users.
Many people I talk to about this privacy thingy say "I have nothing to hide, so why bother". Do you think this will ever change, that people would start caring about this? Have you already seen the general opinion sifting...? Some people will always say this. But they are always the people who haven't really thought it through.
If you have nothing to hide, you can't keep a secret. If you have nothing to hide, show me your search history. If you have nothing to hide, give me your password. If you have nothing to hide, I can't trust you.
At this point, what do you personally feel about security and mass surveillance in a post-Snowden world where still not much has changed? I've learned that many, many people just don't care. Which is depressing.
If you don't care about mass surveillance for your own case, how about caring on behalf of the future generations?
Last updated: 2014-12-06 14:37 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

How to Buy Cryptocurrency for Beginners (Ultimate Step-by-Step Guide) Pt 1 Crypto Wallets Explained how to purchase bitcoins for deep web How To order off the darknet using bitcoin links provided How to Buy Bitcoin on Coinbase and Move it to the Electrum Bitcoin Wallet

The movie’s screenwriter, Mick Sands, is also a crypto enthusiast, Harris continued, adding that the fact that the mere existence of Bitcoin is a threat to the U.S. government is fascinating to him. Anyone can visit the official website and watch the movie for a ticket price of $5.88 With over 11 Million Wallets created, we’re building new features our users need most in What bitcoin wallets are. It’s tempting to think about bitcoin wallets as being similar to regular wallets. But this isn’t really a good analogy to start off with. Unlike an everyday wallet, where we keep coins and banknotes, coin wallets don’t actually store your bitcoin. Instead, they secure your funds by guarding your private keys. That is not surprising, considering this movie tells the story of Silk Road, bitcoin, and politics found on the darknet. It is quite an intriguing move, which was released back in march of 2015. Bitcoin should be addressed as pseudonymous, as the public key is the alias. Another possible breach in user anonymity in Bitcoin is following transactions made from Bitcoin ATMs to wallets, which can usually indicate a geographical location of the wallet owner.

[index] [8971] [9487] [30287] [19090] [30687] [15876] [12980] [14463] [11833] [1997]

How to Buy Cryptocurrency for Beginners (Ultimate Step-by-Step Guide) Pt 1

The Crypto Dad show you how to move Bitcoin from a Coinbase account to the Electrum Bitcoin wallet Related videos on my YouTube Channel How to set up a Coinbase account: ... Lean on me when you're not strong (with #Bitcoin & NEWS!) (2020-07-16) - $9132 #THS World Crypto Network 31 watching Live now Top Five Useful Knots for camping, survival, hiking, and more ... 50+ videos Play all Mix - How To order off the darknet using bitcoin 💯links provided YouTube; Dark Web Credit Card SCAMMING 101 - Duration: 16:31. Alexander Lorenzo 73,250 views. 16:31 ... How To order off the darknet using bitcoin 💯links provided - Duration: 11:58. SBCPHARMACIST LIFESTYLE 22,341 views. 11:58. 4 Ways To Get Bitcoin Anonymously - Duration: 6:27. Sicheres Bitcoin Wallet erstellen - Schritt-für-Schritt Anleitung - Electrum Deutsch Geldbeutel 🔒 - Duration: 9:07. Talerbox Invest Smart 143,315 views 9:07

Flag Counter