Bitcoin WordPress Theme Download Bitcoin Theme Flytonic

Get some bitcoin!

Hello,
I need someone to do a favor for me, I need to get a wordpress theme from themeforest, but I want to pay with bitcoins but they won’t allow it. So... can someone buy it for me and then send it to me? I will send you the money in bitcoin. It’s not a huge amount of money, it is 19$, but I’ll give you 25$. So who wants to make a good thing and some money, please contact me, I really need the help.
Thank you!
submitted by anamaria_53 to btc [link] [comments]

Get some bitcoin

Hello,
I need someone to do a favor for me, I need to get a wordpress theme from themeforest, but I want to pay with bitcoins but they won’t allow it. So... can someone buy it for me and then send it to me? I will send you the money in bitcoin. It’s not a huge amount of money, it is 19$, but I’ll give you 25$. So who wants to make a good thing and some money, please contact me, I really need the help.
Thank you!
submitted by anamaria_53 to u/anamaria_53 [link] [comments]

My Very Provisional List of COVID Anomalies, Red/ False Flags and Clear Indications of Scumbaggery. LIHOP, MIHOP Or HOAX/SCAM? Def Not As Described. Need Your Help To Source References and Links For Existing Categories And Add New Ones. This is WOEFULLY INCOMPLETE. I Know I've Missed Tonnes...Ideas?

My Very Provisional List of COVID Anomalies, Red/ False Flags and Clear Indications of Scumbaggery. LIHOP, MIHOP Or HOAX/SCAM? Def Not As Described. Need Your Help To Source References and Links For Existing Categories And Add New Ones. This is WOEFULLY INCOMPLETE. I Know I've Missed Tonnes...Ideas?
Here’s my Top 22 list of suspicious shenanigans and red flags surrounding the COVID narrative:

  1. The Imperial College Death data - Neil Ferguson and Gates-funded Imperial College, London Model that ‘persuaded’ Johnson and Trump to lockdown. 500K deaths in UK and 2.2m deaths projected in US, EVEN WITH LOCKDOWN. Less than 10% accuracy but 110% alarmist, and evidence that the coding was deliberately flawed and designed to inflate numbers. Gates funding everyone involved in the staged 'debacle'.
https://www.dailymail.co.uk/news/article-8164121/Professor-predicted-500-000-Britons-die-coronavirus-accused-having-patchy-record.html
https://www.telegraph.co.uk/technology/2020/05/16/coding-led-lockdown-totally-unreliable-buggy-mess-say-experts/
https://www.ukcolumn.org/article/who-controls-british-government-response-covid19-part-one
https://www.corbettreport.com/gates/
Ferguson, with a terrifyingly consistent track record for hyping minor viruses that fail to transpire into pandemics (Swine Flu, Bird Flu, BSE etc), failing upwards as a ‘safe pair of hands‘.
https://statmodeling.stat.columbia.edu/2020/05/08/so-the-real-scandal-is-why-did-anyone-ever-listen-to-this-guy/
https://www.thesun.co.uk/news/11565369/useless-professor-neil-ferguson-antonia-staats/
EDIT: I‘ve reposted, but thought I’d put back the 95% that disappeared some minutes ago....
2) Ferguson’s blasé attitude to his affair during lockdown - clearly not too worried for his lovers’ family, if he genuinely believed COVID was a threat. No "error of judgement", just a man who knew there was nothing to fear.
https://www.theguardian.com/world/2020/may/06/ministers-hypocrisy-over-neil-ferguson-lockdown-affair
3) Hospitals cleared of patients in readiness for a pandemic that never came. Desperate for cash, doctors and nurses were financially incentivised to put down patients dying with/ of COVID on death certificates to gain payments. In US $13,000 per patient, and $39,000 per patient on ventilator etc.
https://www.tweaktown.com/news/72070/this-is-how-much-hospitals-are-making-if-patients-have-coronavirus/index.html
Footage of empty hospitals worldwide: https://www.youtube.com/watch?v=wrJ9yaUOVKs
Nurses furloughed, sent home for suspected virus without testing. Nurses - with nothing better to do - on TikTok etc:
Nurses slammed for filming TikTok showing them carrying coronavirus 'body-bag':
https://www.mirror.co.uk/news/world-news/nurses-slammed-filming-tiktok-showing-21960411
https://www.youtube.com/watch?v=EMHU6MtPVqQ etc
4) Games played with age and numbers, proof that only the elderly and very sick elderly were dying, but less of pneumonia and flu than in previous years. Median age of 79 in US and 82 in UK. Meanwhile whole country on lockdown.
"The median age of the deceased in most countries (including Italy) is over 80 years (e.g. 86 years in Sweden) and only about 4% of the deceased had no serious preconditions. The age and risk profile of deaths thus essentially corresponds to normal mortality."
https://swprs.org/a-swiss-doctor-on-covid-19/
https://medium.com/wintoncentre/what-have-been-the-fatal-risks-of-covid-particularly-to-children-and-younger-adults-a5cbf7060c49
(table from 2/7 down the page...)
5) When this became apparent, initial scare stories in press about children dying of virus, later proven to have no merit, just to ensure the hysteria was generalised. Meanwhile, probability of a child dying from the 'virus' is 35m to 1.

https://preview.redd.it/exxx18mdn8c51.png?width=2224&format=png&auto=webp&s=d9f00fd75d396a945a4244eab07b37325706eca3
"The second row shows that 2 deaths have been recorded among over 7 million school children aged between 5 and 14 (around 1 in 3.5 million), an extremely low risk — although additional deaths may be reported following coroners’ investigations. Over the last five years, there has been an average of 94 deaths registered over this 9-week period for those aged 5–14, and so the 2 Covid deaths represents only 2% of the normal risk faced by this group. That is, whatever average risk they would have faced in these 9 weeks if Covid had never existed — a risk which was extraordinarily low — was increased by Covid by only 2%."
from: https://medium.com/wintoncentre/what-have-been-the-fatal-risks-of-covid-particularly-to-children-and-younger-adults-a5cbf7060c49
https://www.telegraph.co.uk/news/2020/06/08/kawasaki-like-disease-affecting-children-caused-coronavirus/
https://www.dailymail.co.uk/news/article-8264135/UK-says-children-died-syndrome-linked-COVID-19.html
https://www.dailymail.co.uk/news/article-8316223/Up-100-British-children-mysterious-inflammatory-disease-linked-COVID-19.html
https://www.dailymail.co.uk/news/article-8278963/Ill-youngsters-directly-exposed-corona-victims-refused-tests-medics.html
6) The ludicrous claim that they had never considered economic and psychological DEATH toll of lockdown.
There was a press conference in June on BBC, where they said "saving lives" from the virus was considered more important. Hard to believe, but I can't find the footage yet...
"One of the most consistent themes that emerges from the minutes of SAGE meetings is how the Government repeatedly expected its scientists to account for the economic impact of lockdown restrictions – even though SAGE was not doing any economic modelling."
https://bylinetimes.com/2020/07/03/sagegate-part-one-treasury-and-downing-street-advisors-delayed-covid-19-lockdown/
7) Doctors globally openly being told they can save paperwork and earn money by basing cause of death on ASSUMPTION of COVID, based on the vaguest of pretexts and symptoms.
https://www.inquirer.com/health/coronavirus/coronavirus-covid19-cause-death-certificate-pcom-20200401.html
https://www.rollingstone.com/culture/culture-features/anti-vax-doctor-covid-19-death-certificates-984407/
https://www.youtube.com/watch?v=tlGkCABfyLw
Also, from the UK...Health Secretary Matt Hancock calls for urgent review into coronavirus death data in England.
It follows confirmation from Public Health England that reported deaths may have included people who tested positive months before they died.
https://www.bbc.co.uk/news/health-53443724
8) The propaganda campaign against any form of alternative to vaccine (Vitamin C and D, African cures, HCQ etc)
“The Government’s leading body for Covid19 drug trials – led by the controversial character Professor Peter Horby – Oxford’s Professor of Emerging Infectious Diseases and Global Health and heading the vaccine programme - stands accused of grossly misleading negative trial results for the coronavirus management drug Hydroxychloroqhine. (Conflict of interest, surely?)
The lead story in today’s France Soir – a long-respected and unaligned French daily – presents compelling evidence to suggest that the Whitehall/Cabinet Covid19 “advice” team cannot be trusted….and raises yet more doubts about BBC complicity in a false Coronavirus narrative.”
https://jonsnewplace.wordpress.com/2020/06/22/explosive-more-uk-covid-experts-facing-serious-data-manipulation-charges/
http://www.francesoir.fsociete-sante/remdesivir-une-molecule-dinteret-therapeutique-tres-discutable-sur-le-covid-19-partie ( in French)
The [Lancet’s] claim that hydroxychloroquine increases the risk of death in Covid-19 patients has been used by rivals as a stick to beat the US President, who has himself been taking the drug and hailed it a 'game-changer' in the war on coronavirus**.**
Mounting doubts over the study's reliability culminated yesterday when the authors retracted their study from the Lancet medical journal, whose editorial standards have also been thrown into question.
https://www.dailymail.co.uk/news/article-8391779/Lancet-paper-warned-against-Covid-19-drug-flares-accusations-political-point-scoring.html
“The Deputy Chief Investigator of the Recovery Trial, Prof. Martin Landray, gave an interview to France-Soir. What he revealed was quite remarkable.
Firstly, the mortality rate of the hydroxychloroquine patients was a staggering 25.7%.
The recommended hydroxychloroquine dose for an adult in the UK is no more than 200 — 400 mg per day. In France, 1800 mg per day is considered to be lethal poisoning.”
https://www.ukcolumn.org/article/the-hydroxychloroquine-scandal
https://time.com/5840148/coronavirus-cure-covid-organic-madagasca
https://www.livescience.com/coronavirus-vitamin-c-myth.html
9) The saturation of Gates into the narrative at every level. His hallowed and unquestioned presence in media as expert, the only Moses who can lead us out of this wilderness with his magic potions, release us from our prisons with his benevolence. His financial connections through BMGF to NIH, CDC, WHO, BBC, Guardian, CNN etc and of course every pharmaceutical company in existence....
https://www.corbettreport.com/gates/
Amazing Polly (pretty much every video this year):
https://www.youtube.com/watch?v=gm19xYwJ2nQ
BBC compromised:

“Transforming lives through media”? Gates and the CIA? Can we give up the pretence that neutral Auntie speaks for - or represents - us and our best interests?
Charities and foundations - without transparency, oversight and apparently universally trusted. Call your genocidal plans ‘charity’ and not only will you look like a philanthrApist, but people will even donate to their own demise.
https://www.bbc.co.uk/mediaaction/about/funding
EDIT: For further information, I just found this webpage:
https://unitynewsnetwork.co.uk/revealed-bbc-charity-receives-millions-in-funding-from-gates-foundation/
UK Guardian compromised:
Hear the Guardian is regrettably letting 180 staff go this week. Hopefully BMGF can find them suitable homes...
https://hectordrummond.com/2020/05/22/the-bill-and-melinda-gates-foundations-sponsorship-of-the-guardian/
From the article:
“This story came from a Guardian sub-section called ‘Global Development‘.
But then I came across this 2010 Guardian story about how the Guardian has started up this new ‘Global Development’ site in partnership with… the Bill and Melinda Gates Foundation.
So much information on Gates...almost “paralysed” with possibilities. Ideas?
10) Recent US and UK stories where people clearly dying of other things - cancer, suicide, motorcycle accidents etc are ascribed to COVID. Officially, George Floyd’s death should have been ascribed to COVID, since I believe he tested positive during autopsy. Might have led to a very different world...
https://cbs12.com/news/local/man-who-died-in-motorcycle-crash-counted-as-covid-19-death-in-florida-report
https://www.independent.co.uk/news/world/americas/george-floyd-death-autopsy-coronavirus-protests-a9548386.html
HighImpactFix video about case number “massage” and motorcycle anomalies:
https://www.youtube.com/watch?v=olz03OPeijM&feature=youtu.be
11) Recent US and UK stories of the deceitful practices by which:
i) the case numbers are conflated with all death numbers on certain days
ii) Dying "of" vs "with" COVID
iii) anyone who dies after testing positive is a COVID death
iv) cases being reported and subliminally conflated with deaths by the media, when death numbers fell too low to keep the public sufficiently terrified to accept coming measures
v) case numbers merely made up or inflated by a factor of ten, in Florida’s case last week.
https://www.cebm.net/covid-19/why-no-one-can-ever-recover-from-covid-19-in-england-a-statistical-anomaly/
Too many to include all here, but the recent Florida 'mistake' is here:
https://www.dailywire.com/news/florida-labs-found-significantly-inflating-positive-covid-testing-rate
https://www.youtube.com/watch?v=ta7g8BgKAXE
If this is a genuine event, what possible reason would there be to commit fraud in so many ways to keep it looking genuine, besides the need to control demolish the world economy and vaccine-shill?
12) Event 201. Drill gone live. Nuff said.
https://www.centerforhealthsecurity.org/event201/videos.html
CORBETT REPORT:
https://www.corbettreport.com/mml2020/
Amazing Polly:
https://www.bitchute.com/video/7O5RylrMUV8F/
13) The fact that there have been no surprises at all since the crisis began. Every next step had been telegraphed in the media well in advance. Everything began with the notion that a vaccine would be the only solution and the narrative has remained remarkably consistent to Event201.
14) Even with all of these statistical somersaults, the death numbers this year are not far from what they’ve been in previous years. Pneumonia and flu deaths are suspiciously down.

2020 - 6509 flu deaths in five months (Feb-June)
2020 - 6509 flu deaths in five months (Feb-June)
https://www.statista.com/statistics/1113051/number-reported-deaths-from-covid-pneumonia-and-flu-us/
Compared with:

2019- Flu killed 34,157 - more than twice amount for a similar period of five months this year.
2019 Flu killed 34,157 - more than twice amount for a similar period of five months this year.
https://www.statista.com/statistics/1124915/flu-deaths-number-us/
MUCH, MUCH MORE DATA NEEDED HERE....
15) That in the space of four months, they have managed to capitalise on this crisis and remove so many rights from us permanently. An opportunity for which they’ve been waiting for years, COVID sped up the process and kept us otherwise preoccupied.
Here is my list of achieved or achievable hidden agenda:
In no particular order:
  1. Controlled demolition of the stock market/ global economy. Global reset etc
  2. Transhumanist/ AI rollout (post-human, Gates patents for human batteries linked with cryptocurrency (60606). https://news.bitcoin.com/microsoft-cryptocurrency-system/
  3. Vaccine adulation and promotion (Gates etc promising vaccine = release from captivity - pharmaceutical companies in league with WHO to drum up mandatory sales)
  4. Expediting the climate change agenda, conflating it with the virus as a call for world government and global sustainability.
  5. Plus RFID/ ID2020 tracking through vaccines (mark of the beast, without which no transaction/ employment will be possible)
  6. Demonisation and eradication of cash (total financial dominion)
  7. Mass unemployment and Universal Credit system linked to Social Credit.
  8. Bank (and corporate) bailouts – this time round it looks legitimate and necessary, no public outcry.
  9. Using and conditioning us to the concept of quarantining as a future method of control should there be any hint of unrest.
  10. Cultification of the NHS to the point of a unifying religion (clapping and donations and lionisation of medical staff during what must be the quietest time in their history)
  11. Legitimation of multiculturalism and immigration (race-baiting through NHS and volunteers, #youclapforusnow
  12. A shot in the arm for the MSM and government as a whole: no longer irrelevant and dying, people watching 24-7 since pandemic. Taking attention away from alternative media.
  13. Privatisation of NHS/ public services – corporations will step in to ‘save’ us (public gratitude replacing scepticism)
  14. Makes government look noble and heroic (wartime/ WW2 mentality fostered)
  15. COVID19 as cover story for 5G radiation/ environmental pollution/ vaccine damage etc
  16. Mass Surveillance – using 5G ‘for our safety’ to track and trace
  17. Opportunity to pass draconian laws against human rights (assembly, sectioning, travel, speech)
  18. Social alienation/ conformity as preference/ patriotic duty
  19. Prevention of assembly in order to protest draconian laws
  20. Depopulation in stages (elderly first, then with vaccines and suicides/ bankruptcy etc due to system collapse)
  21. Censorship of social media and social discourse in general
  22. Installation of 5G during lockdown to avoid scrutiny
  23. Effecting the transition of the workplace, shopping district and school to the home, ending community and all nourishing human interactions.
  24. The ‘new normal’ - social revolution and culture creation through social distancing/ queuing for shops/reinvention of the word essential/ mask wearing etc
  25. Destruction of small and medium sized businesses and the high street in general
  26. Fauci’s early dismissive comments about virus, herd immunity and futility of masks, before the script was revised.
https://www.dailywire.com/news/watch-fauci-in-march-masks-make-you-feel-a-little-bit-better-but-unnecessary-for-general-population-warns-of-unintended-consequences
”You don’t need a mask.”:
https://www.youtube.com/watch?v=NUHsEmlIoE4
To the NEJM, he described COVID in March as a flu, with similar numbers predicted to suffer.
“WOW! Dr. Fauci in New England Journal of Medicine Concedes the Coronavirus Mortality Rate May Be Much Closer to a Very Bad Flu”
https://www.thegatewaypundit.com/2020/03/wow-dr-fauci-in-new-england-journal-of-medicine-concedes-the-coronavirus-mortality-rate-may-be-much-closer-to-a-very-bad-flu/
Why the u-turn? Surely we define our experts by their consistency.
F William Engdahl article:
https://fort-russ.com/amp/2020/04/shedding-light-on-the-dishonorable-record-of-dr-fauci-a-real-mengele/
Christine Grady (Fauci’s wife):
https://www.youtube.com/watch?v=jkYen0g4TRU
17) Boris Johnson, Matt Hancock and Nadine Dorries - The statistical chances (14%) of three members of the UK Cabinet (made up of 22 people), including the prime minister, actually catching it and one almost dying apparently, right before reversing his decision to let it pass.
https://www.spectator.co.uk/article/full-list-of-senior-government-figures-affected-by-coronavirus
https://www.bbc.co.uk/news/uk-51827356
A very intentionally dramatic start to our lockdown, announced by Johnson from his "death-bed", ensuring all were in the appropriate state of panic:
"Boris Johnson: Hospital doctors were ready to announce my death"
https://www.politico.eu/article/boris-johnson-hospital-doctors-were-ready-to-announce-my-death/
18) Meanwhile, racism knocks the virus off the front pages and our minds for a few weeks, but we’re meant to go right back to taking it seriously when requested.
https://summit.news/2020/06/05/1200-public-health-experts-sign-letter-advocating-mass-gatherings-because-white-supremacy-is-a-bigger-threat-than-covid-19/
19) The many proven fake media stories...of long lines for testing and hospital footage from NY, mannequins in beds etc
https://www.thedailybeast.com/cbs-news-accused-by-project-veritas-of-faking-footage-in-michigan-coronavirus-testing-report
https://www.youtube.com/watch?v=3BUBTtUTOII
https://nypost.com/2020/04/01/cbs-admits-to-using-footage-from-italy-in-report-about-nyc/
https://www.reuters.com/article/uk-factcheck-video-operating-dummy-coron/partly-false-claim-video-shows-doctors-operating-on-a-dummy-to-exaggerate-extent-of-coronavirus-crisis-idUSKBN21P2Q8
20) International care home scandals - Deliberately mandating coronavirus carriers into crowded care homes to bump up death toll and concomitant hysteria, kill off elderly...murder?
"It is remarkable how many deaths during this pandemic have occurred in care homes. According to the Office for National Statistics, nearly 50,000 care home deaths were registered in the 11 weeks up to 22 May in England and Wales — 25,000 more than you would expect at this time of the year. Two out of five care homes in England have had a coronavirus outbreak; in the north-east, it’s half.
Not all these deaths, however, have been attributed to Covid-19. Even when death certificates do mention it, it is not always clear that it is the disease that was the ultimate cause of death..."
https://www.spectator.co.uk/article/dying-of-neglect-the-other-covid-care-home-scandal
"The daughter of a 91-year-old gran who died of Covid-19 she contracted in a care home is demanding to know why her mum was “sacrificed” by ministers.
Retired teacher Anne Duncan died in Edinburgh’s Western General Hospitaltwo days after her family managed to force a move out of the care home in the city where they feared she would die alone.
Her daughter Linda hit out at what she called a “scandalous” policy to release coronavirus patients into care homes and called for her mum’s death to be investigated as part of a wider review."
https://www.dailyrecord.co.uk/news/health/scots-gran-who-died-covid-22172074
Also, more than 40% of US ‘virus‘ deaths occur in nursing homes:
https://thehill.com/homenews/news/504885-over-40-percent-of-us-covid-19-deaths-are-linked-to-nursing-homes-nyt
21) (thanks to law of confusion!) Ventilators - All of the sudden, a clamour for them generated panic demand and buying. Cuomo desperate, while he sat in front of a warehouse wall full of them. Hegelian dialectics at play. Trump apparently withholding, Trump giving them out like Oprah, then the evidence that they were killing most people on them.
“A giant study that examined outcomes for more than 2,600 patients found an extraordinarily high 88% death rate among Covid-19 patients in the New York City area who had to be placed on mechanical devices to help them breathe.”
https://www.bloomberg.com/news/articles/2020-04-22/almost-9-in-10-covid-19-patients-on-ventilators-died-in-study
22) Testing inconsistencies:
Half of CDC Coronavirus Test Kits Are Inaccurate, Study Finds.
”The study's lead author, Sin Hang Lee, MD, director of Milford Molecular Diagnostics Laboratory, found that the testing kits gave a 30 percent false-positive rate and a 20 percent false-negative rate.”https://www.msn.com/en-us/health/medical/half-of-cdc-coronavirus-test-kits-are-inaccurate-study-finds/ar-BB16S6M6
“According to the creator of the PCR test, Kary Mullis himself, it cannot be totally and should never be used as a tool in “the diagnosis of infectious diseases.”
https://www.weblyf.com/2020/05/coronavirus-the-truth-about-pcr-test-kit-from-the-inventor-and-other-experts/
Also, this about CT testing irregularities:
https://www.thewesterlysun.com/news/covid-19/connecticut-says-it-found-testing-flaw-90-false-positives/article_91811362-a9b3-53ab-9485-00067ce9e0d5.html
Funny how all the “mistakes” err on the side of positive...
submitted by secretymology to conspiracy [link] [comments]

how to make money by selling your daily photos

Making money online isn’t as simple as many think even though there are lots of ways one might do it, such as playing games, mining bitcoins, creating a YouTube channel, or just creating a blog. But the Internet allows much more than these methods, and that is to make money out of your hobbies. Computer builders can advertise their skills and make client builds, graphics specialists can make custom designs and sell them and the list goes on and on.
One hobby is quite common and and the possibility for getting fair compensation is quite high: photography. Be it digital photo manipulation or old school photography, those who have this hobby can sell their photos and make a pretty buck from it. Of course, your photos must be good if you want to sell them.

What types of photos can you sell?

Pretty much any type of digital media can be sold. If you own a quality camera, like a DSLR, you can take artistic photos or stock photos. There is a big market for stock photography, as digital artists use these photos to create others from them. Also, in the same category of stock photography are texture photographs, which can also be done with a high quality camera.
Note: Stock photography requires you to have a DSLR camera, as you need the high resolution provided by these devices. This is especially true for texture photography, where the textures need to be high resolution and high quality.
Artistic photography can also bring you some money, but there are many photographers out there that are very well known and take stunning pictures of all types (portraits, landscapes, nature, sports, macro, etc), and making a name for yourself is pretty hard, but if you are talented, then you will succeed.
Digital compositions can be sold in numerous places and graphics designers have made a living out of creating awesome photos from scratch or from stocks, using specialized software, such as Adobe Photoshop. If you don’t own a powerful camera, and you don’t like going out and searching for the best frame, then this might be the one for you. But keep in mind that programs like Photoshop are very hard to learn, and becoming proficient with them will take months if not years of hard work.

Selling photos online: Q&A

If you are just now starting to think about selling your photos, then you must have lots of questions. Here are a few answers that might interest you in the beginning:
Q: How much money can I make from selling photos? A: It greatly depends on how well your photos are discovered, how many you sell and what percentage of the cost of the photos you receive from the service you use.
Q: How long before I get any payment? A: Again, it depends on how quickly your photos are discovered, how good they are, how affordable they are and of course, on what people need.
Q: Do I have to invest anything? A: In some cases, yes. There are many websites that allow you to upload photos for free, or try a demo of their services, but many require either a one time buy or a regular subscription.
Q: What is the best solution for selling photos online? A: Both ways have their advantages, what it boils down to is the time you plan on investing in this and of course, the budget.

Tips on selling your pictures online

Even though the concept of selling pictures online is pretty straightforward, there are some aspects that you should consider. By following these simple guidelines you will get a head start in your endeavor and make a name for yourself. After all, being known by people is half of the way, and once you make yourself known to the customers, you will have better chances of selling your photos.
Before you start selling your pictures online, you might want to do a little reading on photography and composition, as you will need these skills to later take good pictures. Also, if you are using Adobe Photoshop to compose or edit photos, then look at a few tutorials and learn how to use it.

Where to sell pictures online?

There are two ways to go about selling your pictures online. First off there are websites that allow you to open an account and upload your photos to your gallery. These websites are used by thousands of photographers and customers and offer a simple and effective way to sell photos online.
The other type of websites or services that you can use to sell your photos online is the online portfolio builder, where you use the dedicated tools to create your own website and have your own gallery. This allows users to better customize their pages and have nice looking websites that reflect the type of pictures they want to sell.

Websites to upload and sell your pictures

There are a number of websites where you can sell pictures but keep in mind that you can only sell pictures that belong to you. If you have some awesome pictures that you have taken, these websites will be of help if you wish to sell them and make a profit out of your hobby. This type of websites has some advantages that make them suited for certain users:
Although these websites are simple and free to use, keep in mind that they hold hundreds of thousands of images, and getting yours sold might take a while. Now that you know what these websites can do for you and how to use them, here are some examples of good markets where you can bring your photos to sell them:

Websites to create online personal portfolios

Keep in mind that not only digital copies of your images can be sold. If you have some great shots and some basic Photoshop skills, you can make your own Print on Demand website and sell your photos as greeting cards or paintings. Also, there are a number of services that will allow you to create a portfolio and upload your photos to a hosting server. From these websites, you will be able to sell your photos easily to customers. Here are some of the highlights of these services:
While these services allow anyone to create a professional portfolio, most of them are not free, and sooner or later, users will have to pay a subscription. Also, they will have to do some research on how to run a blog and make it popular if they want their pictures to show up in web searches. If you are interested in such solutions, here are a few to get you started:
These are only a few of the tools that you will use in your pursuit to sell your pictures, as there are many other tools out there that might help you. Remember to do solid research before you commit to a service or a website and try to use well known services that others have used and recommended.

submitted by JV_info to making_money_online [link] [comments]

Amazing. It's already possible to create a shop that accepts lightning payments without any coding involved in under 1 hour. Get your friends to test lightning payments for 1 sat only. https://spendsats.fun

I wanted to test if it's already possible to create an e-commerce store without getting stuck somewhere when you don't have any coding knowledge.
Honestly, I was surprised how easy it is to set up one with the help of some sort of CMS and additional plugins. I did some research and it seems Wordpress is still the king for creating simple e-stores using Woocommerce plugin.
So for testing, I bought cheap shared hosting plan for $2 bucks (paid using bitcoin) from lowendbox offers
Bought a domain from NameCheap for $2 bucks as well (also paid using bitcoin)
Installed Wordpress on it using automatic installer that every hosting provider has nowadays.
Activated a free theme compatible with Woocommerce from Themes section in Wordpress
I thought the biggest challenge will be the integration of lightning merchant into woocommerce as its a fairly new thing but it seems there is already bunch of merchants that have native plugins for it! Great! My eye got caught two of them Strike and OpenNode
After this I got myself a free SSL certificate from sslforfree and activated it using cPanel.
I've choosen Strike (was the first one I tried and it worked anyway), downloaded the plugin, activated it, entered my API Key and ta-da! it works! I'm a proud owner of useless store that costed me $4 bucks. Cannot be happier.
Didn't have to touch any code, nothing! I can also expand functionality of the store using another plugins as well.
Some other plugins I used: Checkout Field Editor for WooCommerce --- To get rid of the billing fields. Disable cart page for WooCommerce --- To get rid of the unnecessary cart page. Really Simple SSL --- Easily enabling https everywhere.
Anyway... Who is fancy to buy some prayers for 1 sat today? I guess I will keep the site online until host expires but for now feel free to invite friends to test the glorious lightning network. With the help of @GiverOfBitcoin anyone should be able to try it easily now. I also added a quick tutorial how to get free sats from him on the website as well.
https://spendsats.fun
submitted by skz- to Bitcoin [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Author's sites accepting Crypto Currency

Hi all.
I have been interested in a few digital currencies for a while, but cant believe how long it has taken me to implement them as a payment method at my author site, especially since I predominantly write science fiction. It seems like it should have been a natural step - digital goods (ebooks) for digital currency (Litecoin, Smartcash, etc)
I decided recently that I would poke around reddit and other places for some more information on this topic, but it seems that it's not yet a common practice.
I was wondering how many people sell ebooks on self-made sites like a wordpress site or something similar, and would consider this form of payment?
Also how many people would like to have an online store but are put off by the setup and monthly costs? Would you add a store if I said you could do it yourself easily and for free, if you dont mind leaving out Visa and PayPal and instead accept Crypto Currency payments? If there's any interest I can write a simple guide in the comments.
I guess I'm kind of asking the 'why not' question, whilst also feeling obliged to mention that this seems like a great opportunity to make extra sales, especially those writing science fiction as it fits the theme!
Coming over from Crypto currency blogs, I see people everywhere are dying to use this digital cash that they are buying and then just locking away safely for a time when someone will finally accept it as payment.
Many people can be put off of CryptoCurrency because of the infamous Bitcoin and its volatility in how much its worth, but there are plenty of other, highly supported and highly regarded coins, that are much more affordable and are being widely adopted, due to the relative stability in their value.
I dont think there's anything to lose, but a heap to gain.
So I end with another question, are there any self published authors accepting cryptocurrency as ebook payment? Please drop a link below, I would like to have a browse :)
Maybe we can get a small list of Crypto-authors under here.
submitted by moppersanonymous to selfpublish [link] [comments]

Behind The Scenes of How I Sold A Passive Income Site for $1,830.40

Hey guys,
New to this subreddit, but I recently sold a very small affiliate site a couple months back for about $2,000 and wanted to share my experience.
Although the sale wasn't HUGE, the process was very illuminating and interesting for future projects. It also reinforced that I should be focusing my efforts on higher leverage options. However, if you're new to entrepreneurship or online marketing, hopefully you find this helpful.
Let me know if you have any questions.
The other day I sold a passive income site I built 2 years ago for $1,830.40 with Empire Flippers.
Here’s an in-depth look at how I went and sold my first website ever (and what I thought of the whole process).

The Background

A couple years back, I started a new web site (to protect the buyer’s privacy, let’s call it GWP.com). It was in the WordPress themes space.
I had seen some success from other sites in the space and knew there was opportunity.
I built the site quickly with the help of an AWESOME virtual assistant, but then had other projects come up that were more important.
The site did well from the get-go because of my initial enthusiasm, but it wasn’t a game-changer for me. It made a few sales a month (off which I made about $30), but I did basically no work on it and it was very under-optimized. It was THE definition of a passive income site.
That said, even if I optimized it, I think I could double or triple the earnings, but probably not enough to make it worth directing a lot of attention to it.
The site was was making about $100/month, which for some people is great, but I had a lot of other areas in general that I could optimize that have greater returns (this site, for one).
In addition to revenue reasons, over the last year, I’ve been working on focus, and I’ve made the decision that I don’t really want to be spending time on anything that isn’t Impossible or Paleo related.
For that reason, this site no longer fit in with my goals and I decided to sell it.

Picking Empire Flippers

I used EmpireFlippers.com, who I know through the Dynamite Circle.
Before listing, I had never met them, but they’ve got a good reputation and a decent buying audience, so I decided to give it a shot.
I know several guys who have bought and sold sites through them. Also, because it wasn’t a HUGE dollar amount, I figured I would give it a try.

The Fees

Empire Flippers charges $297 to list a site for a first time seller. They charge $97 for any future sites.
That’s not a bad deal, especially on bigger sites (most brokers work on a percentage), but if you’re selling a small site (like I did), the fee actually cuts into your profit by a large number since it’s not a scaled percentage.
Either way, I decided the listing fee was worth it and went full-speed ahead (Note: I found out about another “commission” fee later on in the process. More on that later).

The Experience

The experience started off a bit bumpy. I did an analysis on the numbers and had to separate them out since these sites shared a few affiliate accounts I used for other projects.
This is a good lesson for the future: create separate affiliate accounts for each site if you intend to sell them in the future.
That said, I ran the numbers and provided a detailed breakdown in the spreadsheet.
Unfortunately, that wasn’t enough.
They wanted a login directly to my affiliate account so they could verify the numbers themselves. This is understandable, but a little invasive if you have multiple sites running through the same account. Also, it would have been a much less of a big deal if they would have gotten the numbers right.
Even after providing the numbers (on my end), the numbers they came up with were way off.
In less words – for this sale specifically – ShareASale (the affiliate marketplace that I used for affiliate links) provides the total transaction amount AND the commission you actually make.
The Empire Flippers VAs added these two numbers together instead of just counting the commission.
This meant that for each sale I “made” through ShareASale, Empire was counting my total revenue on the site as 130% of the purchase price – even though I was only making 30% of the purchase price!
Because of this, the initial estimate I got for the site was close to $8k!
While I could have taken their valuation and kept the listing price at that, I have this darn conscience that would have bothered me for a while about it.
I pointed out the error to the team and they re-ran the numbers and agreed to list the website at $1830.40 or about 20x monthly revenue.
Here were the exact calculations:
I gave them a login to my site, Google analytics, and ShareASale, and they approved my listing.

The Multiple

They approved the site for a 20x multiple. I pushed for a higher multiple, but they reminded me I was looking for a quick sale, so I agreed to go with 20x.
The Sale
The sale went up 1 day and was sold within 24 hours.
That was fast!
In fact, I went back to look and it sold just over 8 hours after it was listed.
Getting it sold FAST was awesome, but it also reinforced my opinion that the listing price was too low. That said, I didn’t cry too much because again, my goal was on selling it fast rather than maximizing a few hundred bucks off it.
I figured if I got the sale over and the cash quick, then it all would be good.
The only other thing that bothered me about the listing was that I never got to see it before it went live. As a marketer, I would have liked to have been involved in the listing name, language, etc.
I guess that’s part of their process (and maybe a benefit to people who don’t want to have to deal with it), but it bothered me a bit after the fact (although that could just be because of my inner control freak tendencies).
Again, these were all minor things – I wanted to focus on my other projects – and the fact that they could get a buyer in less than 24 hours was impressive.

The Migration Process

Migration is where I had my biggest issues with the process..
First, I had to provide access to the Filipino techs to transfer my site.
That’s okay, but I had other projects on the same host and it’s a bit nerve-wracking to give someone you’ve never met wholesale access to your hosting backend.
The migration process took a bit (as they had to coordinate buyer and seller info), so I think this part took a few days.
The other annoying thing was that as part of the migration, they had to verify and change what sorts of ad info and affiliate info you had.
In my opinion, this should be solely on the part of the buyer. The seller sells the site as-is and the buyer should have to do the work to swap out ads.
Empire Flippers tries to mitigate this by having their techs do it – but the end result is that it slows everything down for the seller.
The other annoying piece was that I kept getting comments and questions that should have never come up
These are good questions, but should have been figured out when the buyer was purchasing the site or did their due diligence – not after the sale has been entered into agreement.
As for links that don’t work – they didn’t work when I sold the site and that’s part of the buyer’s opportunity. The site was under-optimized from the get-go and I hadn’t spent anytime looking at it. Changing that link is the reason you get it for 20x vs. 36x.
Also, throughout the process, the migration ticket is handled on 1 ticket for both parties. That means each party can see what the other is typing.
That makes it easier for Empire Flippers, but could be a security risk if 1 side provides passwords or other sensitive information in it.

Domain Transfer

This was the second annoying thing.
It costs zero to create an account on any domain registrar. The best practice here would be to push the domain to whatever registrar it’s currently on, then let the buyer transfer it on their own time down the line.
Domain “pushes” are instant on the same registrar, while a domain transfer (to a different registrar) can take anywhere from 3-10 days. Instead of doing a registrar push, the buyer insisted on a domain transfer which is a bunch more hoops that the seller has to jump through.
They can fix this just by allowing the seller to push the domain to whatever registrar the domain is currently owned at.
Waiting 5-10 days to see if a domain is transferred correctly is annoying and a waste of time as a seller.

Revenue Verification

Empire Flippers holds your money until the other party verifies traffic and sales.
This is annoying as a seller.
I understand why – they want to verify that they’re selling legit sites – but it’s VERY unfriendly to sellers.
Here’s why:
As a seller, you’re selling a site based on past performance – not future guarantees. In any site, technical changes affect SEO and performance. A seller shouldn’t be responsible for changes that the buyer could potentially jack up.
The seller is on the hook for poor implementation by the buyer.
Imagine if you wanted to buy a stock, but only had to pay if the stock went up?
That’d be great as a buyer, but as a seller, there’s only downside. No other market does that.
If something goes bad, the seller is screwed.
The buyer I dealt with wanted it transferred to his specific domain manager.
That’s cool but when you transfer registrars, you are automatically locked from moving that domain again – per iCANNs rules – for 60 days.
This is very annoying.
I tried to put in a ticket on this, but the support team manually merged it into my transfer ticket (which let the buyer see it as well – which, again, is not what I intended) and is another problem with the shared transfer ticket.

Adding In A “Bonus” Site

Part of my deal with the listing was that I was going to throw in another WordPress theme related site (let’s call this one RT) to the buyer. It was a very similar site that did less traffic due to neglect – I hadn’t really done much with it.
The site generated no revenue and had minimal traffic, so throwing in the domain was meant to boost interest in the sale.
The problem came up (again) that the buyer wanted it transferred to a specific registrar and I was asked to do so.
Again, this is a terrible policy.
I was throwing in the domain and the site as a bonus, and it was a pain that it was taking even MORE of my time.
The buyer ended up creating an account at the registrar the domain was at, which was nice, but that should be the standardized policy.

Surprise: A Commission Fee

I should preface this: this is MY fault. This is pretty standard in brokering situations, but (for some reason I still don’t know), I was under the impression that the listing fee was the only fee I was going to be responsible for.
That said, once I was told how much I was getting paid ($1555.84), I was surprised to see the number lower than the sale price. After inquiring further, I only then realized the commission was on top of the listing fee.
Screen Shot 2015-10-21 at 4.16.30 PM
I don’t know why I didn’t realize this (I think I was just focused on clearing house and had other things going on). I was so sure that the listing fee was the only fee, that I went back and looked and sure enough, they say it RIGHT ABOVE the button to “sell the site.”
Proof
Oops. Apparently, I’m not a good speed reader.
While this is reasonable on larger sites, in total, between the listing fee and this, EF basically ended up eating 33% of my sale price which sucks.
Again, this is in the terms and conditions and is MY fault, but it’d be cool to see a “profit calculator” or a notice of “this is how much you’ll sell for” and “this is how much you’ll get” earlier on in the buying process so bad speed readers like me don’t get surprised :(
That said, let’s talk MONEY.

Getting Paid (Cash MONEY!) $$$

All right, the deal was done. The buyer was happy and everything was good to go.
Email
Not wanting to deal with Paypal, I opted for bitcoin. I’ve bought a few bitcoin in the past and didn’t mind stocking up on a few (just in case they go to a billion someday :)).
After trying to haggle Paypal minus the fees – I settled on bitcoin.
I got this message from Joe:
At this point, I was antsy to get paid, so waiting a full week to get paid seemed like ANOTHER preventable delay. I know there’s a bit of volatility with the price of bitcoin, but I think they should probably carry some bitcoin as a cost of doing service in order to accelerate some of these smaller transactions).
Nevertheless, on September 2nd, Joe sent $1,000 to my bitcoin address and sent the remainder on September 6th.
Website Sold. Transaction finished. #boom

Vital Stats For This Website Sale

For those of you scanning this, I dug up some of the numbers for this sale in order to give a quick overview of everything. I think it’s pretty interesting:

Lessons Learned From Selling My First Site

If you’re going to sell a site, separate earnings out by the account / website level
This would have helped with the earnings numbers and verifications and cleaned things up from a security standpoint. I would have felt way more secure in sharing multiple accounts with them, and it would have sped up everything.
Get all the terms up front
Part of what annoyed me about the sale was that it wasn’t until after I made the sale that I was told I wouldn’t receive funds until the buyer verifies that they’re making money. I also didn’t realize that the listing fee was in ADDITION to the commission fee. I still would have listed with them, but I would have been aware of it, rather than surprised (to be fair, I take responsibility for this part, but I think it could have been clearer).
Understand the domain transfer clauses
I mentioned this above, but this was annoying as well and added 5 days to the transaction time. Domain pushes and transfers are very different things and can add a huge differential of time to the transfer process.
Know it’s going to be a PITA
I was really hoping that for such a small site and transaction, that it would be quick and painless. It ended up being a minor pain in the a$$ when I had a lot of other things I’d rather focus on – which was the reason I was selling it in the first place.

Conclusion

If you’re a buyer, Empire Flippers might be a good deal. Most of their policies are buyer-centric. This makes sense. Buyers will often buy multiple sites (they have money to spend), but sellers don’t sell nearly as often. It makes sense to build in policies to their business model that protect the people giving them money.
If you’re a seller (especially looking for a quick sell), the sale happened SUPER fast, but the transfer took way too much of my time to be worth it.
I was hoping they’d be much more direct and quick with the sale and hassle-free. However, it seemed like every step of the way (except the actual sale), I was dealing with a headache.
Part of their model includes using Filipino VAs. I have no qualms with that, but it did delay the process somewhat as most of the interaction took place on Filipino time (night-time stateside) and required solving miscommunication issues that did come up. Interestingly enough, if I worked normal hours (9-5 US time), this would have taken even longer – chalk another one up for night owls. This could be fixed by having VAs on duty round-the-clock or on US shifts (which is not unusual for outsourced services).

My Verdict on Empire Flippers

Based on my experience with Empire Flippers, I would give them a 6/10.
I’ve been building sites for a long time, but I’m a newbie at selling them.
Again, I’ve known the Empire Flippers guys since way back when they were Adsense Flippers and they do a ton of volume and move a lot of sites, so maybe people are having better experiences than me, but on this sale, I found a lot of things they could fix or improve on to be more seller-friendly.
I think a major part is that selling a site (especially one that could be considered a “small site”) is a headache in general. I felt like this took an inordinate amount of time for such a small site but to be fair, I’m not sure it would have been better with Flippa or anyone else (since you have to manage the process yourself), but it would be nice for it to be a little less painful.
It’s probably much more worth the squeeze if you have a bigger site that you’re listing, but if you’re thinking about Empire Flippers, here’s my verdict:
Pros
Cons

Postscript

I talked with Justin Cooke (one of the founders at Empire Flippers) at a conference in Barcelona this past weekend about a lot of these issues.
One thing that I didn’t realize is that this size of deal (under $5k) they don’t really do much of anymore. For a lot of the reasons I outlined above, they don’t take on smaller sites, but also, the people BUYING smaller sites tend to be less experienced and delay the process (via many of the things I mentioned above).
For this reason, I think you’ll run into MANY of these problems with ANY sale UNDER $5k. It’s just the market and there’s not a lot of good options for getting rid of them. If I knew that going into this, I would have either
1) deleted it,
2) hired an assistant to grow it to something more salable,
3) just forgot about it.
Given the new knowledge, if I had a site to sell in the 5-10k range, I would consider giving them another shot, however, there are things from the seller’s side that I would like to see fixed.
This post was originally posted on Impossible. If you found it helpful, I'd love to hear your comments! Thanks.
submitted by joelrunyon to Entrepreneur [link] [comments]

Of Wolves and Weasels - Day 156 - DOGE4DOGE - What's working for you?

Hey all! GoodShibe here!
Today I ask a simple question: What's working for you?
How is the Dogecoin experience panning out?
What could we be doing better?
You see, I've heard some people complaining that there isn't much yet for them to do with their Dogecoins... and that's a comment that really got me thinking.
One of the things that is essential to the long-term viability of our coin is Demand.
And if we can 'do' enough things with our coin, garner enough interest, have access to enough things and experiences that people want to take part in... then there's are a good chance that folks -- especially new-Shibes -- will brave the somewhat convoluted system required in order to get their hands on Dogecoins.
So... what would you like to be able to do, or buy with Dogecoins that you're not currently able to?
Let's make a wishlist together, here and now.
Something for the more enterprising Shibes amongst us to take and run with, to get their ideas flowing.
Things we wish we could buy with Dogecoins
Things we wish we could do with Dogecoins
Goals/Projects to undertake
It's through these sorts of exercises, by taking stock of where we are and where we'd like to be, that we can also help to build our DOGEconomy.
To give our community forward direction and momentum.
Think of it like putting a wish on the wind... sometimes you actually get what you want.
So, let's give it a try, my friends! Let's build a list and see if we can't all help ourselves get a little bit closer to the moon. ;D)
It's 8:06AM EST and we're at 82.30% of DOGEs found. Our Global Hashrate is down from ~50 to ~47 Gigahashes per second and our Difficulty is up slightly from ~714 to ~761.
As always, I appreciate your support!
GoodShibe
If you have work you need done, please consider hiring a Shibe first from our BOOTSTRAP SERVICE ECONOMY
If you have skills to sell for Dogecoin or would like to hire a skill that's not on the above list - let me know in the comments and I'll add your request here.
If you want to build a team or have a project you want to move forward, let me know in the comments.
If you have an artist you want to shout out or work you think needs more attention, or sale on the way or a business on the rise... let me know in the comments.
Together, we rise, my friends!
Services on Offer
Help Wanted
Projects Starting
Projects Ongoing
Shout-outs
Sales and Specials at Dogecoin Businesses
submitted by GoodShibe to dogecoin [link] [comments]

Best Free WordPress Theme 2020 For Elementor Or Gutenberg ... Bitcoin & Altcoin Wallets plugin (w/ Bitcoin core full ... WordPress Themes: Things to Check Before You Buy Best WordPress Themes for Blogs & Small Businesses in 2020 ... 12 Best WordPress Themes For 2020 (Free and Premium ...

MORE INFO / Buy Now DEMO GET HOSTING Bizdrone is a Multipurpose Responsive Cryptocurrency, VPN, Money Exchange, Virtual Credit/Debit Card, Web Hosting WordPress Theme. Also included a custom WHMCS Template based on WHMCS v7.7.x An Well Sorted Email Template pack also included in the package. Anyone can easily update/edit this template by following our Well Sorted Online Documentation. 20 Best Cryptocurrency WordPress Themes for Bitcoin and ICO 2019! #CRYPTOCURRENCY #premiumwordpressthemes Click To Tweet. But you don’t need to hire designers and developers to build an entire cryptocurrency website. All you need is a specially adapted WordPress theme for this specially oriented niche which will follow all the latest technology trends, be mobile ready and offer great user ... As a result, it’s very profitable to start a blog or e-commerce website about Bitcoin or any other cryptocurrency. Setting up a website, starts with good web design and WordPress is making life easier with its beautiful themes feature. For this reason, I found 5 free Bitcoin themes for WordPress which are available to download. If the theme you want is on a website like ThemeForest that does not accept bitcoin, you can find a team of developers / company that provides WordPress related services and advertises to accept bitcoin. They can purchase the theme and other digi... Get 5 bitcoin buy WordPress themes on ThemeForest. Buy bitcoin buy WordPress themes from $49. All created by our Global Community of independent Web Designers and Developers.

[index] [30226] [41434] [31256] [1186] [11110] [32724] [16167] [48723] [13922] [18312]

Best Free WordPress Theme 2020 For Elementor Or Gutenberg ...

Searching for the best free WordPress theme for 2020? Well look no further, it's right here and its miles better than most Pro themes that I have used. Its h... Check out the 5 best WordPress theme to use to create a fully customizable, stunning, and profitable website or blog in 2020. If you think about starting a new website or blog in 2020, and you are looking for the best WordPress theme, check out these themes: 1. Neve - http://bit.ly/... Tutorial video for how to integrate a Bitcoin wallet (bitcoind node) into your WordPress site. This video in article form: https://www.dashed-slug.net/bitcoi... So you’ve found a beautiful WordPress theme. It has a fantastic style, and it seems just right for your project. But how do you know if it’s just as good und...

#