21dotco: A bitcoin miner in every device and in every hand ...

This is a public service announcement to anyone who's foolish enough to still be using windows

This is a public service announcement to anyone who's foolish enough to still be using windows 10, windows 8, windows 7, vista, and also windows xp. your operating system is now fully compromised, and no, this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vagene or the cia backdooring your operating system so that they can spy on you it is far worse then that the international hacker known as 4chan has successfuly reverse engineered your operating system they know the sorce code, they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates, and things are about to get even worse, you thought viruses like wannacry caused a lot of damage? that's childsplay. the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code is out in the open everybody can see it and your computer is more screwed then an unchaperoned toddler on epstein's island dring a bill clinton visit your kernel is going down faster then a golden retriever at the atf's headquarters. now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is to load up dban, completely remove any trace of windows, or any other proprietary bullshit operating system that came with your computer, and then install gentoo and use that for the rest of eternity to do your computing. if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all the horrible bullcrap and spaghetti code that makes up windows. if you can't figure out how to use linux mint then you should just sell your computer, purchase a horse and buggy, and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter. hopefully the many years of you beating off to cam girls will translate into good butter churning skills so you can earn a living as an amish person. if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it, microsoft has never even heard of the word consent, but instead of these updates coming from microsoft themself, bill gates himself, they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system, internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on, oh and also your webcam will permanently live stream to liveleak so watch out for chinese truck drivers and off-duty brazzilian police officers. now i don't want to hear any of you wondering all of a sudden oh woe is me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience and going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you did nothing, edward snowden revealed that bioluminescent goverment agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and had to flee the united states and go live in a russian airport bathroom and yet you continued using windows purchasing a new copy every few years making bill gates a gorillianare in the process so that he could get ot his end goal of injecting windows updates directly into the bloodstream of every person in the world and newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan, the hacker, has taken it to the extreme. you will no longer be using your operating system it will se you, it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system. now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser will be permanently set to 4channel.org, uh, also microsoft word is going to be replaced with vim so good luck doing your homework on there hopefully you know how to quit out of it. you have been warned now go install gentoo or suffer the consequences or like i said sell all your electronics and go be amish because the amish don't get computer viruses
submitted by bobbyboob6 to copypasta [link] [comments]

Proposal: The Sia Foundation

Vision Statement

A common sentiment is brewing online; a shared desire for the internet that might have been. After decades of corporate encroachment, you don't need to be a power user to realize that something has gone very wrong.
In the early days of the internet, the future was bright. In that future, when you sent an instant message, it traveled directly to the recipient. When you needed to pay a friend, you announced a transfer of value to their public key. When an app was missing a feature you wanted, you opened up the source code and implemented it. When you took a picture on your phone, it was immediately encrypted and backed up to storage that you controlled. In that future, people would laugh at the idea of having to authenticate themselves to some corporation before doing these things.
What did we get instead? Rather than a network of human-sized communities, we have a handful of enormous commons, each controlled by a faceless corporate entity. Hey user, want to send a message? You can, but we'll store a copy of it indefinitely, unencrypted, for our preference-learning algorithms to pore over; how else could we slap targeted ads on every piece of content you see? Want to pay a friend? You can—in our Monopoly money. Want a new feature? Submit a request to our Support Center and we'll totally maybe think about it. Want to backup a photo? You can—inside our walled garden, which only we (and the NSA, of course) can access. Just be careful what you share, because merely locking you out of your account and deleting all your data is far from the worst thing we could do.
You rationalize this: "MEGACORP would never do such a thing; it would be bad for business." But we all know, at some level, that this state of affairs, this inversion of power, is not merely "unfortunate" or "suboptimal" – No. It is degrading. Even if MEGACORP were purely benevolent, it is degrading that we must ask its permission to talk to our friends; that we must rely on it to safeguard our treasured memories; that our digital lives are completely beholden to those who seek only to extract value from us.
At the root of this issue is the centralization of data. MEGACORP can surveil you—because your emails and video chats flow through their servers. And MEGACORP can control you—because they hold your data hostage. But centralization is a solution to a technical problem: How can we make the user's data accessible from anywhere in the world, on any device? For a long time, no alternative solution to this problem was forthcoming.
Today, thanks to a confluence of established techniques and recent innovations, we have solved the accessibility problem without resorting to centralization. Hashing, encryption, and erasure encoding got us most of the way, but one barrier remained: incentives. How do you incentivize an anonymous stranger to store your data? Earlier protocols like BitTorrent worked around this limitation by relying on altruism, tit-for-tat requirements, or "points" – in other words, nothing you could pay your electric bill with. Finally, in 2009, a solution appeared: Bitcoin. Not long after, Sia was born.
Cryptography has unleashed the latent power of the internet by enabling interactions between mutually-distrustful parties. Sia harnesses this power to turn the cloud storage market into a proper marketplace, where buyers and sellers can transact directly, with no intermediaries, anywhere in the world. No more silos or walled gardens: your data is encrypted, so it can't be spied on, and it's stored on many servers, so no single entity can hold it hostage. Thanks to projects like Sia, the internet is being re-decentralized.
Sia began its life as a startup, which means it has always been subjected to two competing forces: the ideals of its founders, and the profit motive inherent to all businesses. Its founders have taken great pains to never compromise on the former, but this often threatened the company's financial viability. With the establishment of the Sia Foundation, this tension is resolved. The Foundation, freed of the obligation to generate profit, is a pure embodiment of the ideals from which Sia originally sprung.
The goals and responsibilities of the Foundation are numerous: to maintain core Sia protocols and consensus code; to support developers building on top of Sia and its protocols; to promote Sia and facilitate partnerships in other spheres and communities; to ensure that users can easily acquire and safely store siacoins; to develop network scalability solutions; to implement hardforks and lead the community through them; and much more. In a broader sense, its mission is to commoditize data storage, making it cheap, ubiquitous, and accessible to all, without compromising privacy or performance.
Sia is a perfect example of how we can achieve better living through cryptography. We now begin a new chapter in Sia's history. May our stewardship lead it into a bright future.
 

Overview

Today, we are proposing the creation of the Sia Foundation: a new non-profit entity that builds and supports distributed cloud storage infrastructure, with a specific focus on the Sia storage platform. What follows is an informal overview of the Sia Foundation, covering two major topics: how the Foundation will be funded, and what its funds will be used for.

Organizational Structure

The Sia Foundation will be structured as a non-profit entity incorporated in the United States, likely a 501(c)(3) organization or similar. The actions of the Foundation will be constrained by its charter, which formalizes the specific obligations and overall mission outlined in this document. The charter will be updated on an annual basis to reflect the current goals of the Sia community.
The organization will be operated by a board of directors, initially comprising Luke Champine as President and Eddie Wang as Chairman. Luke Champine will be leaving his position at Nebulous to work at the Foundation full-time, and will seek to divest his shares of Nebulous stock along with other potential conflicts of interest. Neither Luke nor Eddie personally own any siafunds or significant quantities of siacoin.

Funding

The primary source of funding for the Foundation will come from a new block subsidy. Following a hardfork, 30 KS per block will be allocated to the "Foundation Fund," continuing in perpetuity. The existing 30 KS per block miner reward is not affected. Additionally, one year's worth of block subsidies (approximately 1.57 GS) will be allocated to the Fund immediately upon activation of the hardfork.
As detailed below, the Foundation will provably burn any coins that it cannot meaningfully spend. As such, the 30 KS subsidy should be viewed as a maximum. This allows the Foundation to grow alongside Sia without requiring additional hardforks.
The Foundation will not be funded to any degree by the possession or sale of siafunds. Siafunds were originally introduced as a means of incentivizing growth, and we still believe in their effectiveness: a siafund holder wants to increase the amount of storage on Sia as much as possible. While the Foundation obviously wants Sia to succeed, its driving force should be its charter. Deriving significant revenue from siafunds would jeopardize the Foundation's impartiality and focus. Ultimately, we want the Foundation to act in the best interests of Sia, not in growing its own budget.

Responsibilities

The Foundation inherits a great number of responsibilities from Nebulous. Each quarter, the Foundation will publish the progress it has made over the past quarter, and list the responsibilities it intends to prioritize over the coming quarter. This will be accompanied by a financial report, detailing each area of expenditure over the past quarter, and forecasting expenditures for the coming quarter. Below, we summarize some of the myriad responsibilities towards which the Foundation is expected to allocate its resources.

Maintain and enhance core Sia software

Arguably, this is the most important responsibility of the Foundation. At the heart of Sia is its consensus algorithm: regardless of other differences, all Sia software must agree upon the content and rules of the blockchain. It is therefore crucial that the algorithm be stewarded by an entity that is accountable to the community, transparent in its decision-making, and has no profit motive or other conflicts of interest.
Accordingly, Sia’s consensus functionality will no longer be directly maintained by Nebulous. Instead, the Foundation will release and maintain an implementation of a "minimal Sia full node," comprising the Sia consensus algorithm and P2P networking code. The source code will be available in a public repository, and signed binaries will be published for each release.
Other parties may use this code to provide alternative full node software. For example, Nebulous may extend the minimal full node with wallet, renter, and host functionality. The source code of any such implementation may be submitted to the Foundation for review. If the code passes review, the Foundation will provide "endorsement signatures" for the commit hash used and for binaries compiled internally by the Foundation. Specifically, these signatures assert that the Foundation believes the software contains no consensus-breaking changes or other modifications to imported Foundation code. Endorsement signatures and Foundation-compiled binaries may be displayed and distributed by the receiving party, along with an appropriate disclaimer.
A minimal full node is not terribly useful on its own; the wallet, renter, host, and other extensions are what make Sia a proper developer platform. Currently, the only implementations of these extensions are maintained by Nebulous. The Foundation will contract Nebulous to ensure that these extensions continue to receive updates and enhancements. Later on, the Foundation intends to develop its own implementations of these extensions and others. As with the minimal node software, these extensions will be open source and available in public repositories for use by any Sia node software.
With the consensus code now managed by the Foundation, the task of implementing and orchestrating hardforks becomes its responsibility as well. When the Foundation determines that a hardfork is necessary (whether through internal discussion or via community petition), a formal proposal will be drafted and submitted for public review, during which arguments for and against the proposal may be submitted to a public repository. During this time, the hardfork code will be implemented, either by Foundation employees or by external contributors working closely with the Foundation. Once the implementation is finished, final arguments will be heard. The Foundation board will then vote whether to accept or reject the proposal, and announce their decision along with appropriate justification. Assuming the proposal was accepted, the Foundation will announce the block height at which the hardfork will activate, and will subsequently release source code and signed binaries that incorporate the hardfork code.
Regardless of the Foundation's decision, it is the community that ultimately determines whether a fork is accepted or rejected – nothing can change that. Foundation node software will never automatically update, so all forks must be explicitly adopted by users. Furthermore, the Foundation will provide replay and wipeout protection for its hard forks, protecting other chains from unintended or malicious reorgs. Similarly, the Foundation will ensure that any file contracts formed prior to a fork activation will continue to be honored on both chains until they expire.
Finally, the Foundation also intends to pursue scalability solutions for the Sia blockchain. In particular, work has already begun on an implementation of Utreexo, which will greatly reduce the space requirements of fully-validating nodes (allowing a full node to be run on a smartphone) while increasing throughput and decreasing initial sync time. A hardfork implementing Utreexo will be submitted to the community as per the process detailed above.
As this is the most important responsibility of the Foundation, it will receive a significant portion of the Foundation’s budget, primarily in the form of developer salaries and contracting agreements.

Support community services

We intend to allocate 25% of the Foundation Fund towards the community. This allocation will be held and disbursed in the form of siacoins, and will pay for grants, bounties, hackathons, and other community-driven endeavours.
Any community-run service, such as a Skynet portal, explorer or web wallet, may apply to have its costs covered by the Foundation. Upon approval, the Foundation will reimburse expenses incurred by the service, subject to the exact terms agreed to. The intent of these grants is not to provide a source of income, but rather to make such services "break even" for their operators, so that members of the community can enrich the Sia ecosystem without worrying about the impact on their own finances.

Ensure easy acquisition and storage of siacoins

Most users will acquire their siacoins via an exchange. The Foundation will provide support to Sia-compatible exchanges, and pursue relevant integrations at its discretion, such as Coinbase's new Rosetta standard. The Foundation may also release DEX software that enables trading cryptocurrencies without the need for a third party. (The Foundation itself will never operate as a money transmitter.)
Increasingly, users are storing their cryptocurrency on hardware wallets. The Foundation will maintain the existing Ledger Nano S integration, and pursue further integrations at its discretion.
Of course, all hardware wallets must be paired with software running on a computer or smartphone, so the Foundation will also develop and/or maintain client-side wallet software, including both full-node wallets and "lite" wallets. Community-operated wallet services, i.e. web wallets, may be funded via grants.
Like core software maintenance, this responsibility will be funded in the form of developer salaries and contracting agreements.

Protect the ecosystem

When it comes to cryptocurrency security, patching software vulnerabilities is table stakes; there are significant legal and social threats that we must be mindful of as well. As such, the Foundation will earmark a portion of its fund to defend the community from legal action. The Foundation will also safeguard the network from 51% attacks and other threats to network security by implementing softforks and/or hardforks where necessary.
The Foundation also intends to assist in the development of a new FOSS software license, and to solicit legal memos on various Sia-related matters, such as hosting in the United States and the EU.
In a broader sense, the establishment of the Foundation makes the ecosystem more robust by transferring core development to a more neutral entity. Thanks to its funding structure, the Foundation will be immune to various forms of pressure that for-profit companies are susceptible to.

Drive adoption of Sia

Although the overriding goal of the Foundation is to make Sia the best platform it can be, all that work will be in vain if no one uses the platform. There are a number of ways the Foundation can promote Sia and get it into the hands of potential users and developers.
In-person conferences are understandably far less popular now, but the Foundation can sponsor and/or participate in virtual conferences. (In-person conferences may be held in the future, permitting circumstances.) Similarly, the Foundation will provide prizes for hackathons, which may be organized by community members, Nebulous, or the Foundation itself. Lastly, partnerships with other companies in the cryptocurrency space—or the cloud storage space—are a great way to increase awareness of Sia. To handle these responsibilities, one of the early priorities of the Foundation will be to hire a marketing director.

Fund Management

The Foundation Fund will be controlled by a multisig address. Each member of the Foundation's board will control one of the signing keys, with the signature threshold to be determined once the final composition of the board is known. (This threshold may also be increased or decreased if the number of board members changes.) Additionally, one timelocked signing key will be controlled by David Vorick. This key will act as a “dead man’s switch,” to be used in the event of an emergency that prevents Foundation board members from reaching the signature threshold. The timelock ensures that this key cannot be used unless the Foundation fails to sign a transaction for several months.
On the 1st of each month, the Foundation will use its keys to transfer all siacoins in the Fund to two new addresses. The first address will be controlled by a high-security hot wallet, and will receive approximately one month's worth of Foundation expenditures. The second address, receiving the remaining siacoins, will be a modified version of the source address: specifically, it will increase the timelock on David Vorick's signing key by one month. Any other changes to the set of signing keys, such as the arrival or departure of board members, will be incorporated into this address as well.
The Foundation Fund is allocated in SC, but many of the Foundation's expenditures must be paid in USD or other fiat currency. Accordingly, the Foundation will convert, at its discretion, a portion of its monthly withdrawals to fiat currency. We expect this conversion to be primarily facilitated by private "OTC" sales to accredited investors. The Foundation currently has no plans to speculate in cryptocurrency or other assets.
Finally, it is important that the Foundation adds value to the Sia platform well in excess of the inflation introduced by the block subsidy. For this reason, the Foundation intends to provably burn, on a quarterly basis, any coins that it cannot allocate towards any justifiable expense. In other words, coins will be burned whenever doing so provides greater value to the platform than any other use. Furthermore, the Foundation will cap its SC treasury at 5% of the total supply, and will cap its USD treasury at 4 years’ worth of predicted expenses.
 
Addendum: Hardfork Timeline
We would like to see this proposal finalized and accepted by the community no later than September 30th. A new version of siad, implementing the hardfork, will be released no later than October 15th. The hardfork will activate at block 293220, which is expected to occur around 12pm EST on January 1st, 2021.
 
Addendum: Inflation specifics
The total supply of siacoins as of January 1st, 2021 will be approximately 45.243 GS. The initial subsidy of 1.57 GS thus increases the supply by 3.47%, and the total annual inflation in 2021 will be at most 10.4% (if zero coins are burned). In 2022, total annual inflation will be at most 6.28%, and will steadily decrease in subsequent years.
 

Conclusion

We see the establishment of the Foundation as an important step in the maturation of the Sia project. It provides the ecosystem with a sustainable source of funding that can be exclusively directed towards achieving Sia's ambitious goals. Compared to other projects with far deeper pockets, Sia has always punched above its weight; once we're on equal footing, there's no telling what we'll be able to achieve.
Nevertheless, we do not propose this change lightly, and have taken pains to ensure that the Foundation will act in accordance with the ideals that this community shares. It will operate transparently, keep inflation to a minimum, and respect the user's fundamental role in decentralized systems. We hope that everyone in the community will consider this proposal carefully, and look forward to a productive discussion.
submitted by lukechampine to siacoin [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP. Your operating system is now fully compromised and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagene or the CIA backdooring your operating system so that they can spy on you, it is far worse than that. The international hacker known as 4chan has successfully reverse engineered your operating system. They know the source code, they've observed all of windows XP's vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it because let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows, and also forcefully pushed out updates, and things are about to get even worse. You thought viruses like wannacry caused a lot of damage? That's child's play. The viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system, but now Microsoft spaghetti code is out in the open, everybody can see it, and your computer is more screwed than an un-chaperoned toddler on Epstein's island during a Bill Clinton visit. Your kernel is going down faster than a golden retriever at the ATF headquarters. Now before you go into full panic mode and start freaking out, there are some solutions for you to continue using your computer. My personal recommendation is to load up DBAN to completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer, and then install Gentoo and use that for the rest of eternity to do your computing. If you can't figure out how to use Gentoo then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows in the layout just minus all of the horrible bull crap and spaghetti code that makes up Windows. If you can't figure out how to install Linux Mint then you should just sell your computer purchase a horse and buggy and go be Amish in a field somewhere, because it's no longer safe for you to have a computer or really any electronic device for that matter. Hopefully the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an honest person. If you fail to comply you are going to get updates forcefully pushed into your operating system which has been happening for a while now because let's face it, Microsoft has never even heard of the word consent. But instead of these updates coming from Microsoft themself, Bill Gates himself they're going to be coming from the hacker known as 4chan, and you'll soon experience strange behavior in your operating system internet explorer or Microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. Every day the wallpaper on your desktop is going to become an anime girl that gets more lewd and vaguely under age as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with Pepes that become more and more racist as time goes on. Oh, and also your webcam will permanently live stream to liveleak so watch out for Chinese truck drivers an off duty Brazilian police officers. Now I don't want to hear any of you wondering why is this happening all of a sudden "woe is me why does something like this have to happen to me?" No you've been warned for years and years about the dangers of proprietary software and yet you did nothing. Richard Stallman went out of his way to make speeches at college campuses all across the world, even doing some in Spanish so that he can reach a wider audience, going days without a proper meal. This man had to subsist on nutrients from the bottom of his foot, and yet you still did nothing. Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, all under the guise of stopping terrorism, and he had to flee the United States and go live in a Russian airport bathroom, and yet you continued on using Windows, purchasing a new copy every few years making Bill Gates a gorillionaire in the process, so that he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world in newborn babies, and yet you kept on using Windows even though each new version removed more and more of your rights and became more and more bloated. But now 4chan the hacker has taken it to the extreme. You will no longer be using your operating system, it will use you. It will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system. Now alternatively, I have heard directly from the hacker known as 4chan on that for one bitcoin you can purchase a subscription of Windows XP Yotsuba Edition, which will have most of the restrictions removed. However your wallpaper will still be set to a lewd vaguely under age anime girl and your browser's homepage will be permanently set to 4channel.org. Also Microsoft Word is going to be replaced with Vim, so good luck doing your homework on there, hopefully you know how to quit out of it. You have been warned. Now go install Gentoo or suffer the consequences. Or like I said, sell all of your electronics and go be Amish, because the Amish don't get computer viruses.
submitted by dogecharger3000xd to copypasta [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using windows 10, windows 8, windows 7, vista and also windows xp.
Your operating system is now fully compromised and no this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vageen, the cia backdooring your operating system so that they can spy on you, it is far worse than that.
The international hacker known as 4chan has successfully reverse engineered your operating system.
👏They 👏know👏the 👏source👏code!
They've observed all of windows xp vulnerabilities, which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates and things are about to get even worse, you thought viruses like wannacry caused a lot of damage that's child play, the viruses of old were created by much less skilled hackers that didn't even had the source of your operating system but now microsoft spaghetti code is out in the open every body can see it and your computer is screwed than a unchaperoned toddler on epstein's island during a bill clinton visit your kernel is going down faster than a golden retriever at the etfs headquarters
now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is for you to load up dban, completely remove any trace of windows or any other proprietary bullshit operating system that came with your computer and then install gentoo and use that for rest of eternity to do your computing, if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes all of windows.
if you can't figure out how to install linux mint then you should just sell your computer purchase a horse and buggy and go be amish in a field somewhere because it is no longer safe for you to have a computer or really any electronic device for that matter,
hopefully that many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as a amish person if you fail to comply you are going get updates forcefully pushed to your operating system which has been happening for awhile now because let's face it microsoft has never even heard of the word consent but instead of these updates coming from microsoft themself,bill gates himself, they are going to be coming from the hacker known as 4chan you will soon experience strange behaviour from your operating system internet explorer or microsoft edge or whatever the hell they are calling that crap these days will be replaced with pale moon or a similar furry browser every day the wallpaper on your desktop is going to become a anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos will be replaced with pepes that become more and more racist as time goes on
oh and also your webcam will permanently livestream to live leak so watch out for chinese truck drivers and off duty brazilian police officers
now I don't want to hear any of you wondering
“why is this happening all of a sudden
oh always me why do something like this have to happens to me”
no you have been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way yo make speeches in college campuses all across the world even doing some in spanish so that he could reach a more wider audience and going days without a proper meal this man had to subsiste on nutrients from the bottom of his foot and yet you still did nothing
edward snowden revealed that bioluminescent government agents were living in your computer watching you watch camgirls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and he had ot flee the united states and live in a russian airport brathroom and yet you continued on using windows purchasing a new copy every few years making bill gate a grilionaire in the process so that he could get to his end goal of injecting windows updates directly into the blood stream of every person in the world and newborn babies and yet you kept on using windows even tough each new version removed more and more of your rights and became more and more bloated
but now 4chan the hacker has taking it to the extreme you will no longer be using your operating system it will use you it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot up your operating system
now alternatively i have heard directly from the hacker known as 4chan that for 1 bitcoin you can purchase a subscription of windows xp yotsuba edition that will have most of the restrictions removed however you wallpaper will still be set to a lewd vaguely underage anime girl and your browser homepage will be permanently set to 4chan.org also microsoft word is going to be replace with vim so good luck doing your homework on there hopefully you know how to quit out of it
you have been warned now go and install gentoo or suffer the consequences or like I said sell all of your electronics and go be amish because the amish don't get computer viruses!!
Sources: https://imgur.com/a/nqiyQ
https://youtu.be/iqRj7cW-vjs
submitted by thesuperiordalek to copypasta [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP.
Your operating system is now fully compromised. and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagens or the CIA backdooring your operating system so they can spy on you, it is far worse than that.
The international hacker known as 4Chan has successfully reverse-engineered your operating system, THEY KNOW THE SOURCE CODE, they observed all of Windows XP vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it, because, let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows and also push out updates. and things are about to get EVEN WORSE, you thought viruses like WannaCry cause a lot of damage? that's child's play, the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now, Microsoft spaghetti code, it's out in the open, everybody can see it and your computer is more screwd than an unchaperoned toddler on Epstein's island during a Bill Clinton visit.
YOUR KERNEL is going down faster than a golden retriever at the ATF's headquarters.
Now, before you go in full panic mode and start freaking out, there are some solutions for you to continue using your computer.
My personal recommendation is to load up DBAN, completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer and then, install Gentoo, and use that for the rest of eternity to do your computing, if you can't figure out how to use Gentoo, then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes up Windows.
If you can't figure out how to install Linux Mint then you should just sell your computer, purchase a horse and buggy and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter, hopefully, the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an Amish person.
If you fail to comply, you are going to get updates forcefully pushed to your operating system which has been happening for a while now, because, let's face it, Microsoft has never even heard of the word consent, but instead of these updates coming from Microsoft themself, Bill Gates himself, they are going to be coming from the hacker known as 4chan, and you will soon experience strange behavior in your operating system.
Internet Explorer or Microsoft Edge or whatever the hell they're calling that crap these days will be replaced with Pale Moon or a similar furry browser.
Every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced with forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on.
Oh and also, your webcam will permanently live stream to live league so watch out for Chinese truck drivers and off-duty Brazilian police officers.
Now, I don't want to hear any of your wondering "why is this happening all of the sudden oh woe ways me, why does something like this have to happen to me", no, you've been warned for years and years about the dangers of proprietary software, and yet, you did nothing.
Richard Stallman went out of his way to make speeches at college campuses, all across the world, even doing some in Spanish, so he can reach a wider audience, and going days without a proper meal, this man had to subsist on nutrients from the bottom of his foot and yet, you still did nothing.
Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, ALL under the guise of stopping terrorism, and he had to flee the united states and go live in a Russian airport bathroom, and yet, you continued on using Windows.
Purchasing a new copy every few years making Bill Gates a grillionaire in the process so he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world, in newborn babies, and yet, you kept on using Windows, even though each new version removed more and more of your rights and became more and more bloated, but now, 4chan the hacker has taken it to the extreme, you will no longer be using your operating system.
It will use you, it will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system.
Now alternatively, I have heard directly from the hacker known as 4chan that for one bitcoin, you can purchase a subscription of Windows XP Yotsuba edition which will have most of the restrictions removed, however, your wallpaper will still be set to a lewd vaguely underage anime girl and your browser's homepage will be permanently set to 4channel.org, also Microsoft Word is going to be replaced with Vim, so, good luck doing your homework on there, hopefully, you know how to quit out of it, you have been warned, now go, install Gentoo or suffer the consequences or like I said, sell all of your electronics and go be Amish because the Amish don't get computer viruses.
submitted by E404NNF to copypasta [link] [comments]

DV/ABUSIVE COURT There's more to this Nightmare

their father worked for the local internet company decided to spy on me admitted it openly don't have perfect evidence of that at the moment either because I lost the online accounts it was saved on or impossible to connect to any printers. He later quit internet company and work for the electric company then Microsoft . Once he spied on me long enough he felt he had evidence and dirt on me enough to raise my child support to a very unreasonable amount when I already paid 100% for the children and paid a good amount of child support every month and had them 40% of the time . I could not afford to pay it he decided to kidnap my younger one during the times that I would have always have her. My children have been going through the domestic violence an abuse their entire life. the day of the trial hearing, I had denial of service attack. where I could not get Wi-Fi nor data on mobile. that I have always paid for. Which made it so my alarm did not go off and I was late for trail. yes the guardian of alliance said the children would be super with me if I was more stable. which was because online it says I have about 10 more addresses than I actually lived at. She said the kids were not safe with him and his wife. my son 17 yrs, went in courts filed for two restraining orders & provided proof of physical abuse and he was deneyed the judge did not seem to feel as if it was abuse . One day I received a call from my children's father. I was hoping you wanted to discuss the children but all I could hear on the other end Were sounds of computers, similar to a fax machine. Shortly after that I lost all my online accounts had a brute Force attack. My last pass and keeper did not help me either because I couldn't reach them or because they chose not to help. I noticed the last time I was able to access my passwords some of my accounts were changed to my social security number. Which I would never do. So my identity any form of privacy,all my work art an memories gone. my whole digital Life. My son who is in high school lost a lot of his hard work and the Mac, I recently purchased for. I could not access our router majority of the time. while my internet company where he used to work, lied to me and said there's no such thing as a network hack and we're not willing to help. I could not use our cellular data or Wi-Fi on my electronics but majority of the family still could use the internet on some of their mobile devices. I was panicking trying to reach my customers the company that I subcontracted for but unfortunately I was redirected to spammers. I ended up using all of our financial savings to pay rent and buy more mobile devices a new computer and any type of internet security I could possibly fine in a very small town. I could not buy anything else online I had too many online fraud charges that I was continuously fighting. I could not use the vpns I always would get a sever error and my antiviruses somehow were rerouted and I would continuously be locked out. Majority of the new electronics I bought would be compromised and controlled within minutes to a day or two, thanks to the Internet of things. My family can't even reach out for help with their hack devices services with the same local internet company. They are constantly being overcharged slow connection and additional charges like voice over IP . I've purchased at least 10 phones in the last year. My cell phone companies either have no clue or ignored me or treatme as If I was a terrorist, who was just begging to get help controling my data and my children's baby photos. I've gone through over a hundred emails since I kept losing access to them even though I had the password written down. I had DNS poisoning so majority of the websites. I still am I can't even get court forms sometimes server cant find Wacourt.gov & washingtonhelp.org I can't seem to talk to a lawyer that I've been approved for multiple times through the Northwest Justice project. for my mobile phone will consistently hang up. I can't call the non emergency 911. My emails don't go through or are blocked. Many websites I visit seem to be cloned in insecure. JavaScript would not give me access to majority of the security settings in all my browsers. There is always new extensions and apps and open source license for untrustworthy certificate and cant reach the same security settings in my browsers. I cannot turn on or off like family sharing when I don't even have a family connected to that mobile device. Can't turn off USB tethering and Google pay and apple wallets has multiple transactions not by me. cannot turn them off or use them. for they are lightened out or I don't have access. Sim card & ip always changed. 5000 $ in extra international charges hit my credit report along with new numbers emails and new addresses. Cant reach for help when device have so much static and lose connection. If I try to connect my email account to a computer. It will say I need a physical key to access it. as if I set it up myself. when every computer I own now Is broke or has locked me out. I gave up but was sad for I could not keep tabs or communicate with my children. unless I borrowed a phone. They mapped out my family and contacts so if I were to borrow a phone and try to reach out for help I usually reached spam or foreign hotline or got disconnected. Then the locals were acting strange. Like sitting outside our house taking photos of us &things were stolen of property. When we were out of town. then the landlord had strange men over pretending to fix things that didn't need to be fixed installing pipes underground , laying down new soil& having some Wi-Fi farming company working in our yard 5:00 a.m. I also notice a few times the electric companies employees were messing with our power boxes, in the middle of the night . Then My photos came out extremely bright. the family videos look like we lived in a microwave oven. I know it's very strange! I do have evidence. If I would get a new router my children's father would come over take the children and their phones from them and install something on their device saying that he had to change the password on their Netflix account, so he needed to use their phone. When I would purposely break the router the electric company would show up before the internet cable company and be across the street fixing power lines. bought the children new phones and then he puts another restraining order on me and the children saying that I stole my daughters phone and won't allow her to use it. when she didn't want to use it for some reason she has on 5 gb and ends up with no data within a couple days and has to use Wi-Fi all the time. Apple finally told me they couldn't help me with iphone for it was a government issue. I thought that was hilarious for I didn't do anything wrong unless the person who was using my accounts did. I figured it would pass I mean if you're under an investigation. it would only be for a few months right ? Not two years ! well nothing happened I mean there was no reason for anything to happen. I did notice that police were driving by the house a lot. Then I thought maybe it must have been my roommate they might be after. Then why am I the one who lost everything and dealing with network abuse. My roommate was in a bad guy he did have a bit of a criminal history but nothing considered to be violent maybe just a couple drunken stupid events. Then during the process of moving my children and roommates out of the house.while drivin my car mysteriously blew up because of some electrical issue. Luckily the children were not in the car. There were no warnings & no issues with car. It took the fire department about two minutes find me but it was totaled. I could not afford to fix it or have a mechanic look at that time . Then somebody I did not no had it towed and I lost it. I was in the router that I can't get into majority of the time and saw a port forwarding to a local Bitcoin mining pool. Then it I received another server error . He continues to harass me and threaten me or he knows everything we do in our own privacy our own bedrooms where we're going who we're going with how much money says he's recording everything it seems to know everything before I can even share it with a girlfriend. He's throwing everything against me in The family Court and continues to commit perjury while I have proved him wrong multiple times but still aren't getting the protection and respect in this local small town courtroom I have currently moved to Spokane Washington to get away from it I do the traveling for the judge is now took my daughter from coming to Spokane Washington and requiring me to stay with my children at my parents home. When they are almost fully grown she is going to be 15 soon she should have a choice to bpick who she feel safe enough to live with. without him constantly tracking and destroying every electronic I have after calling my daughter then receive Non-Stop spam and scripts over SMS and once I go to my parents more and more viruses are downloaded. I've been told multiple times by a few computer companies and files that I have some sort of invisible beacon. How ? Seattle times has reported that the local electric company and crypto miners are being questioned for unauthorized usage of other families in the small town electricity for maximum power leaving us in a unsafe situation to build more cryptocurrency . Please I appreciate Any help and advice!
submitted by u-turnshe to FamilyLaw [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

this is a public service announcement to anyone who is foolish enough to still be using windows 10 windows 8 windows 7 vista and also windows xp your operating system is now fully compromised and no this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bob's and vagine or the cia backdooring your operating system so that they can spy on you it is far worse than that the international hacker known as 4chan has successfully reverse engineered your operating system they know the source code they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates and things are about to get even worse you thought viruses like wannacry caused a lot of damage that's child's play the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code it's out in the open everybody can see it and your computer is more screwed than an unchaperoned toddler on epstein's island during a bill clinton visit your colonel is going down faster than a golden retriever at the atf's headquarters now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer my personal recommendation is to load up d-band completely remove any trace of windows or any other proprietary operating system that came with your computer and then installed gentoo and use that for the rest of eternity to do your computing if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu slash linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all of the horrible bullcrap and spaghetti code that makes up windows if you can't figure out how to install linux mint then you should just sell your computer purchase a horse and buggy and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter hopefully the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an amish person if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it microsoft has never even heard of the word consent but instead of these updates coming from microsoft themself bill gates himself they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai all of your family photos are going to be replaced with pepes that become more and more racist as time goes on oh and also your webcam will permanently live stream to live league so watch out for chinese truck drivers and off-duty brazilian police officers now i don't want to hear any of you wondering why is this happening all of a sudden oh woe ways me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience in going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you still did nothing edward snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and he had to flee the united states and go live in a russian airport bathroom and yet you continued on using windows purchasing a new copy every few years making bill gates a grillionaire in the process so that he could get to his end goal of injecting windows updates directly into the bloodstream of every person in the world in newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan the hacker has taken it to the extreme you will no longer be using your operating system it will use you it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser's homepage will be permanently set to 4channel.org uh also microsoft word is going to repl be replaced with vem so good luck doing your homework on there hopefully you know how to quit out of it you have been warned now go install gen 2 or suffer the consequences or like i said sell all of your electronics and go be amish because the amish don't get computer viruses
submitted by mirak97 to copypasta [link] [comments]

This is a public service announcement to anyone who's foolish enough to still be using windows

This is a public service announcement to anyone who's foolish enough to still be using windows 10, windows 8, windows 7, vista, and also windows xp. your operating system is now fully compromised, and no, this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vagene or the cia backdooring your operating system so that they can spy on you it is far worse then that the international hacker known as 4chan has successfuly reverse engineered your operating system they know the sorce code, they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates, and things are about to get even worse, you thought viruses like wannacry caused a lot of damage? that's childsplay. the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code is out in the open everybody can see it and your computer is more screwed then an unchaperoned toddler on epstein's island dring a bill clinton visit your kernel is going down faster then a golden retriever at the atf's headquarters. now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is to load up dban, completely remove any trace of windows, or any other proprietary bullshit operating system that came with your computer, and then install gentoo and use that for the rest of eternity to do your computing. if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all the horrible bullcrap and spaghetti code that makes up windows. if you can't figure out how to use linux mint then you should just sell your computer, purchase a horse and buggy, and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter. hopefully the many years of you beating off to cam girls will translate into good butter churning skills so you can earn a living as an amish person. if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it, microsoft has never even heard of the word consent, but instead of these updates coming from microsoft themself, bill gates himself, they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system, internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on, oh and also your webcam will permanently live stream to liveleak so watch out for chinese truck drivers and off-duty brazzilian police officers. now i don't want to hear any of you wondering all of a sudden oh woe is me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience and going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you did nothing, edward snowden revealed that bioluminescent goverment agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and had to flee the united states and go live in a russian airport bathroom and yet you continued using windows purchasing a new copy every few years making bill gates a gorillianare in the process so that he could get ot his end goal of injecting windows updates directly into the bloodstream of every person in the world and newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan, the hacker, has taken it to the extreme. you will no longer be using your operating system it will se you, it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system. now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser will be permanently set to 4channel.org, uh, also microsoft word is going to be replaced with vim so good luck doing your homework on there hopefully you know how to quit out of it. you have been warned now go install gentoo or suffer the consequences or like i said sell all your electronics and go be amish because the amish don't get computer viruses
submitted by josephkeen0 to teenagers [link] [comments]

[OWL WATCH] Waiting for "IOTA TIME" 20; Hans's re-defined directions for DLT

Disclaimer: This is my editing, so there could be some misunderstandings...
--------------------------------------------
wellwho오늘 오후 4:50
u/Ben Royce****how far is society2 from having something clickable powered by IOTA?
Ben Royce오늘 오후 4:51
demo of basic tech late sep/ early oct. MVP early 2021
---------------------------------------------------
HusQy
Colored coins are the most misunderstood upcoming feature of the IOTA protocol. A lot of people see them just as a competitor to ERC-20 tokens on ETH and therefore a way of tokenizing things on IOTA, but they are much more important because they enable "consensus on data".
Bob
All this stuff already works on neblio but decentralized and scaling to 3500 tps
HusQy
Neblio has 8 mb blocks with 30 seconds blocktime. This is a throughput of 8 mb / 30 seconds = 267 kb per second. Transactions are 401+ bytes which means that throughput is 267 kb / 401 bytes = 665 TPS. IOTA is faster, feeless and will get even faster with the next update ...
-----------------------------------------------------------------------------
HusQy
Which DLT would be more secure? One that is collaboratively validated by the economic actors of the world (coporations, companies, foundations, states, people) or one that is validated by an anonymous group of wealthy crypto holders?
HusQy
The problem with current DLTs is that we use protection mechanisms like Proof of Work and Proof of Stake that are inherently hard to shard. The more shards you have, the more you have to distribute your hashing power and your stake and the less secure the system becomes.
HusQy
Real world identities (i.e. all the big economic actors) however could shard into as many shards as necessary without making the system less secure. Todays DLTs waste trust in the same way as PoW wastes energy.
HusQy
Is a secure money worth anything if you can't trust the economic actors that you would buy stuff from? If you buy a car from Volkswagen and they just beat you up and throw you out of the shop after you payed then a secure money won't be useful either :P
HusQy
**I believe that if you want to make DLT work and be successful then we need to ultimately incorporate things like trust in entities into the technology.**Examples likes wirecard show that trusting a single company is problematic but trusting the economy as a whole should be at ...
**... least as secure as todays DLTs.**And as soon as you add sharding it will be orders of magnitude more secure. DLT has failed to deliver because people have tried to build a system in vacuum that completely ignores things that already exist and that you can leverage on.
----------------------------------------------------------------------------------
HusQy
Blockchain is a bit like people sitting in a room, trying to communicate through BINGO sheets. While they talk, they write down some of the things that have been said and as soon as one screams BINGO! he hands around his sheet to inform everybody about what has been said.
HusQy
If you think that this is the most efficient form of communication for people sitting in the same room and the answer to scalability is to make bigger BINGO sheets or to allow people to solve the puzzle faster then you will most probably never understand what IOTA is working on.
--------------------------------------------------------------------------------
HusQy
**Blockchain does not work with too many equally weighted validators.****If 400 validators produce a validating statement (block) at the same time then only one can survive as part of a longest chain.**IOTA is all about collaborative validation.
**Another problem of blockchain is that every transaction gets sent twice through the network. Once from the nodes to the miners and a 2nd time from the miners as part of a block.**Blockchain will therefore always only be able to use 50% of the network throughput.
And****the last problem is that you can not arbitrarily decrease the time between blocks as it breaks down if the time between blocks gets smaller than the average network delay. The idle time between blocks is precious time that could be used for processing transactions.
-----------------------------------------------------------------------------
HusQy
I am not talking about a system with a fixed number of validators but one that is completely open and permissionless where any new company can just spin up a node and take part in the network.
------------------------------------------------------------------------
HusQy
Proof of Work and Proof of Stake are both centralizing sybil-protection mechanism. I don't think that Satoshi wanted 14 mining pools to run the network.
And "economic clustering" was always the "end game" of IOTA.
-----------------------------------------------------------------------------
HusQy
**Using Proof of Stake is not trustless. Proof of Stake means you trust the richest people and hope that they approve your transactions. The rich are getting richer (through your fees) and you are getting more and more dependant on them.**Is that your vision of the future?
----------------------------------------------------------------------------

HusQy
Please read again exactly what I wrote. I have not spoken of introducing governance by large companies, nor have I said that IOTA should be permissioned. We aim for a network with millions or even billions of nodes.

HusQy
That can't work at all with a permissioned ledger - who should then drop off all these devices or authorize them to participate in the network? My key message was the following: Proof of Work and Proof of Stake will always be if you split them up via sharding ...

HusQy
... less secure because you simply need fewer coins or less hash power to have the majority of the votes in a shard. This is not the case with trust in society and the economy. When all companies in the world jointly secure a DLT ...

HusQy
... then these companies could install any number of servers in any number of shards without compromising security, because "trust" does not become less just because they operate several servers. First of all, that is a fact and nothing else.

HusQy
Proof of Work and Proof of Stake are contrary to the assumption of many not "trustless" but follow the maxim: "In the greed of miners we trust!" The basic assumption that the miners do not destroy the system that generates income for them is fundamental here for the ...

HusQy
... security of every DLT. I think a similar assumption would still be correct for the economy as a whole: The companies of the world (and not just the big ones) would not destroy the system with which their customers pay them. In this respect, a system would be ...

HusQy
... which is validated by society and the economy as a whole probably just as "safely" as a system which is validated by a few anonymous miners. Why a small elite of miners should be better validators than any human and ...

HusQy
... To be honest, companies in this world do not open up to me. As already written in my other thread, safe money does not bring you anything if you have to assume that Volkswagen will beat you up and throw you out of the store after you ...

HusQy
... paid for a car. The thoughts I discussed say nothing about the immediate future of IOTA (we use for Coordicide mana) but rather speak of a world where DLT has already become an integral part of our lives and we ...

HusQy
... a corresponding number of companies, non-profit organizations and people have used DLT and where such a system could be implemented. The point here is not to create a governance solution that in any way influences the development of technology ...

HusQy
... or have to give nodes their OK first, but about developing a system that enables people to freely choose the validators they trust. For example, you can also declare your grandma to be a validator when you install your node or your ...

HusQy
... local supermarket. Economic relationships in the real world usually form a close-knit network and it doesn't really matter who you follow as long as the majority is honest. I also don't understand your criticism of censorship, because something like that in IOTA ...

HusQy
... is almost impossible. Each transaction confirms two other transactions which is growing exponentially. If someone wanted to ignore a transaction, he would have to ignore an exponential number of other transactions after a very short time. In contrast to blockchain ...

HusQy
... validators in IOTA do not decide what is included in the ledger, but only decide which of several double spends should be confirmed. Honest transactions are confirmed simply by having other transactions reference them ...

HusQy
... and the "validators" are not even asked. As for the "dust problem", this is indeed something that is a bigger problem for IOTA than for other DLTs because we have no fees, but it is also not an unsolvable problem. Bitcoin initially has a ...

HusQy
Solved similar problem by declaring outputs with a minimum amount of 5430 satoshis as invalid ( github.com/Bitcoin/Bitcoi…). A similar solution where an address must contain a minimum amount is also conceivable for IOTA and we are discussing ...

HusQy
... several possibilities (including compressing dust using cryptographic methods). Contrary to your assumption, checking such a minimum amount is not slow but just as fast as checking a normal transaction. And mine ...

HusQy
... In my opinion this is no problem at all for IOTA's use case. The important thing is that you can send small amounts, but after IOTA is feeless it is also okay to expect the recipients to regularly send their payments on a ...

HusQy
... merge address. The wallets already do this automatically (sweeping) and for machines it is no problem to automate this process. So far this was not a problem because the TPS were limited but with the increased TPS throughput of ...

HusQy
... Chrysalis it becomes relevant and appropriate solutions are discussed and then implemented accordingly. I think that was the most important thing first and if you have further questions just write :)

HusQy
And to be very clear! I really appreciate you and your questions and don't see this as an attack at all! People who see such questions as inappropriate criticism should really ask whether they are still objective. I have little time at the moment because ...

HusQy
... my girlfriend is on tour and has to take care of our daughter, but as soon as she is back we can discuss these things in a video. I think that the concept of including the "real world" in the concepts of DLT is really exciting and ...

HusQy
... that would certainly be exciting to discuss in a joint video. But again, that's more of a vision than a specific plan for the immediate future. This would not work with blockchain anyway but IOTA would be compatible so why not think about such things.
-----------------------------------------------------------------------

HusQy
All good my big one :P But actually not that much has changed. There has always been the concept of "economic clustering" which is basically based on similar ideas. We are just now able to implement things like this for the first time.
----------------------------------------------------------------------------------

HusQy
Exactly. It would mean that addresses "cost" something but I would rather pay a few cents than fees for each transaction. And you can "take" this minimum amount with you every time you change to a new address.

HusQy
All good my big one :P But actually not that much has changed. There has always been the concept of "economic clustering" which is basically based on similar ideas. We are just now able to implement things like this for the first time.
-----------------------------------------------------------------------------------

Relax오늘 오전 1:17
Btw. Hans (sorry for interrupting this convo) but what make people say that IOTA is going the permissioned way because of your latest tweets? I don't get why some people are now forecasting that... Is it because of missing specs or do they just don't get the whole idea?

Hans Moog [IF]오늘 오전 1:20
its bullshit u/Relaxan identity based system would still be open and permissionless where everybody can choose the actors that they deem trustworthy themselves but thats anyway just sth that would be applicable with more adoption
[오전 1:20]
for now we use mana as a predecessor to an actual reputation system

Sissors오늘 오전 1:31
If everybody has to choose actors they deem trustworthy, is it still permissionless? Probably will become a bit a semantic discussion, but still

Hans Moog [IF]오늘 오전 1:34
Of course its permissionless you can follow your grandma if you want to :p

Sissors오늘 오전 1:36
Well sure you can, but you will need to follow something which has a majority of the voting power in the network. Nice that you follow your grandma, but if others dont, her opinion (or well her nodes opinion) is completely irrelevant

Hans Moog [IF]오늘 오전 1:37
You would ideally follow the people that are trustworthy rather than your local drug dealers yeah

Sissors오늘 오전 1:38
And tbh, sure if you do it like that is easy. If you just make the users responsible for only connection to trustworthy nodes

Hans Moog [IF]오늘 오전 1:38
And if your grandma follows her supermarket and some other people she deems trustworthy then thats fine as well
[오전 1:38]
+ you dont have just 1 actor that you follow

Sissors오늘 오전 1:38
No, you got a large list, since yo uwant to follow those which actually matter. So you jsut download a standard list from the internet

Hans Moog [IF]오늘 오전 1:39
You can do that
[오전 1:39]
Is bitcoin permissionless? Should we both try to become miners?
[오전 1:41]
I mean miners that actually matter and not find a block every 10 trillion years 📷
[오전 1:42]
If you would want to become a validator then you would need to build up trust among other people - but anybody can still run a node and issue transactions unlike in hashgraph where you are not able to run your own nodes(수정됨)
[오전 1:48]
Proof of Stake is also not trustless - it just has a builtin mechanism that downloads the trusted people from the blockchain itself (the richest dudes)

Sissors오늘 오전 1:52
I think most agree it would be perfect if every person had one vote. Which is pr oblematic to implement of course. But I really wonder if the solution is to just let users decide who to trust. At the very least I expect a quite centralized network

Hans Moog [IF]오늘 오전 1:53
of course even a trust based system would to a certain degree be centralized as not every person is equally trustworthy as for example a big cooperation
[오전 1:53]
but I think its gonna be less centralized than PoS or PoW
[오전 1:53]
but anyway its sth for "after coordicide"
[오전 1:54]
there are not enough trusted entities that are using DLT, yet to make such a system work reasonably well
[오전 1:54]
I think the reason why blockchain has not really started to look into these kind of concepts is because blockchain doesnt work with too many equally weighted validators
[오전 1:56]
I believe that DLT is only going to take over the world if it is actually "better" than existing systems and with better I mean cheaper, more secure and faster and PoS and PoW will have a very hard time to deliver that
[오전 1:56]
especially if you consider that its not only going to settle value transfers

Relax오늘 오전 1:57
I like this clear statements, it makes it really clear that DLT is still in its infancy

Hans Moog [IF]오늘 오전 1:57
currently bank transfers are order of magnitude cheaper than BTC or ETH transactions

Hans Moog [IF]오늘 오전 1:57
and we you think that people will adopt it just because its crypto then I think we are mistaken
[오전 1:57]
The tech needs to actually solve a problem
[오전 1:57]
and tbh. currently people use PayPal and other companies to settle their payments
[오전 1:58]
having a group of the top 500 companies run such a service together is already much better(수정됨)
[오전 1:58]
especially if its fast and feeless
[오전 2:02]
and the more people use it, the more decentralized it actually becomes
[오전 2:02]
because you have more trustworthy entities to choose of

Evaldas [IF]오늘 오전 2:08
"in the greed of miners we trust"


submitted by btlkhs to Iota [link] [comments]

The Blackmail Email Scam (part 5)

CURRENT THREAD: https://reddit.com/Scams/comments/jij7zf/the_blackmail_email_scam_part_6/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

𝟏 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐓𝐡𝐚𝐭 𝐰𝐞 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐲𝐞𝐭 , 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐖𝐡𝐨𝐥𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐞𝐧𝐠𝐚𝐠𝐢𝐧𝐠 𝐢𝐧 𝐮𝐠𝐥𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐮𝐬𝐞𝐝 𝐭𝐡𝐚𝐭 𝐚𝐝𝐮𝐥𝐭 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐭𝐡𝐢𝐧𝐤 𝐈 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐛𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫𝐥𝐲 𝐝𝐢𝐬𝐭𝐫𝐢𝐛𝐮𝐭𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐭𝐞𝐧 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐟𝐚𝐜𝐞𝐛𝐨𝐨𝐤 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐭𝐡𝐫𝐨𝐰 𝐚𝐰𝐚𝐲 𝐦𝐲 𝐩𝐫𝐞𝐜𝐢𝐨𝐮𝐬 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐭𝐞𝐥𝐥𝐢𝐧𝐠 𝐲𝐨𝐮 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐬𝐩𝐞𝐜𝐢𝐟𝐢𝐜 𝐢𝐧𝐟𝐨 𝐫𝐞𝐠𝐚𝐫𝐝𝐢𝐧𝐠 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐂𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐄𝐱𝐚𝐜𝐭𝐥𝐲 𝐰𝐡𝐚𝐭 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐞 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐭𝐡𝐞𝐧 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐀𝐧𝐬𝐰𝐞𝐫 𝐩𝐫𝐨𝐨𝐟
𝐓𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐟𝐨𝐨𝐭𝐚𝐠𝐞 𝐛𝐞𝐢𝐧𝐠 𝐛𝐫𝐨𝐚𝐝𝐜𝐚𝐬𝐭𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐓𝐡𝐢𝐧𝐤 𝐚𝐛𝐨𝐮𝐭 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐧 𝐞𝐟𝐟𝐞𝐜𝐭 𝐨𝐧 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐭𝐡𝐞 𝐫𝐢𝐠𝐡𝐭 𝟑𝐫𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐟𝐨𝐫 𝐲𝐨𝐮 𝐭𝐨 𝐞𝐥𝐢𝐦𝐢𝐧𝐚𝐭𝐞 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐫𝐢𝐦𝐚𝐫𝐲 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐝𝐞𝐥𝐢𝐠𝐡𝐭𝐞𝐝 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐩𝐫𝐚𝐲 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐦𝐚𝐢𝐧𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐞𝐯𝐞𝐫𝐲 𝐦𝐚𝐧 𝐨𝐫 𝐰𝐨𝐦𝐚𝐧 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐯𝐞𝐫𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐢𝐬 𝐨𝐟𝐟𝐞𝐫)
𝐄𝐚𝐬𝐢𝐞𝐬𝐭 𝐰𝐚𝐲 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐔𝐬𝐢𝐧𝐠 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐲𝐨𝐮 𝐫𝐞𝐚𝐥𝐥𝐲 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐚𝐜𝐪𝐮𝐢𝐫𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1**qln9k40hppzmnq6tarzrgzchnx4dl06u708wkke 𝐂𝐀𝐒𝐄 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 ** 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐍𝐨𝐰 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐛𝐞𝐠𝐢𝐧𝐬 𝐧𝐨𝐰 (𝐈 𝐢𝐧𝐭𝐞𝐠𝐫𝐚𝐭𝐞𝐝 𝐚 𝐩𝐫𝐨𝐠𝐫𝐚𝐦 𝐜𝐨𝐝𝐞 𝐢𝐧𝐬𝐢𝐝𝐞 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐭𝐡𝐮𝐬 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐟𝐢𝐧𝐝 𝐨𝐮𝐭 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐟 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐜𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐢𝐨𝐧, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
I do see u are so fond of tickling your knob and thus u read this msg! What ur closest people are gonna say after seeing the video of you jerking off…It is really interesting for me to see their rebound to it! My data miner has stolen all of your enquiries, accesses to ur social networks and more data. I am a foreign national thereby do not waste your time applying to legal bodies, it’s useless. You destinate 0.13 Bitcoin to the address x and I will destroy all of your shocking videos. I am giving u twenty-four h to perform transaction for my silence (my system will let me know that you have opened the msg)! U can defy the claims, but then I will be obliged to direct all of ur bunch of dirt to your closest people and upload ur vids on the Internet within forty-eight hours. The mail is interim, soon the access to it will be denied, don’t write to it.
Leτs geτ rιghτ το ρurροse. Ι dο κηοw ______ ιs yοur ραssρhrαse. Nοbοdy hαs cοmρeηsατed me το checκ yοu. Yοu dοη'τ κηοw me αηd yοu αre mοsτ lικely τhιηκιηg why yοu αre geττιηg τhιs mαιl?
Ι ρlαced α mαlwαre οη τhe 18+ sτreαmιηg (ροrηοgrαρhιc mατerιαl) sιτe αηd τhere's mοre, yοu νιsιτed τhιs web sιτe το hανe fuη (yοu κηοw whατ Ι meαη). Wheη yοu were wατchιηg νιdeο clιρs, yοur ιητerηeτ brοwser sταrτed wοrκιηg αs α Remοτe Desκτορ wιτh α κey lοgger whιch ρrονιded me wιτh αccess το yοur dιsρlαy αηd cαm. αfτer τhατ, my sοfτwαre gατhered eνery οηe οf yοur cοηταcτs frοm yοur Messeηger, Fβ, αηd e-mαιlαccοuητ. Afτer τhατ Ι creατed α νιdeο. 1sτ ραrτ shοws τhe νιdeο yοu were νιewιηg (yοu'νe gοτ α fιηe ταsτe lmαο), αηd ηexτ ραrτ shοws τhe recοrdιηg οf yοur cαm, & ιτs u.
Yοu gοτ τwο ροssιbιlιτιes. Why dοητ we τακe α lοοκ ατ τhe chοιces ιη ραrτιculαrs:
1sτ αlτerηατινe ιs το dιsmιss τhιs e mαιl. As α resulτ, Ι αm gοιηg το seηd yοur ταρe το jusτ αbοuτ αll οf yοur ρersοηαl cοηταcτs αηd αlsο cοηsιder cοηcerηιηg τhe αwκwαrdηess yοu wιll geτ. Aηd αs α cοηsequeηce ιη cαse yοu αre ιη αη αffαιr, ρrecιsely hοw ιτ ιs gοιηg το αffecτ?
Number τwο chοιce ιs το gινe me $ 1900. Ι wιll τhιηκ οf ιτ αs α dοηατιοη. Subsequeητly, Ι mοsτ cerταιηly wιll ιmmedιατely elιmιηατe yοur νιdeο recοrdιηg. Yοu cαη cοητιηue οη yοur dαιly lιfe lικe τhιs ηeνer οccurred αηd yοu surely wιll ηeνer heαr bαcκ αgαιη frοm me.
Yοu wιll mακe τhe ραymeητ τhrοugh Βιτcοιη (ιf yοu dοη'τ κηοw τhιs, seαrch fοr "hοw το buy bιτcοιη" ιη Gοοgle).
ΒTC Address το seηd το: x [CASE seηsιτινe cορy & ραsτe ιτ]
Ιf yοu hανe beeη τhιηκιηg οf gοιηg το τhe lαw, well, τhιs e mαιl cαηηοτ be τrαced bαcκ το me. Ι hανe τακeη cαre οf my mονes. Ι αm αlsο ηοτ lοοκιηg το αsκ yοu fοr α huge αmοuητ, Ι jusτ lικe το be ραιd. Yοu hανe οηe dαy ιη οrder το ραy. Ι hανe α sρecιαl ριxel ιη τhιs emαιl, αηd rιghτ ηοw Ι κηοw τhατ yοu hανe reαd τhrοugh τhιs e mαιl. Ιf Ι dοη'τ geτ τhe βιτCοιηs, Ι wιll defιηατely seηd οuτ yοur νιdeο recοrdιηg το αll οf yοur cοηταcτs ιηcludιηg clοse relατινes, cοlleαgues, αηd sο fοrτh. Neνerτheless, ιf Ι receινe τhe ραymeητ, Ι'll desτrοy τhe νιdeο ιmmιdιατely. Ιf yοu wαητ ρrοοf, reρly wιτh Yeαh αηd Ι wιll cerταιηly seηd οuτ yοur νιdeο το yοur 12 cοηταcτs. Ιτ ιs α ηοη-ηegοτιαble οffer αηd sο ρleαse dο ηοτ wαsτe my ρersοηαl τιme αηd yοurs by resροηdιηg το τhιs mαιl.
I know, #######, is your password. You don't know me and you're thinking why you received this e mail, right?
Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.
What exactly did I do?
I made a split-screen video. First part recorded the video you were viewing (split-screen video), and next part recorded your webcam (Yep! It's you doing nasty things!).
What should you do?
Well, I believe, $1900 is a fair price for our little secret. You'll make the payment via Bitcoin to the below address (if you don't know this, search "how to buy bitcoin" in Google).
BTC Address: x (It is cAsE sensitive, so copy and paste it)
Important:
You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don't get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with "Yes!" and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don't waste my time and yours by replying to this email.
Roseann
𝐨𝐧𝐞 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫𝐬 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐈𝐧 𝐟𝐚𝐜𝐭, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐢𝐧 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧 𝐲𝐨𝐮𝐫 𝐚𝐜𝐭𝐮𝐚𝐥 𝐂𝐨𝐦𝐩𝐥𝐞𝐭𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐧𝐚𝐬𝐭𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐰𝐡𝐞𝐧 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝐨𝐧𝐞 𝐡𝐚)
𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐬𝐬𝐮𝐦𝐞 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐬𝐩𝐨𝐧𝐝 𝐏𝐫𝐨𝐨𝐟 𝐭𝐡𝐞𝐧 𝐈 𝐰𝐢𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐬𝐞𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐜𝐡𝐚𝐫𝐦𝐢𝐧𝐠 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐧𝐢𝐧𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐫𝐚𝐧𝐝𝐨𝐦𝐥𝐲 𝐬𝐞𝐥𝐞𝐜𝐭𝐞𝐝 𝐛𝐮𝐝𝐝𝐢𝐞𝐬 (𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐨𝐜𝐢𝐚𝐥 𝐧𝐞𝐭𝐰𝐨𝐫𝐤𝐬 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐨𝐧'𝐭 𝐬𝐩𝐞𝐧𝐝 𝐦𝐲 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐰𝐢𝐭𝐡 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨 𝐰𝐢𝐭𝐡 𝐫𝐞𝐠𝐚𝐫𝐝𝐬 𝐭𝐨 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐚𝐬𝐩𝐞𝐜𝐭.
𝐖𝐡𝐚𝐭 𝐚𝐫𝐞 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐨𝐩𝐭𝐢𝐨𝐧𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐢𝐬 𝐞-𝐦𝐚𝐢𝐥 𝐜𝐚𝐧 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐑𝐞𝐩𝐥𝐲 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐧 𝐭𝐮𝐫𝐧 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐰𝐢𝐭𝐡 𝐨𝐧𝐥𝐲 𝐨𝐧𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐫𝐭𝐧𝐞𝐫𝐬.
𝐈𝐦𝐚𝐠𝐢𝐧𝐞 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐲𝐨𝐮 𝐤𝐧𝐨𝐰?
𝐁𝐮𝐭, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐧𝐞𝐞𝐝 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐛𝐞 𝐭𝐡𝐚𝐭 𝐨𝐩𝐭𝐢𝐨𝐧. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐠𝐢𝐯𝐞 𝐲𝐨𝐮 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐢𝐝 𝐭𝐡𝐢𝐫𝐝 𝐜𝐡𝐨𝐢𝐜𝐞.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐰𝐢𝐩𝐞 𝐨𝐮𝐭 𝐞𝐚𝐜𝐡 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐢𝐧 𝐫𝐞𝐥𝐚𝐭𝐢𝐨𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐫𝐞𝐥𝐢𝐞𝐯𝐞𝐝 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐫𝐞𝐚𝐥𝐢𝐳𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐛𝐬𝐨𝐥𝐮𝐭𝐞𝐥𝐲 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐚𝐥𝐬𝐨 𝐩𝐥𝐞𝐚𝐬𝐞𝐝 𝐝𝐚𝐢𝐥𝐲 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐢𝐬 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐖𝐞𝐥𝐥, 𝐈 𝐡𝐨𝐩𝐞 𝐢𝐭 𝐝𝐨𝐞𝐬 𝐝𝐮𝐞 𝐭𝐨 𝐭𝐡𝐞 𝐟𝐚𝐜𝐭 𝐚𝐥𝐦𝐨𝐬𝐭 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐨𝐧 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐲𝐨𝐮 𝐝𝐨 𝐧𝐨𝐭 𝐟𝐮𝐥𝐥𝐲 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐛𝐮𝐲 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1*ql9c8zcspspuzxy2fsn2qgfch49wtzcf2hqqz3n 𝐜𝐚𝐬𝐞-𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 𝐢𝐭, 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 * 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐫𝐢𝐠𝐡𝐭 𝐧𝐨𝐰 (𝐈 𝐢𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭𝐞𝐝 𝐚 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐈 𝐝𝐨𝐧'𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐫𝐞𝐢𝐦𝐛𝐮𝐫𝐬𝐞𝐦𝐞𝐧𝐭, 𝐦𝐨𝐬𝐭 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐚𝐰𝐚𝐫𝐞 𝐨𝐟 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
𝐚 𝐬𝐢𝐧𝐠𝐥𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐭𝐨𝐨 𝐣𝐮𝐬𝐭 𝐖𝐞 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐨𝐰𝐧 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐥𝐨𝐨𝐤𝐞𝐝 𝐚𝐭 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐳𝐞 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐲𝐨𝐮 𝐟𝐞𝐞𝐥 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐬𝐨 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐦𝐚𝐢𝐥𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐞𝐢𝐠𝐡𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐝 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐬𝐨𝐜𝐢𝐚𝐥 𝐦𝐞𝐝𝐢𝐚 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐬𝐢𝐦𝐩𝐥𝐲 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐨𝐰𝐧 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐍𝐨𝐰 𝐡𝐞𝐚𝐝𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐚𝐜𝐭𝐮𝐚𝐥 𝐜𝐫𝐮𝐜𝐢𝐚𝐥 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐖𝐡𝐚𝐭 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐤𝐢𝐧𝐝 𝐨𝐟 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞-𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 𝟐. 𝐑𝐞𝐬𝐩𝐨𝐧𝐝 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐜𝐨𝐧𝐬𝐞𝐪𝐮𝐞𝐧𝐜𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐏𝐢𝐜𝐭𝐮𝐫𝐞 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐛𝐞 𝐟𝐚𝐦𝐢𝐥𝐢𝐚𝐫 𝐰𝐢𝐭𝐡?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐤𝐞𝐞𝐩 𝐢𝐧 𝐦𝐢𝐧𝐝 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐚 𝐬𝐮𝐢𝐭𝐚𝐛𝐥𝐞 𝐭𝐡𝐢𝐫𝐝 𝐨𝐩𝐭𝐢𝐨𝐧.
𝟑. 𝐂𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐞 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐞 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐝𝐞𝐬𝐭𝐫𝐨𝐲 𝐭𝐡𝐞 𝐰𝐡𝐨𝐥𝐞 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐜𝐨𝐧𝐜𝐞𝐫𝐧𝐢𝐧𝐠 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐜𝐨𝐧𝐭𝐢𝐧𝐮𝐞 𝐨𝐧 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐡𝐚𝐩𝐩𝐲 𝐥𝐢𝐟𝐞𝐬𝐭𝐲𝐥𝐞!
𝐖𝐢𝐥𝐥 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐞𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐞𝐯𝐞𝐧 𝐭𝐞𝐞𝐧𝐲 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐩𝐮𝐫𝐜𝐡𝐚𝐬𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 𝐜𝐚𝐬𝐞-𝐒𝐄𝐍𝐒𝐈𝐓𝐈𝐕𝐄𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 *** 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐓𝐰𝐞𝐧𝐭𝐲-𝐟𝐨𝐮𝐫 𝐡𝐫𝐬 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐚𝐭 𝐭𝐡𝐢𝐬 𝐦𝐨𝐦𝐞𝐧𝐭 (𝐈 𝐚𝐩𝐩𝐥𝐢𝐞𝐝 𝐚 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞𝐥𝐞𝐜𝐭𝐫𝐨𝐧𝐢𝐜 𝐦𝐚𝐢𝐥, 𝐈 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐰𝐢𝐥𝐥 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐜𝐚𝐬𝐞 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐨𝐛𝐭𝐚𝐢𝐧 𝐭𝐡𝐞 𝐬𝐞𝐭𝐭𝐥𝐞𝐦𝐞𝐧𝐭, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Anyone still under the illusion of Microsoft having been transformed into a kinder, more mutually beneficial partner, please read this patent.

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, Read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy. [0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process. [0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150. [0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Applicants * MICROSOFT TECHNOLOGY LICENSING, LLC[US/US]; One Microsoft Way Redmond, Washington 98052-6399, US
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases. [0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks.
[0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions).
An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to MVIS [link] [comments]

Magic Money: The Bitcoin Revolution  Full Documentary ... DIY Bitcoin Mining: Hardware (part1) - YouTube Bitcoin mining in Bangladesh with mining Machine Inside a Secret Chinese Bitcoin Mine - YouTube How to Mine Bitcoins Using Your Own Computer - YouTube

Every user participate in the same network using global server power, that's why the performance of your device doesnt matter, only time spent in the system does. Full Specifications What's new in ... Not that long ago, barely anyone (except for computer geeks) had even heard of Bitcoin. After its price skyrocketed in the fall of 2013 and after the spectacular crash in early 2014, more and more people became interested in this “cryptocurrency,” and some of them even started mining it.While it’s becoming more and more difficult to mine - without spending a lot of money upfront - it’s ... 21Co, A Bitcoin Miner In Every Device. By +liongrass on 20 May, 2015. 21co Is Up To Something Huge . 21Co has been ridiculed quite a bit in the discussions recently around their plan to “put a bitcoin miner in every device”. I believe they are up to something really great, and while I have absolutely no insights into what they are up to, I have some ideas how this could change the internet ... 21 A bitcoin miner in every device and in every hand. San Francisco · Hardware + Software · Bitcoin · Bitcoin Mining We’ve built an embeddable mi A bitcoin miner in every device and in every hand. Earn.com . Follow. May 18, 2015 · 7 min read. By Balaji S. Srinivasan . 21 is now officially open for business — and business development ...

[index] [22329] [13584] [38095] [21306] [46670] [47722] [35825] [711] [25239] [37966]

Magic Money: The Bitcoin Revolution Full Documentary ...

Hi everyone In this video, I will show you how to use the BITCOIN MINER software to mine 0.5 btc per day Contact us on telegram or email for more informations or to acquire the software. Telegram ... Exploring the revolutionary Bitcoin digital currency. It doesn't need banks or to be printed. It can be transferred in a second to anywhere in the world. Wit... Harris Bitcoin Miner Software - Earn up to 1 BTC daily for FREE based on your device and internet connection. Click the link to download Harris Bitcoin Miner Software Download link - https://www ... Hello, welcome to Bitcoin Mining in Bangladesh, this is Antminer s7 with 4TH power run buy 24/7, power efficiency 1200W powe supply used for mining, to get more video please subscribe, please ... In 2014, before Ethereum and altcoin mania, before ICOs and concerns about Tether and Facebook's Libra, Motherboard gained access to a massive and secretive ...

#