Botnet Bitcoin: Um vírus que te faz minerar bitcoins ...

Everyday info sec, hardcore info sec, and DNMs

Edit: Currently writing a new version of this, dont know when it will be done.
Edit: Since first post I have updated a few sections with additional information.
I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful.
I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips)
Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful.
I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both.
--------
Everyday Simple Info Sec:
-There could be a hidden administrator user on your PC, make sure to change its password
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted)
-Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password)
-use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good.
-Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question)
-------_
High level crimimal information security:
The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked.
Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible.
-Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown)
-Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities)
-rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password)
-Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade)
-Never use accounts that have been exposed to lower security on higher security machines
-your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak)
-Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
-------_
How to use dark net markets (DNMs)
If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential.
Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money.
-A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist)
-Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature)
-Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen)
-now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct.
-wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in
-test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews.
Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask.
No idea how long this will stay up, I might purge it in 7 days, or never.
submitted by seven_N_A7 to u/seven_N_A7 [link] [comments]

The importance of being mindful of security at all times - nearly everyone is one breach away from total disaster

This is a long one - TL;DR at the end!

If you haven't heard yet: BlankMediaGames, makers of Town of Salem, have been breached which resulted in almost 8 million accounts being leaked. For most people, the first reaction is "lol so what it's just a game, why should I really care?" and that is the wrong way to look at it. I'd like to explain why everyone should always care whenever they are part of a breach. I'd also like to talk about some ways game developers - whether they work solo or on a team - can take easy steps to help protect themselves and their customers/players.
First I'd like to state that there is no practical way to achieve 100% solid security to guarantee you'll never be breached or part of a breach. The goal here will be to get as close as possible, or comfortable, so that you can rest easy knowing you can deal with problems when they occur (not if, when).

Why You Should Care About Breaches

The sad reality is most people re-use the same password everywhere. Your email account, your bank account, your steam account, your reddit account, random forums and game websites - you get the idea. If you haven't pieced it together yet the implication is that if anyone gets your one password you use everywhere, it's game over for you - they now own all of your accounts (whether or not they know it yet). Keep in mind that your email account is basically the holy grail of passwords to have. Most websites handle password changes/resets through your email; thus anyone who can login to your email account can get access to pretty much any of your accounts anywhere. Game over, you lose.

But wait, why would anyone want to use my password? I'm nobody!

It doesn't matter, the bad guys sell this information to other bad guys. Bots are used to make as much use of these passwords as possible. If they can get into your bank they might try money transfers. If they get into your Amazon account they might spin up $80,000 worth of servers to mine Bitcoin (or whatever coin is popular at the time). They don't care who you are; it's all automated.
By the way, according to this post (which looks believable enough to be real) this is pretty much how they got into the BMG servers initially. They checked for usernames/emails of admins on the BMG website(s) in previous breach dumps (of which there are many) and found at least one that used the same password on other sites - for their admin account!
If you want to see how many of your accounts are already breached check out Have I Been Pwned - I recommend registering all of your email addresses as well so you get notified of future breaches. This is how I found out about the Town of Salem breach, myself.

How You Can Protect Yourself

Before I go into all the steps you can (and should) take to protect yourself I should note that security is in a constant tug of war with convenience. What this means is that the more security measures you apply the more inconvenienced you become for many tasks. It's up to you to decide how much is too much either way.
First of all I strongly recommend registering your email(s) on https://haveibeenpwned.com/ - this is especially important if your email address is associated to important things like AWS, Steam developer account, bank accounts, social media, etc. You want to know ASAP when an account of yours is compromised so you can take steps to prevent or undo damage. Note that the bad guys have a head start on this!

Passwords

You probably need to have better password hygiene. If you don't already, you need to make sure every account you have uses a different, unique, secure password. You should change these passwords at least once a year. Depending on how many accounts you have and how good your memory is, this is your first big security vs convenience trade-off battle. That's easily solved, though, by using a password manager. You can find a list of password managers on Wikipedia here or you can search around for some comparison articles.
Some notable choices to consider:
Regardless of which one you choose, any of them is 100x better than not using one at all.

Multi-Factor Authentication / Two-Factor Authentication (aka MFA / 2FA)

The problem with all these passwords is that someone can still use them if they are found in a breach. Your passwords are only as strong as the website you use them on. In the case of the BMG breach mentioned above - all passwords were stored in an ancient format which has been insecure for years. It's likely that every single password in the breach can be reversed/cracked, or already have been. The next step you need to take is to make it harder for someone else to login with your password. This is done using Multi-Factor Authentication (or Two-Factor Authentication).
Unfortunately not every website/service supports MFA/2FA, but you should still use it on every single one that does support it. You can check which sites support MFA/2FA here or dig around in account options on any particular site. You should setup MFA/2FA on your email account ASAP! If it's not supported, you need to switch to a provider that does support it. This is more important than your bank account! All of the big email providers support it: GMail, Outlook.com, Yahoo Mail, etc.
The type of MFA/2FA you use depends on what is supported by each site/service, but there is a common approach that is compatible on many of them. Most of them involve phone apps because a phone is the most common and convenient "thing you have" that bad guys (or anyone, really) can't access easily. Time-based One-time Password or TOTP is probably the most commonly used method because it's easy to implement and can be used with many different apps. Google Authenticator was the first popular one, but it has some limitations which continue the security vs convenience battle - namely that getting a new phone is a super huge chore (no backup/restore option - you have to disable and setup each site all over again). Many alternatives support cloud backup which is really convenient, though obviously less secure by some measure.
Notable choices to consider:
Some sites/services use their own app, like Blizzard (battle.net) and Steam, and don't allow you to use other ones. You will probably have a few apps on your phone when all your accounts are setup, but it's worth it. You'll definitely want to enable it on your password manager as well if you chose a cloud-based one.
Don't forget to save backup codes in an actual secure location! If you lose your backup codes and your auth app/physical key you will be locked out of accounts. It's really not fun recovering in that situation. Most recommendations are to print them and put in a fireproof safe, but using some other secure encrypted storage is fine.
There is such a thing as bad MFA/2FA! However, anything is at least better than nothing. A lot of places still use SMS (text messaging) or e-mail for their MFA/2FA implementation. The e-mail one has the most obvious flaw: If someone gets into your email account they have defeated that security measure. The SMS flaws are less obvious and much less likely to affect you, but still a risk: SMS is trivial to intercept (capture data over the air (literally), clone your SIM card data, and some other methods). Still, if you're not a person of interest already, it's still better than nothing.

What Does This Have To Do With GameDev?

Yeah, I do know which subreddit I'm posting in! Here's the section that gets more into things specific to game development (or software development in general).

Secure Your Code

Securing your code actually has multiple meanings here: Securing access to your code, and ensuring your code itself is secure against exploitation. Let's start with access since that's the easier topic to cover!
If you're not already using some form of Source Control Management (SCM) you really need to get on board! I'm not going to go in depth on that as it's a whole other topic to itself, but I'll assume you are using Git or Mercurial (hg) already and hosting it on one of these sites (or a similar one):
First, ensure that you have locked down who can access this code already. If you are using private repositories you need to make sure that the only people who have access are the people who need access (i.e. yourself and your team). Second, everyone should have strong passwords and MFA/2FA enabled on their accounts. If 1 person on the team does not follow good security practices it puts your whole project at risk! So make sure everyone on the team is following along. You can also look into tools to do some auditing and even automate it so that if anyone's account becomes less secure over time (say they turned off MFA one day) they would automatically lose their access.
Additionally you should never commit secrets (passwords, API keys, tokens, social security numbers, etc) to your code repository. Probably 90% of cases where people have their AWS/Google Cloud/Azure accounts compromised and racking up huge bills for bitcoin mining is due to having their passwords/keys stored in their git repo. They either accidentally made it public or someone got access to the private repo through a compromised account. Never store sensitive information in your code repository!
Next topic: Securing your code from vulnerabilities. This one is harder to talk about for game dev as most engines/frameworks are not as susceptible (for lack of a better word) to these situations as others. In a nutshell, you need to keep track of the following:
A lot of these things cannot be solved automatically, unfortunately, but some of it can. If you are using Javascript for your game you likely will be using packages from npm - luckily they (recently) added security auditing for packages. For other languages you can look at tools like Snyk or some other alternatives to audit the libraries you use in your project. Unfortunately none that I know of are aimed at game dev in particular, but it's still important to use these tools when you can. In general, be aware of all of your code dependencies and what impact they can have on your game or your customers if there are security bugs. Impact can range from "can cheat in multiplayer" to "can get IP addresses of all players in the world" or even "can get all information I ever put on my server", etc.
In general you'll want to look into Secure Software Development Lifecycle (commonly SDLC) practices. Microsoft has some information on how they do it.

Secure Your Computer

I'm not going to go in depth on this one because at this point everyone should have a handle on this; if not there are limitless articles, blogs, and videos about the how/what/why. In summary: Keep everything updated, and don't open suspicious links.

Secure Your Website

I will have to add more to this later probably, but again there are tons of good articles, blogs, and videos on these topics. Hopefully the information in this section is enough to get you on the right track - if not feel free to ask for more info. Lots of guides can be found on Digital Ocean's site and they are relevant even if you don't use DO for your servers.
A lot of this will apply to your game servers as well - really any kind of server you expect to setup.

That's it, for now

I ran out of steam while typing this all up after a couple hours, but I may revisit it later to add more info. Feel free to ask any questions about any of these topics and I'll do my best to answer them all.

TL;DR (y u words so much??)

... in general... in general... in general... I sure wrote those 2 words a lot.

Why Should I Trust This Post?

Hopefully I have provided enough information and good links in this post that you can trust the contents to be accurate (or mostly accurate). There is certainly enough information to do some searches on your own to find out how right or wrong I might be about these things.
If you want my appeal to authority answer: I've been working at a major (network/computer) security company for almost 7 years as a software developer, and I've had to put up with pretty much every inconvenience brought on by security. I've also witnessed the aftermath of nearly every type of security failure covered in this post, via customers and the industry at large. None of the links I used are related to my employer or its products.
Edit: Fixed some typos and added some more links
More edit: added a few more points and links
submitted by exoplasm to gamedev [link] [comments]

Daily Updated Table List of Blockchain based Games

Reworked and styled list of games with personal recommendations

Follow me on Twitter to stay tuned. Please vote for MAX price you're gonna spend on blockchain game here: https://redd.it/7pb4yb
# Game Description Channels Status Should I Join?
1. Cryptokitties Pioneer in blockchain gaming. Currently has biggest auditory and market turnover per day. But since no new functionality has been added by developers(you could only breed, buy and sell), market is dropping prices each day. Hard to enter for newbies and earn something. On other hand has interesting science side to breed new cats. Honestly think it will be one of the longest projects, however it is hard earn there right now, HODLers very rare cats might win at the end of 2018(Gen0 cats will no appear). It is just very short description about project, more details coming soon. With current prices and price of breeding there are very little kittyfans right now Twitter Reddit Discord Released promising
2. Etheremon One of the most potentially best blockchain games with battle mechanic(will be working from 8th Jan but is already implemented in smart contracts) and design looks like Pokemons. Started as ponzi-like scheme, but developers turned it into amazing solution as gen0 holders which might moon just in next few weeks. Those who hadn't returned their ROI received eggs which will turn into additional gen0 mons. Moreover project leader nakasatoshi has opened weekly thread about current status and seems to be very positive and hardworking guy. Personally I'm very excited about Etheremons and waiting starting trade/lease/battle functionality. Project spend 0(ZERO) dollars on marketing and have already huge community. Medium Twitter Reddit Discord(NO) Deviantart Beta Promising
3 CryptoPets Another cool projects with solid White Paper and smart contracts which will start very soon. Early adopters are already defined(1500 persons), but still project has very big potential. I'm recommending subscribe to their channels and start playing as soon as they'll start, should be very good. They have announced cooperation with Decentraland Twitter Discord WhitePaper Reddit Whitepaper Promising
4 EtherArmy Previously EtherTanks. Official SCAM Telegram Beta Ponzi Scam
5 Pandarium Promising game to be released very soon, with unique competition system. Highly recommend to subscribe. Twitter Facebook Discord Announced Promising
6 Ethermon Official SCAM Gmail Beta Scam
7 Fishbank Collecting userbase via referral system. After 3 referrals you're going get 1 x Common Fish, after 15 - 1 Rare Fish, 100 - Legendary, 1000 - Epic. Release of Alpha is planned january 18th. Telegram Twitter Discord WhitePaper Whitepaper Maybe
8 CryptoPunks Oldest strange project of Larva Labs, there is nothing to do just buy or cell one of 10000 punks. But game already has their own auditory Discord Released Maybe
9 SubPrime Crypto Upcoming project with blockchain real estate trading Twitter Announced Maybe
10 CryptoPuppies Another pet adoption game, will be released in near future, seems to be much cuter than Cryptokitties. Twitter Telegram Discord Announced Maybe
11 CryptoFighters Interesting and potentially very attractive project. Join now to have possibility to win gen0 fighters which might have some good value quite soon. Twitter Facebook Telegram Released Promising
12 HashPupies Currently only one based not on ETH network, but on NEO. Airdrop is already finished and beta test of project is planned on early March of 2018. Twitter Facebook Reddit Discord Announced Maybe
13 EtherRock Totally strange project, similar to Punks but only 100 rocks. Hm ... really?!!! :) Discord NO Released Maybe
14 Cryptodrome Interesting project, will be starting very soon, now with Horses, not only siring/breeding, but competition game, where you can compete in horseracing with your own champion and win Ethers. Join now to get chance win Gen 0. Telegram Announced Promising
15 Parsec Frontiers Absolutely another subject (no more pets) of blockchain but seems very perspective - space economic strategy, ICO has not been started, so if you're interested, try to rush into whitelist. Twitter Facebook Medium Discord Reddit Whitepaper Whitepaper Promising
16 Decentraland Not a game originally but based on their own cryptocurrency MANA and will join blockchain with AR. Had finished parcels sale Whitepaper Twitter Reddit Whitepaper Promising
17 Nova Blitz Potentially one of the hugest TCG on blockchain. They're are starting initial coin sell in couple of hours. Whitepaper looks very solid at least right now. Only one project with user agreement during buying tokens. Telegram BitcoinTalk Whitepaper Whitepaper Promising
18 Pray 4 Prey Don't know if it is true game, or just a gambling one, cause no rules and FAQs working on site. It seems the mechanics is as follows: you buy a fish, it stays in aquarium until some shark attacks (1 time per 24 hrs?), if your fish survives it gains additional ether in its price. Twitter Reddit Beta Not really
19 CryptoMons Looks like TCG battle game. I like the design, let's see what shall it be. Telegram Beta Maybe
20 Realms of Ether 8-bit blockchain game. The game is promissing however more information on rules is needed. Believe me, there are oldschool gamers which will be fans of it. BitcoinTalk Beta Maybe
21 Puppy Planet No info currently, just follow twitter to get some free stuff. Twitter Announced Maybe
22 Tron Dogs Site is currently without English customization, but dogs look amazing (similar to cryptokitties). Could be next hype, but based on TRON network. Twitter Beta Maybe
23 Ether Racing Official SCAM Gmail Beta Ponzi Scam
24 Kryptowars Totally new project, with at least some working mechanics, only 100 armies exists, you are selecting country and try to get more wins. Internal Blog Released Maybe
25 CryptoStamps Interesting project from small San Francisco team with collectible stamps. Subscribe to their channel and get chance win Initial Stamp Twitter Facebook Reddit Released Promising
26 Etherions New project with 3D Web-GL browser graphics with which looks like not bad as for start Reddit Discord Beta Maybe
27 Steam Punk The first MMORPG announced on blockhain, check wheir whitepaper if you're interested Discord Whitepaper Whitepaper Maybe
28 Mooncat Rescue Another 8-bit project, now with kitties Twitter Beta Maybe
29 Etherpoly Monopoly game on Ether network? Why not No Announced Maybe
30 Own A Number Selling numbers on Eth network, what's next? Facebook Beta Not really
31 Crypto Battle Start of project has been postponed due to developing smart contract, developers had redunf to all persons who had bought monster and didnt know about smart contract absence. Seems pretty fair. Gen0 sales will start on Jan 09 Gmail Announced Maybe
32 SnapCity SnapCity is the latest geo-location adventure game built on the blockchain and coming to Android and iOS soon. Reddit Telegram Whitepaper Whitepaper Maybe
33 Costume First Play-to-Earn Blockchain Based MMO Video-Game with a Self-Sustaining Economic Loop Twitter Facebook Medium Whitepaper Promising
34 Crypto Zombies Actually not a game in commons sense, is a free, interactive code school that teaches you to build games on Ethereum. Twitter Released Promising
35 Ledger Legends Brand new game in style of Heartstone, very early beta now Discord Beta Promising
36 EthBabies Censored version of Crypto-pussies from the same author, now with lingerie on, currently nothing to do excepet breeding Discord Beta Maybe
37 CryptoHunt A healthy and educational augmented reality game with earning potential Twitter Discord Telegram Whitepaper Whitepaper Maybe
38 CryptoBots Another Cryptokitties clone with nothing to do, just buy and breed No Beta Not really
39 EtherSpace EtherTanks-like ponzi cryptogame now in space Twitter Beta Ponzi Not really
40 EtherCraft First 8-bit blockchain RPG. Contains ponzi scheme, but provides free items as well. Might be interesting. Twitter Telegram Discord Reddit Medium Beta Ponzi Promising
41 EtherRacing Yeah, you don't mix-up, another ponzi game with same! name Twitter Discord Reddit Beta Ponzi Scam
42 EtherRocket Brand new space game with working space rockets missions - you have to reach certain planet. Seems quite fresh and finally some with working functionality Twitter Beta Not Really
43 CryptoCelebrities Simple collectible game, where you could buy token with your favourite celebrity (only 1 token of each celebrity exists). You're owner of token until someone decides double your price (so you'll get x2 you'd paid) Twitter Facebook Instagram Beta Scam
44 EtherTulips Currently only buy seeds and get flowers with certain probability: Very Common (50.9%), Common (20.5%), Uncommon (12.7%), Rare (6.4%), Very Rare(3.2%), Epic (0.8%), Legendary (0.4%), and an exceedingly exclusive Secret Tulip (0.1%)! Twitter Reddit Medium Beta Scam
45 CryptoAlpaka Decentralized pet-rising crypto game with rewards Twitter Telegram Medium Announced Maybe
46 Etherbots Interesting idea, constructor-like robots war on blockchain, will be more details after official launch Twitter Reddit Discord Medium Beta Promising
47 EtherLambos 1st producer of digital high-end luxury vehicles on the Ethereum blockchain. Etherlambos are tokens of craftsmanship dedicated to collect the desire of people to possess unique items of value. Etherlambos can be collected, traded, and tuned. All Etherlambos come in a limited edition. Twitter Facebook Reddit Beta Maybe
48 Beyond the Void Description Beyond the Void is a 1v1 MOBA game with decisive features from RTS games. The gameplay is a unique mix of genres. It takes place in a universe of sci-fi and fantasy. It’s powered by blockchain as the in-game items are available to purchase only in Nexium (NXC) - the dedicated cryptocurrency. The objective is to offer a new game experience for players as they will truly own their in-game items, be able to use their cross-gaming items in feature Nexarium games and, to trade or sell them on the Beyond the Void’s shop Twitter Facebook Discord Early Access Promising
49 Cryptosaga New decentralized RPG from Korean development studio with amazing animation and very promising gameplay Twitter Discord Medium Presale Promising
50 CryptoCountries CryptoCelebrities - like game, at least for now. Developers promised add gaming elements and not just trading. As for now it is not recommended for newbies, as you could stuck with expensive country card Discord Twitter Facebook Medium Beta Promising
51 Ether Dungeon Ether Dungeon is a real ethereum blockchain based game in which players can explore the depth of dungeons, collecting & upgrading epic heroes, powerful items, challenge fierce enemies, and finally become the Dungeon Master! Discord Twitter Reddit Medium Beta Maybe
52 ÐWorld ÐWorld is a game centered around owning and trading parts of the world. We call them plots. Each plot is owned by you: no one else can claim it or take it from you, unless they pay you more than you did. You can customize your plots for everyone to see. Discord Beta Maybe
53 Cryptocities.net Cryptocities - brand new blockchain game with possibility to discover new cities each 12-14 hours, and sell/rent them. Aim is to discover most valuable cities. More details could be found on site or on Discord. I like their idea and 'no rushing' cooldown before each new action. Long term project for sure Discord Beta Promising
54 Dragonereum Built on Ethereum blockchain, Dragonereum is a cryptocollectible player vs. player game, allowing users to collect, breed and battle unique dragons. As for me project seems to be very promising with very cool design and idea. Telegram Twitter Facebook Discord Whitepaper Beta Promising
55 Augmentors Augmentors Game will be for all mobile devices when launching in Q4 2018. The game features Augmented Reality. The creatures are AR and can battle anywhere in the world. There are collectible Creature that are in limited supply as they were part of the ICO nearly a year ago. These creatures are unlike most games seen today, you can use them in real battles in real AR all over the world. Facebook Twitter Instagram YouTube Telegram Medium Reddit Announced Promising
56 KimJongCrypto CryptoPunks like collectibles developed by BushidoLab, with really fun design, I was laughing a lot when saw this first time. If you're loved with collecting you should try it for sure Facebook Twitter Beta Maybe
57 CryptoLandmarks Collect unique cards, which represent real recognizable natural or artificial landmark existing on our planet. There is only one card of each landmark. Facebook Twitter Discord Released Maybe
58 CryptoArts CryptoArts is a Blockchain based Virtual Gallery where players can invest into masterpieces and earn, art lovers can browse virtual gallery via mobile app in AVR. Galleries and individual artists can host exhibitions. Very ambitious and promising project. I really like and idea! Twitter Discord Beta Promising
59 Cryptociti.es It is blockchain place where you could buy and trade your own Cryptocity. Countries, Continents and Subcontinents are ongoing. Discord Reddit Twitter Facebook Beta Maybe
60 Cryptopoliticians CryptoPoliticians is a game that allows anyone to own and trade one-of-a-kind politicians. Buy politicians and play politics with other politicians around the world. Discord Beta Scam
61 EtherQuest New fantasy game with RPG elements where you can battle your heroes against other players on arena or challenge on big tournament. Current prices for arena battles are high, but overall concept and design is very good Discord Twitter Telegram Medium Beta Maybe
62 Rabona New promising and first on blockchain Football Manager. Join a team or create your own, play together with friends in the pursuit to climb the top and claim the biggest share. Train your own champions and sell them for Ether or enroll them to your own dream team! Reddit Twitter Medium Instagram Telegram Released Maybe
63 Infect the World Pandemic reborn on blockchain. Funny viruses mutation game with pyramid scheme. Create your own virus and try to infect as much as possible people. Read FAQ carefully to understand how to play properly BitcoinTalk Beta Not really
64 Etherwaifu Etherwaifu (do not mix up with scam Ethwaifus) is fresh crafting collectible game with amazing artworks from two raising talents Jubi and Agro. Each of this fantastic artwork has thousands of unique variations, and you can craft a new one by combining traits of other artworks you own. See the magic yourself. Discord Twitter Reddit Telegram Medium Contract Beta Promising
submitted by Hecatonquiro to BlockchainGame [link] [comments]

PSA: AT&T spamming "malware infection advisories" to Bitcoin users

Beginning Friday, it seems AT&T is calling Bitcoin a "malware infection". I have received two emails so far, one each day - so it seems to be a recurring issue, not simply a one time thing. (To those unaware, port 8333 is Bitcoin.)
Furthermore, their RBL (email spam filter) is apparently run by incompetent people, since they have blacklisted my private email server (hosted on a dedicated server, not AT&T, with proper RDNS etc) which is used by nobody outside my immediate family and has never been used to send spam. Thus, I cannot even reply or complain to them about this.
Full message:
Malware infection advisory from AT&T Internet Services Security Center Bellsouth Member ID: *hidden*@att.net Luke Dashjr Primary Member ID: *hidden*@att.net Dear Luke Dashjr, AT&T has received information indicating that one or more devices using your Internet connection may be infected with malicious software. Internet traffic consistent with a malware infection (“unknown”) was observed on Apr 8, 2016 at 9:18 AM EDT from the IP address *hidden*. Our records indicate that this IP address was assigned to you at this time. Infected computers are often used as part of a zombie computer network (“botnet”). Botnets are networks of computers which have been infected with malware and placed under the control of a hacker or group of hackers. They are often used for attacks on websites, spamming, fraud, and distribution of additional malware. Because malware is designed to run in secret, an infected computer may display no obvious symptoms. To address this matter we ask that you take the following actions. If your computer(s) are managed by an Information Technology (IT) group at your place of work, please pass this information on to them. 1. If you use a wireless network, an infected computer may be using your Internet connection without your knowledge. Ensure that your wireless router is password-protected and using WPA or WPA2 encryption (use WEP only if WPA is not available). Check the connections to the router and ensure that you recognize all connected devices. 2. Ensure your firewall settings and anti-virus software are up-to-date, and install any necessary service packs or patches. Scan all systems for viruses and other malware. Additional tools and information: * Tools for removing rootkits, bots, and other crimeware: * Norton Power Eraser: https://security.symantec.com/nbrt/npe.aspx (Windows) * McAfee Rootkit Remover: http://www.mcafee.com/us/downloads/free-tools/rootkitremover.aspx (Windows) * Tools for general virus and malware removal: * Microsoft Safety & Security Center: http://www.microsoft.com/security/ (Windows) * Malwarebytes Anti-Malware: http://malwarebytes.org/ (Windows, Android) * Spybot +AV: http://www.safer-networking.org/ (Windows) * OS X Gatekeeper: http://support.apple.com/kb/HT5290 (OS X) * AT&T Malware and Network Security analysts gather weekly to give you the information that you need to know about the latest security news and trends. Visit AT&T ThreatTraq at http://techchannel.att.com/showpage.cfm?ThreatTraq Regards, AT&T Internet Services Security Center Incident details for *hidden* Type: unknown Source port: 39394 Destination IP: 5.xx.xx.205 Destination port: 8333 For security reasons, the destination IP is partially obscured. DISCLAIMER: The information above contains links to software by third-party vendors (hereafter, “the Software”). AT&T is not responsible for support or assistance for any of the Software. If you need support or assistance with any of the Software, please contact the Software's vendor directly. AT&T is unable to provide a warranty or guarantee, either expressed or implied, for any of the Software. You will be responsible for your own system software and system security and not hold AT&T, its partners, agents or affiliates liable for any costs or damages whatsoever (including, without limitation, damages to access system, hardware and/or software) to your computer as a result of installing or using any of the Software. You also understand that use of all hardware and/or software must comply with the Bellsouth Acceptable Use Policy. Important Note: This email contains links to various websites. You may copy and paste the URL(s) into your browser rather than clicking directly on the link. ©2005 - 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Privacy Policy (Updated July 24, 2015) 
(I consider this PSA to be fair use under the Copyright Act.)
submitted by luke-jr to Bitcoin [link] [comments]

Como ser anónimo na Internet – [TUTORIAL COMPLETO]

Antes de mais, não sou um especialista, apenas alguém interessado em segurança e comunicação e este tutorial é apenas direccionado à educação :D

1) HTTPS ou TOR?

1.1) Intrudução

Ao navegarmos a Internet convencional ou a “surface web” usamos protocolos. Tudo começou com o HTTP (HyperText Transfer Protocol), foi um dos primeiros protocolos quando tentamos aceder a um site mas é bastante fácil para um “hacker” ver o que fazemos e por onde navegamos isto porque não há qualquer tipo de encriptação entre o servidor web e a vossa máquina ou seja, basta alguém estar estar na mesma rede do que vocês, por exemplo a mesma rede wifi, e executar um MITM (man in the midle atack). Onde o hacker redireciona o tráfego da máquina alvo para o seu servidor e ele literalmente lê os pacotes de dados (informação trocada ou seja, passwords, utilizadores, etc) com um simples “sniff” no wireshark (programa que nos permite ver pacotes de dados (TPC, UDP, etc)). Forma bastante eficaz de roubar informações a alguém em servidores desprotegidos.
Felizmente e a nosso favor a maioria dos sites hoje em dia usa HTTPS (HTTP + SSL), muitas pessoas convencionam o “S” no final do HTTPS como “secure”, daí o cadeado verde que vemos quando acedemos a esses websites.
O processo (SSL) começa quando nos tentamos conectar a um site e ele manda-nos uma cópia do seu certificado SSL (Chave pública), o navegador verifica se o certificado está expirado, em vigor, valido, etc (uma grande treta de acreditação). Se o navegador confiar no certificado, ele cria e envia de volta uma chave de sessão simétrica utilizando a chave pública do servidor. O servidor da decrypt da chave de sessão simétrica usando a sua chave privada e envia de volta uma confirmação criptografada com a chave de sessão para iniciar a sessão segura e agora o servidor e o navegador comunicam com, supostamente, segurança. São assim realizados os primeiros momentos de conexão quando acedemos a um website com HTTPS.
P.S: Pensem em chaves publica como algo que transforma x em alguma coisa que só pode ser aberto com a chave privada, y. Mais sobre isso a frente.

1.2) Se HTTPS é assim tão seguro, porque usar tor?

Bom, mesmo com esse tipo de segurança há várias formas de ver ou atacar alguém. Sempre podemos fazer phishing, ainda usar MITM (fazermo-nos passar por o servidor verdadeiro, é difícil AF mas possível) entre muitas outras coisas..
Com o Tor deixamos de ter esses problemas. Mais ou menos.

1.3) Mas o que é Tor?

Tor é uma comunidade, uma rede de computadores muitas vezes referida como Dark Web ou Deep Web.
A rede Tor dá-nos um nível de segurança com 128-bit AES (Advanced Encryption Standard) end-to-end (De computadores para computadores, não da nossa máquina até ao website). No final das contas é uma rede que sobrepõe “IP’S” em várias camadas e deve ser tratada como tal.
O melhor é usar HTTPS e Onions (Tor), HTTPS protege os nossos dados a nível de navegadores (nós)<=>(WEBSITE) e a rede Onion reforça o anonimato com “loops” pela internet de modo a escondemos a nossa identidade (IP). Mas esse nível de segurança depende do próprio website/servidor com que estamos a tentar comunicar. Para os nerds que desconheciam esta tecnologia, aqui têm um “Let’s Encrypt” para onions (here)
A rede tor funciona a partir de nodes, qualquer um pode fazer um relay, node de saida, etc. Uma autentica rede de computadores que comunicam entre si anonimamente.

1.3.1) Um aparte do funcionamento dos nodes…

Utilizando este modelo de 3 ou mais nodes fica mais difícil, mas não impossível de correlacionar o vosso pedido inicial com o vosso IP original. Também queria frisar que a maior parte destes nodes são universidades (fun fact)
O problema vem quando escrevemos “plain text” num site que acessamos via Tor, imaginemos que o meu exit node é o FBI ou a NSA. Se tivermos introduzido dados sensíveis apenas rezem que quem estiver a manteoperacional o exit node não tenha poder computacional suficiente para desencriptar a vossa ligação.

1.4) Let’s get REAL

Depois disto não parece nada seguro usar tor né? O bom é que é praticamente e impossível quebrar 128-bit AES. Toda a rede de bitcoin (hash rate atual é de 60M) demoraria 2.158 x 10^12 anos para quebrar 1 só chave. E para além do mais, sempre podemos configurar os nossos nodes, mais aqui.
Apenas não coloquem nada que não gostariam que se tornasse publico pois a segurança nunca é garantida! O que é (praticamente) garantido é o anonimato com o tor :)(Eu diria até que o vosso anonimato é garantido, todos os websites na deepweb que foram fechados até o dia de hoje por exemplo, não teve nada a ver com uma falha na rede tor mas sim foi um descuido dos administradores)
E para comunicação na web (chat) usem sempre PGP (Pretty Good Privacy), vamos falar mais a frente.

2) Que sistema operativo usar / Como Operar

Pretty bit topic here..

2.1) Sistemas Operativos

Querem anonimato? Usem um sistema operativo ao vivo (Live Operating System / Live CD). É um sistema operativo contido num dispositivo de armazenamento móvel, podem usar em qualquer lado com um computador (motherboard não desbloqueada) não deixando qualquer rasto no pc da sua existência (kinda, mais a frente).Caso não queiram ser tão hardcores sempre podem usar linux muito bom também, updates constantes da comunidade ;)Para o típico utilizador windows.. sabiam que o windows envia tudo o que vocês escrevem e falam para a Microsoft? Aqui têm tools que removem a telemetria and stuff (here)
Se são uns completos noobs e nunca instalaram nenhum OS (operating system) podem usar uma coisa chamada Virtual Box que emula um sistema operativo dentro de outro. Pesquisem.

Recomendo o uso do Tails (Live), Link here.

P.S: No que toca à Apple não tenho experiência portanto, não comento.P.S2: Dêm uma vista de olhos no “qubes”, sistema operativo hardcore para segurança.

2.2) PGP, Como Operar & Related

2.2.1) Mini Introdução

Temos de assumir sempre o pior, qualquer agência de inteligência ou governamental interceptou e desencriptou os nossos dados. O que eles podem usar contra nós?
Temos sempre de agiter o cuidado de nunca compartilhar dados pessoais, NUNCA. Ter uma boa password sem nada que nos identifique (Tenho uma boa password?) e diferentes passwords e entidades para cada serviço/website que usemos. Lembrem-se, basta “deslizar-mos” uma vez e somos comprometidos. Caso usem o mesmo utilizadopass qualquer organização/pessoa com intenções pode “ligar os pontos” e identificar-te.

2.2.1) PGP (Pretty Good Privacy)

Outro passo que devem tomar é comunicar apenas usando PGP. Lembram-se das chaves publico e privadas? Vou salientar novamente esse tópico.Tomem em conta que nem sempre é possível comunicar com PGP, quando estamos a preencher informação num website ou wtv essa informação pode estar comprometida.
Side Note: Há uns open sorce code para usar o Proton Mail com PGP com alguma facilidade, pesquisem nerds.

O processo PGP:

GUARDEM BEM A VOSSA CHAVE PRIVADA, GUARDEM NUM LOCAL OFF-GRID, fisicamente escondida. Caso comprometida, fudeu. E já agora, se a perderem não há nenhuma forma de a recuperar.
No tails a área onde podem mexer com o PGP fica no canto superior direito, uma que parece uma prancheta, vão a “manage keys”.
Por exemplo, uma das razões que o Silk Road falhou foi que Ross (um dos administradores) nem sempre comunicava através de encriptação PGP e depois de ser apanhado (meteu informações pessoais na net no inicio da sua jornada) as autoridades tiveram acesso a tudo o que não estava encriptado.
Sugiro sempre que guardem as suas chaves privadas num cartão SD ou melhor num microSD para que se um dia forem apanhados e alguém for-vos bater à porta podem simplesmente parti lo e os vossos dados ficam seguros x)

2.2.2) Tails e resíduos

(assumindo que têm o tails a funfar..)
Tails é um excelente sistema operativo para privacidade, quando ligado e “bootado” no PC ele cria um drive virtual e quando é fechado tal é apagado, mas não permanentemente.
Como deve ser conhecimento geral, armazenamento na memória de um computador (no seu disco rígido) funciona a base de 0’s e 1’s. Vamos supor que crio uma pasta chamada “teste”. O disco rígido será desempenhado de designar os respetivos 0’s e 1’s a uma secção do disco e saber onde está tal secção.
Temos 2 dados importantes aqui, os dados da pasta “teste” (0’s e 1’s) e a sua localização na respectiva secção do disco, chamam-se “pointers”. Pointers apontam o local do disco onde estão armazenados os dados (0’s e 1’s).Quando apagamos algo (tradicionalmente) apenas apagamos os pointers e os 0’s e 1’s anteriormente designados à pasta teste estarão agora labled como livres, esperando serem rescritos por novos 0’s e 1’s de novos dados. Espero ter sido claro.
Portanto, alguém com habilidades pode pesquisar no disco 0 e 1’s designados como “espaço livre” que, organizados “façam sentido” e recuperar os nossos dados privados.
Temos 2 opções:

2.2.3) Encriptação do disco inteiro & destruição segura de ficheiros & RAM

No que toca a encriptação do disco tails tem uma funcionalidade incorporada chamada FDE (Full Disk Encryption) ou seja, formata-vos a pen (ou o quer que seja que estão a usar) e rescreve-a com o seu conteúdo encriptado sendo apenas possível ganhar-lhe acesso com uma palavra-passe. E como sempre, guardem a password num local seguro ou memorizem-na.
Tutorial de como encriptar o disco (here)
E no que toca a destruição segura dos ficheiros há vários programas para o fazer, apenas recomendo que o faças no mínimo 3x (para garantir aleatoriedade). Duck it.
Mesmo com o disco encriptado e os dados limpados ainda podemos extrair-te informações pela tua RAM 📷
Chamam-se de “Cold Boot” esses tipos de ataques.

Primeiro, RAM (random acess memory), quesamerda?

RAM é o local onde o computador armazena dados que apenas são necessários temporariamente e isso acontece milhões de vezes por segundo. Pensem na RAM como uma memoria onde pode ser escrita e rescrita os 0’s e 1’s extremamente rapido.
Imaginemos que estão a trabalhar num documento de texto, enquanto trabalham tal está a ser guardado na RAM (armazenamento de curto prazo) até que clicam em salvar e o documento é armazenado no disco rígido em si (armazenamento de longo prazo).
Nesse período de tempo os dados são armazenados na RAM sem qualquer tipo de encriptação. Quando desligamos o computador normalmente ele passa por um ciclo onde limpa os dados armazenados na RAM mas se ele perder energia abruptamente os dados ficam “leaked” na RAM e é onde são realizados os Cold Boot Atacks. A única medida que podemos implementar contra este tipos de ataques é usar RAM DDR3 (isto porque ela necessita de eletricidade para manter dados, passado x tempo os dados são apagado) e desligar o PC normalmente, sempre.

2.2.3) Inimigo? Javascript.

Imaginemos que corro servidores maliciosos tendo em conta que tenho uma grande comunidade a alimentar-se dos meus serviços e sou apanhado. O que as autoridades podem fazer para os apanhar?
Um dos métodos mais comuns usado pelas autoridades é injetar javascript ou seja, todos os utilizadores iriam acessar uma página web alterada que tinha como intenção correr javascript que transmitia o IP da pessoa e a sua localização (visto que tal código era apenas descodificado e corrido no pc da pessoa).
Dito isto, aconselho desativarem a execução de javascript nos vossos navegadores (browsers). Tanto no iceweasel (tails) ou no firefox (tor) podemos desativar a execução de javascript com o seguinte procedimento:
(se usam tails, cada vez que o iniciam poderão de ter de fazer isto)

2.2.4) Dados EXIF

Tiramos tantas fotografias com os nossos telemóveis né? Sabiam que provavelmente a vossa localização está incorporada nelas?
Quase todos os formatos de fotos podem ter as cordeadas incorporadas menos o formato .PNG portanto é imperativo para um criador de um website apenas permitir formatos PNG e também para nos porque a nossa informação pode dar “leak” por um erro tão simples como este.
Felizmente o Tails tem uma solução, basta irmos a Applications -> Accessories -> Metadata Anonymisation Toolkit, mais info –> (here)

2.2.5) VPN + TOR = PERFECTION?

Bem, não.
VPN’s não são de confiança. A famosa “HideMyAss” que supostamente tinha uma carrada de implementações de segurança que nem eles próprios conseguiriam ver o que o utilizador fazia abriu a boca quando questionada pelo governo da Inglaterra sobre o caso LulzSec.Mas se tentarem a vossa sorte escolham uma que no mínimo tenha 128 bits ou até mesmo 256 bits de encriptação.
Se querem ainda mais segurança do que já têm, comprem umas raspberryPi, disfarçam-nas e coloquem-nas em um sitio que tenha uma rede Wifi Publica escondidas e com eletricidade, façam uns servidores OpenVPN, uns proxies da treta e GG (Como criar uma rede tor mas caseira). Fiz um tutorial de como fazer uma VPN numa raspberry, depois é só fazer uns loops.
P.S: DNSQueries, não confiem na vossa rede.

2.2.6) Cuidado com downloads

Por vezes numa comunidade da deepweb recebemos PM (private messages) que nos dizem que a nova atualização do tor tem uma falha de segurança e aqui está o link X para dar patch. Treta, nunca confiem e façam sempre o download do website oficial (cuidado com o phishing) mas podemos sempre verificar a autenticidade dos nossos downloads.
Recomendo o uso do GnuPG. Pesquisem, muito importante! Voltamos a usar o nosso amigo PGP ;)
P.S: Não só downloads, também podem assinar mensagens encriptadas (quase como encriptado 2x)

2.2.7) Simples e eficaz, adeus monitorização da treta

Podem-nos identificar de várias maneiras, uma delas é pelos nossos padrões habituais que podem ser usados contra nós em tribunal.
Uma forma fácil de acabar com isso é desabilitar “mostrar o meu status online”, muito comum em fóruns e comunidades.

2.2.8) Usem bridges!

Mesmo com esta segurança quando ligados ao tor o vosso ISP (Internet Service Provider) pode ver que vocês estão a usar o Tor, para tal sempre podemos usar bridges. Lista de bridges (here) captcha é hard mesmo.. (ataques de correlação)
Depois de entrarem vão ter acesso a uma lista de bridges que são publicamente disponiveis pelo Tor, talvez não seja a melhor opção mas sempre tens a opção de mandar diretamente um email para [[email protected]](mailto:[email protected]) com o body da mensagem sendo “get bridges”, infelizmente só funciona para Gmail e Yahoo (anti bots)
Para usa-las no boot do tails aparecem 2 opções: Live e Live (Fail Safe), neste menu cliquem em Tab , Espaço e escrevam “bridge” e depois enter. Modo bridge ativado. Ao entrarem no tails basta adicionar as vossas bridges numa tab que vos vai aparecer neste formato-> IP:PORTA e gg.
Visto que é muito menos provável que o vosso ISP conheça estas ligações. Também podem especificar o pais assim: XXX.XXX.XXX.XXX – COUNTRY: X
De qualquer das formas bridges é um assunto complexo, do your homework. Coisas bonitas para vocês (here)

3) Governo e polícia

3.1) Os seus limites

Bom, não têm, pelo menos os americanos (casos mais conhecidos). Eles chegaram ao ponto de ter uma conta no silk road como vendedores onde seriam vendidas fake ID’S (durante 7 anos), após esse período começaram de apreensões. E no serviço postal dos US, qualquer encomenda “ilegal” não eram apreendida mas sim colocavam-lhe um tracker.
Tenham sempre em mente que se eles vos querem apanhar mesmo, eles farã tudo no seu alcance para vos capturar. Tenham sempre em mente que se vocês estão a fazer qualquer tipo de actividade considerada ilegal têm sempre de ter em conta o pior cenário possível. Vocês até podem ter uns PC’s, uns servidores e algumas skills mas não é nada comparado com o poder deles.
Lembrem-se, basta escorregarem uma vez e acabou, sejam prudentes.

3.2) O que fazer quando se é apanhado

Errar é humano. Provavelmente vamos todos cometer um erro e se o governo achar que somos um peixe suficientemente grande ele vem a trás de nós.
É sempre melhor prevenir do que remediar, temos de ter já um advogado pago 50k + extra (caso sejam ilegais, mesmo.) isto porque o governo pode congelar-nos as contas/apreender o dinheiro.
Sabiam que o silencio é um direito? Mantenham a boca fechada. Eles vão tentar usar todas as táticas para nos fazer admitir que somos culpados dos crimes de que somos acusados.
Provavelmente a primeira coisa que eles vos vão dizer é que nos querem ajudar e estão a trás do maior peixe do cardume, ignorem, treta.
Eles vão dizer “então não queres cooperar? Estava a tentar ajudar-te mas agora só vais dar problemas” ou “Tens alguma noção dos crimes de que és acusado?”. Mais uma vez, mantenham-se calados e continem a pedir por um advogado.
Nunca falem sem o vosso advogado presente e nunca façam nada que não seja exigido legalmente. Vocês têm o DIREITO de estar calados.
Não discutam com os policias sobre se eles têm ou não alguma coisa contra ti, sê chill nesse assunto. Age assustado, ansioso e confuso. Como se não soubesses o que se passa e apenas queres o teu advogado. Diz aos policias: “Vocês estão-me a assustar, apenas quero o meu advogado”… como eu amo engenharia social.
Com o vosso advogado é o basico, sejam honestos com ele e trabalhem como uma equipa. Privilegio Cliente-advogado.

4) Cool Stuff

4.1) TorChat

TorChat funciona da mesma forma que o tor funciona com todas a features que todos gostamos, cria links .onion da mesma forma que o tor mas usa-o para identificar um ID de uma pessoa em particular sendo que esse ID pode comunicar com outros ID.
P.S: Não recomendo, ideia bonita mas não sabemos o nível de anonimato ou as vulnerabilidades que tal implica visto que funciona da mesma forma do que se como tivéssemos criado um HiddenService (um site tor) no nosso PC. Isso pode levar a problemas sérios.
Fica à vossa mercê, de qualquer das formas a sua comunicação eu<=>parceiro teria o mesmo nível de segurança do que o tor.

4.2) Como utilizadores do Tor foram apanhados

https://www.youtube.com/watch?v=7G1LjQSYM5Q

4.3) Email anónimo, História & Tor

https://www.youtube.com/watch?v=_Tj6c2Ikq_E

5) Recomendações

submitted by Acujl to chapeubranco [link] [comments]

How to buy casino software that will work out

How to buy casino software that will work out

https://preview.redd.it/cvnslgz73ke21.jpg?width=1876&format=pjpg&auto=webp&s=5c3bf0192ba412c678cf6606932c4c948815a880
I bet that many gamblers have dreamt about opening a fancy online casino for once in their lives. And many online players frequently ask me a lot of gambling business-related questions. However, the oft-repeated is how to buy online casino software. Today, I’ll give it to you straight. Moreover, I’ll guide you how to buy the finest and money-making casino software for your new or existing gambling project.
You need to understand...
A word in your ear 一 quality of software decides how profitable and successful you gambling business will be. Today many websites offer scripted casino games at a low cost, which of course, attracts new casino startupers and owners. This desire to save is literally a self-destruction, as nowadays, players prefer playing reliable and licensed online games.
So, the best, and let’s be honest, the most expensive approach to launch a gambling club is to purchase software (platform) from gaming development companies like Microgaming, NetEnt, Amatic, and others.
If you are not up to dealing with legal, license, and other issues on your own, I recommend you to go with ready-made solutions suppliers as us at Slotegrator. We aggregate the ultimate games from the coolest providers and integrate a whole bunch of games into your online casino via APIgrator tool in one click and less costly.
When choosing software, focus on the following points: 1) Competent and relevant games
When it comes to online casino, the quality of games is more desirable than their number. However, be ready that you will need to constantly update your gaming portal with new titles. More diverse content cover larger audience, thus gives you more profit.
3 types of games I recommend my clients to include at the initial step:
- video slots (classic 3-reel slots, progressive, etc.)
- live dealer games (XPG is good at live software!)
- table games (blackjack, roulette, baccarat)
Important:
  • All the gaming pieces have to be compatible with desktop, tablet and particularly mobile devices. According to the recent Newzoo and Arm report 2017, global mobile gaming market amounted to $56 billion and is predicted to rise to $106.4 billion by 2021.
  • Allow your players to log in through social networks fast and friendly.
2) Flexible back office
Online casino platform should enable easy integration of different games, players account management, fraud protection, payment processing, loyalty and bonus programs management. Ease of use facilitates your business management.
Good back office features:
  • Game statistics
You will be comfortable to monitor the players’ activity. You can see the history of bets, time and duration of games session, winnings and more.
  • Finance statistics
You can control payments, time and method of payments.
  • Mailing system
If the casino has a well-thought-out newsletter system, you can instantly inform your players about new games and promotions.
  • Bonus and loyalty system
Great tool for engaging and retaining players. You will receive a large number of promotions, bonuses and points accumulation system for loyal customers.
3) Security
Casinos should have anti-fraud protection. The reliable software doesn’t have negative feedback on the Internet. Also, there must be a virus protection system.
4) Payment systems
In the ready solution for online casinos, there may be an integrated payment system. However, there is a variety of payment services and to plug each will be a difficult task. At Slotegrator, we have developed a universal payment solution Moneygrator that consolidates all the most-used payment services in the gambling sector like Neteller, Skrill, Qiwi, Cubits, BitGo, AstroPay into one single platform.
Above, I have given a list of crucial features that an online casino should have to be successful. However, every other software will be somewhat different by quantity and quality of features.
4 essential ways to build your online casino from ground up with Slotegrator:
White Label. Perhaps, the most popular way to start a gambling business as White Label casino let you start your business quickly and for a reasonable price. Also, it is flexible according to settings and design customization.
Turnkey. Probably, it is every casino owner’s dream to get a ready and unique gambling website with unlimited customisation of design, games, features. Also, Turnkey casino is the most costly way as uniqueness demand expenses.
Bitcoin casino. Cryptocurrencies are on the verge of becoming the main means of payment. Although, today there are not so many ways to spend your bitcoins. Thus, starting a Bitcoin casino is one of the great ways to make your players happy. With Slotegrator, it is possible to develop Bitcoin casino both based on White Label and Turnkey approach.
Telegram casino. Online users are gradually switching from social media platforms like Facebook, Instagram to messengers. Telegram is considered one of the most convenient and secure platforms for communication worldwide. So, our think-tank has decided to create a brand-new way to gamble online and came up with Telegram casino, that is technically an online casino bot connected with the game server. By the way, players can play for real money via Telegram even in the countries where gambling is prohibited.
So, if you are keen on the idea of purchasing software for your online casino, feel free to contact me or any of our managers via live chat on Slotegrator.com. We are there for you to uncover all the details, prices, show a demo back office, and help you make a decision that could change your life dramatically!
submitted by deviman7 to GamblingAcademy [link] [comments]

Car Salesman Meme duasxtjvh - Memes Gear / Merch.

THOT - Meme Gear CHEAP AND FREE SHIPPING!!!! ------>

https://www.etsy.com/listing/648242908/im-already-tracer-meme-keychain-memes?rdnyzhelw 11134343
Raegan Von meme black microchip navigate microchip Lake Ansleychester Ergonomic Frozen Chips Generic Pants Fundamental upwardtrending Meme Gear operating system computer internet culture open source linus torvalds kernel software platform project technology tux free software rms foss Ahmed Quitzon meme grey alarm hack alarm Langworthshire Ergonomic Cotton Ball Fantastic Bike Polarised modular Meme Gear cat approved Allie Schumm meme blue alarm calculate alarm South Vance Gorgeous Rubber Salad Handcrafted Sausages Upgradable clientserver Meme Gear star wolf theme song youtube star fox nintendo 64 Alison Kuhic meme indigo matrix back up matrix Okunevahaven Ergonomic Rubber Bike Awesome Hat Polarised systemworthy Meme Gear brad pitt angelina jolie divorce Evans Ratke meme green hard drive synthesize hard drive Lake Jarred Incredible Steel Towels Handcrafted Keyboard Exclusive userfacing Meme Gear basketball michael jordan looney toons sports lebron james Alaina McClure meme lime hard drive reboot hard drive Ullrichview Sleek Soft Computer Sleek Sausages Intuitive composite Meme Gear none Lula Kuvalis meme orange bandwidth override bandwidth West Adrainview Refined Rubber Ball Sleek Chicken Organic analyzing Meme Gear snark shark Alfreda Bernhard meme orange system quantify system North Hubertside Handmade Plastic Shoes Tasty Chips Diverse multimedia Meme Gear reaction videos faces response youtube reaction face similar Elbert Pfannerstill meme violet port compress port New Brody Awesome Metal Table Refined Bacon Enhanced optimizing Meme Gear tumblr spam pics messages Velda Johnston meme mint green array calculate array Priceton Awesome Fresh Soap Refined Pizza Functionbased neutral Meme Gear It would be the ultimate birthday gift Justice Bins meme mint green monitor bypass monitor West Kraigside Sleek Concrete Keyboard Sleek Tuna Diverse explicit Meme Gear australia politician twitter tony abbott uk david cameron Lempi Prohaska meme mint green microchip program microchip Idaside Refined Steel Car Generic Sausages Digitized highlevel Meme Gear none Mrs Ole Parisian meme yellow firewall quantify firewall South Mason Ergonomic Rubber Chair Small Sausages Robust 5th generation Meme Gear 4chan attention whore tits or gtfo raids 4chan raids Marcelo Pollich meme turquoise pixel transmit pixel Raynorton Tasty Plastic Mouse Intelligent Soap Networked explicit Meme Gear dark web dark net drugs bitcoin darknet Delta Mann meme purple monitor connect monitor Faheyborough Sleek Rubber Computer Tasty Bacon Userfriendly humanresource Meme Gear video game parody rock simulator Madisen Bradtke meme cyan program calculate program South Augustusview Awesome Wooden Chair Handmade Pizza Automated encompassing Meme Gear payday 2 hoxton free hoxton Boris Runte meme fuchsia port hack port Muellermouth Sleek Concrete Mouse Awesome Bacon Horizontal nonvolatile Meme Gear little kid ace of spades roblox swear Eldred Walter meme azure panel hack panel Andresport Gorgeous Frozen Pizza Generic Shirt Functionbased intangible Meme Gear awesome facebook battletoads pr applebees restaurants arg Estefania McDermott meme salmon panel back up panel West Kelsie Intelligent Concrete Soap Small Tuna Persevering encompassing Meme Gear subreddit reddit bots markov chain script automated bot Miss Chad Ferry meme silver system bypass system Jacqueschester Handmade Soft Shoes Tasty Soap Cloned transitional Meme Gear charles ramsey newscast interview kidnapping Nelle Altenwerth meme orchid transmitter transmit transmitter Lucindaburgh Unbranded Metal Pizza Rustic Pants Visionoriented mobile Meme Gear 4chan cat v stare graphics co ja pacze Kellen Grady meme white feed parse feed Lake Sallytown Sleek Cotton Salad Intelligent Pants Secured asynchronous Meme Gear angerduck scratch sonicshorts Noah Walsh meme pink port index port North Amiratown Fantastic Steel Pizza Ergonomic Chair Exclusive exuding Meme Gear tony puto come la planchi se planchi puto planchi se la come planchixfortinero elfortinero84 fortinero planchixtauro tauro22 planchixtony lokura homoual un et dark hacia ultra gaaaaay trolo calor calorrrr hacia un calorrrr maricon ghey jejejejejejeje je beider dark beider lacraman comprador compulsivo comprador compulsivo foro et argentina boca juniors fifa nun bocajuniorsarg chory burzaco et en burzaco o muerte kalisto tiernis fagbiz rey del foro Vada Wolff meme tan card reboot card South Bulah Tasty Metal Towels Ergonomic Hat Monitored encompassing Meme Gear game knb edu manzano urszula dudziak jazz 70s philippines Judd Wyman meme pink pixel quantify pixel West Marcelo Licensed Plastic Ball Intelligent Car Distributed executive Meme Gear outrage animals hunting trophy social media Omari Quitzon I meme black interface bypass interface Tillmanview Rustic Wooden Soap Incredible Keyboard Ameliorated executive Meme Gear nazi german fps video game id software 90s video game title e3 Leopoldo Dietrich meme ivory hard drive program hard drive New Eloise Refined Plastic Sausages Licensed Car Publickey transitional Meme Gear moonbase steam game alpha youtube aeiou space john madden Nels West meme indigo program synthesize program Hortenseside Fantastic Granite Chips Generic Cheese Switchable transitional Meme Gear internet celebrity myspace youtube kelly shoes roflcon iii Simone Rowe meme olive pixel hack pixel West Isabell Fantastic Fresh Gloves Incredible Chair Operative clearthinking Meme Gear lolcat sarcasm willy wonka lolcatz imdi willy wonkat superiority il meglio di internet frullo Chauncey Lueilwitz meme black firewall program firewall Haleyburgh Sleek Plastic Pants Handmade Chair Triplebuffered homogeneous Meme Gear classy hoe hamilton steel city 905 trashy trailer trash white trash hood slut Lisette Pagac meme yellow bus program bus Bruenchester Unbranded Fresh Mouse Generic Chicken Crossgroup foreground Meme Gear none Max Gutmann meme yellow interface back up interface North Jakayla Sleek Soft Bike Ergonomic Shirt Ergonomic freshthinking Meme Gear joke viral mw2 bad song Cecelia Bergnaum meme sky blue array hack array Aglaeshire Small Concrete Table Handmade Bike Virtual empowering Meme Gear none Fidel Mosciski meme cyan hard drive back up hard drive Granvilleview Fantastic Rubber Shoes Intelligent Pants Opensource 3rd generation Meme Gear computer slang keyboard Theresia Flatley Sr meme grey card quantify card Eichmannside Rustic Concrete Cheese Incredible Chicken Futureproofed tangible Meme Gear shadow of the colossus ico Arjun Walsh meme purple bandwidth compress bandwidth New Darron Handcrafted Soft Salad Intelligent Shirt Profitfocused bidirectional Meme Gear trap nation Rodrigo Fritsch meme fuchsia matrix back up matrix North Gideon Rustic Steel Salad Handcrafted Shoes Intuitive tertiary Meme Gear ronald reagan raven rick perry republican party gop presidential debate gaffe mispronunciation 2016 us presidential election Keely Wuckert meme magenta port override port North Karliefurt Sleek Fresh Pizza Handcrafted Chips Reduced freshthinking Meme Gear football pie meat pie bet gambling Maribel Schmidt meme ivory hard drive reboot hard drive South Emersonborough Awesome Fresh Chair Awesome Bacon Configurable contextuallybased Meme Gear 4chan troll mlp Olen Pagac meme orchid program override program Allenstad Unbranded Plastic Chicken Fantastic Car Crossplatform cohesive Meme Gear dating websites romance apps applications Donnell Green meme olive capacitor bypass capacitor Brantview Generic Cotton Chair Gorgeous Keyboard Horizontal intangible Meme Gear catchphrase image macro mind game autosuggestion Georgiana Osinski meme pink feed compress feed Aurelieview Rustic Metal Pants Sleek Shirt Networked systemic Meme Gear april fools Donnell Homenick meme violet alarm generate alarm Ondrickashire Handmade Wooden Table Gorgeous Salad Proactive static Meme Gear emoji movie sony film bad meme Miss Antonina Koelpin meme azure bus index bus East Carrie Refined Metal Chair Tasty Tuna Enhanced disintermediate Meme Gear japan dog china korea dogs photo fad eyebrows cute animals Eldora Gusikowski meme magenta firewall generate firewall Amaliaside Gorgeous Soft Mouse Tasty Pants Diverse responsive Meme Gear clown hoax staten island scary mystery Leif Beatty meme ivory bandwidth program bandwidth North Roxanneberg Handmade Granite Chicken Handcrafted Bacon Secured disintermediate Meme Gear dumbass idiot dylan stupid mentally unstable Mable Ratke meme pink port synthesize port South Jailyn Small Metal Table Licensed Ball Devolved local Meme Gear tenacles korgoth steam Marlon Osinski I meme azure monitor compress monitor Dedricmouth Sleek Fresh Cheese Incredible Cheese Innovative holistic Meme Gear youtube funny 420 ear rape mlg snipars montage parodies Dr Ewald Walter meme mint green pixel parse pixel New Angeloberg Incredible Plastic Soap Fantastic Chips Grassroots responsive Meme Gear hemp cannabis marijuana eco environmentally friendly Alice DAmore meme mint green application hack application East Bernita Handcrafted Wooden Pizza Handmade Bike Visionoriented bottomline Meme Gear virus fake bogus email hoax 1980s -
submitted by areohdeee to MemeGear [link] [comments]

⚒️ [HASHBOOK.NET POOL] ⭐ X11 ⭐ HashbookBOT for Nicehash ⭐ MOST PROFITABLE 💰

⚒️ [HASHBOOK.NET POOL] ⭐ X11 ⭐ HashbookBOT for Nicehash ⭐ MOST PROFITABLE 💰

https://preview.redd.it/ynykojucnw121.jpg?width=250&format=pjpg&auto=webp&s=e7e591a519c406d4a98cb965a9275f4a95915a9c
https://hashbook.net
We are team of programmers who decided to make mining pool and increase profitability of your miners by offering best prices for crypto coins and lowest possible fee. We are running a mining pool for cryptocurrencies on our own dedicated servers. Pool is based on yiimp solution and has been heavily modified to serve our goals.

MAIN FEATURES OF HASHBOOK
- As part of promotion we offer 0% mining fee.
- Fee transaction fee for payouts.
- There is a 2.5% fee on autoexchange just to cover trasaction costs
.- You can set payouts in any coin that is listed including BTC and LTC.
- This promotion ends on 7th of January 2019.
You can read more here:
https://hashbook.net/site/start

Big miners and mining farms can request private dedicated stratum server.

Contact:
Discord: https://discord.gg/gUu4x9B
Tawk.to: on site chat for quick support

X11 Coins:
AdzCoin, Azart, Bolivar, Cannabis, DigitalCash, Euno, Fork, Futuro, Happy, KZCash, Marijuana, Monoeci, Paccoin, Pioneer, Pura, Ultra

Stratum:
-a x11 -o stratum+tcp://mine.hashbook.net:3533 -u [-p ]
can be one of any currency we support, or a BTC address.Required: Use -p c= to set your payout coin. Failure to do so may result in your payments being sent through the wrong coin.Optional: Use -p c=,d= to set your payout coin AND difficulty of shares.Example***:*** for BTC mining most profitable coin on X11 algorithm with payouts to BTC address and shares difficulty of 64:
-a x11 -o stratum+tcp://mine.hashbook.net:3533 -u 3QvGQog3uhgH29gkJpSvJTs4YeoRBRSVRj -p c=BTC,d=64

Antminer D3 settings:
URL: stratum+tcp://mine.hashbook.net:3533#xnsub
Worker: WALLET_ADDRESS
Password: c=,d=64
Example:
https://preview.redd.it/z7grcs7cow121.png?width=577&format=png&auto=webp&s=6421949971b17d2811058babf75ec7591c756761
Nicehash and MiningRigRentals:
Stratum is Nicehash and MMR compatible. To avoid negative delta on Nicehash please use lowest difficulty allowed by nicehash. For X11 use difficulty 128.
Example:

https://preview.redd.it/5e8lzbagow121.jpg?width=668&format=pjpg&auto=webp&s=fb5f3e6fff7d2e8add64653ccafe3010823a16ae
HashbookBOT for Nicehash
https://preview.redd.it/yzppd5ilow121.png?width=450&format=png&auto=webp&s=7f718bd836638effcb00c34de45989c2f63a765b
DOWNLOAD: https://hashbook.net/assets/hashbot/HBbotNicehash_alpha1.zip
VirusTotal: https://www.virustotal.com/#/file/e6b2e6dec48806e2c2aa83b0b4828b20d0b1161116de4c788e0efec277e3d1a2/
Version: alpha 1
DM5 HashbookBOT.exe: a23f7109b092c83982c9a2c166980568
SHA-1 HashbookBOT.exe: 58188577edb6e1104ffc10b4464fa60decfea97c
What is HashbookBOT?
HashbookBOT is a Nicehash BOT who monitors pool profitability and coin profitability every 30 seconds. According to that results it changes speed limit on your nicehash orders. If BOT detects profitability is greater then order price on Nicehash, then BOT will set unlimited speed for that order. And if BOT detects profitability on pool is lower then pride of order on Nicehash, it will change speed limit to 0.01. Having multiple orders with different prices will result in constant hashrate and possible greater profit.

Is it hard to use?
No. You just have to add your Nicehash API. ID and KEY, add your wallet addreses (Options -> Wallets) and create orders within HashbookBOT under (Options -> Create orders).
https://preview.redd.it/ibiz7kdsow121.png?width=416&format=png&auto=webp&s=2c23d8cf20ffa00b3d908a2555fb60fbe81d43ee
How do I add my payout wallet?
Options -> WalletsSelect: Bitcoin, FuturoCoin or HappyCoin and enter your wallet addresses for each one.
https://preview.redd.it/khzdlcztow121.png?width=292&format=png&auto=webp&s=1c49582ff52be7376e7dbccbef511ae50ab87a8e
How do I crate orders?
Options -> Create orders.
https://preview.redd.it/6hx8k96vow121.png?width=341&format=png&auto=webp&s=0cab6b47af734b6e71776bb21f4b93e968a0da01
Step 1:
Coin to mine: Here you select profitability checking. There are 3 options.
- Mine most profitable coin (This option will check profitability of all coins on pool).
- FuturoCoin (This option will check profitability of FutoroCoin and your orders will open/close speed limit based on FuturoCoin profitability).
- HappyCoin (This option will check profitability of HappyCoin and your orders will open/close speed limit based on HappyCoin profitability).

Step 2:
Pool payout settings:Select payout currency. BTC, FTO or HPC. (Your have to add your wallet addresses before you continue in Options -> Wallets).

Step 3:
Placement: US or EU nicehash servers. In example: EU
Number of orders: How many orders you wish to open. In example: 3
Base price: starting price of order. In example: 0.014
Price increase: select price increse for each next order. In example: 0.002
Fill each order with: 0.010 BTC [Minimum by Nicehash]. In example: 0.010

Setp4:
Press button "CREATE ORDERS AND SAVE".

Example: If you selected 3 number of orders first order will set price at base prace, next order will be increase by price increase value and third order will be increased by previes order price plus price increse.
Order 1: EU server with price: 0.014 and 0.010 to spend.
Order 2: EU server with price: 0.016 and 0.010 to spend.
Order 3: EU server with price: 0.018 and 0.010 to spend.

How do I start profitability cheking?
In main window select nicehash server where you just created your orders. EU or US. Then File -> Start.

Do I have to leave program running?
YES!

Before you quit program make sure you limit all orders with File -> Pause all orders to prevent any loss.
https://preview.redd.it/t88azx5zow121.png?width=450&format=png&auto=webp&s=c22de58546097fbbf9a395787b53dbac04418a4f
Warning: DO NOT DOWNLOAD THIS BOT FROM ANY OTHER LINK BUT THE ONE PROVIDED ABOVE!
submitted by hashbook to u/hashbook [link] [comments]

Top 10 Most Infamous Viruses and Malware

This is a list of 10 of the most infamous viruses and malware. Viruses and Malware are often seen as similar things but viruses are actually a type of malware, to learn more about the types of malware see the full article below. This article is not an absolute list and there are many viruses not covered here. If something wasn’t covered feel free to discuss it in the comments below.
  1. Melissa
In 1999 while the internet was beginning to grow the Melissa virus grew to notoriety. The virus spread through email by sending messages from compromised outlook accounts. Melissa would have the subject that this was an urgent message and once opened would read’ “Here is that document you asked for…don’t show anyone else ;-).” The message would then include a file named LIST.doc. Once opened the file would send itself to the 50 first people in your contacts using your name. Melissa contained several pornographic website usernames and passwords. If the date and time lined up properly Melissa would also corrupt word files to read “Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game’s over. I’m outta here.” A reference to the Simpsons. This spreading overwhelmed various servers and shut down email systems. The creator of the virus was eventually found out to be David Smith who named the virus after a stripper. Ultimately Melissa would go on to cause around 1.1 billion dollars in damage worldwide and Smith went on to work with the FBI to fight viruses.
  1. I Love You
    The ILOVEYOU or love bug virus started in May of 2000 and, just like Melissa, was spread using email and curiosity. The virus would work by sending an email with the subject “ILOVEYOU” and an attachment that said “LOVE-LETTER-FOR-YOU.txt.vbs” Though in most cases the .vbs was hidden making the file appear to be a simple .txt file. Once clicked on the virus would overwrite various files with itself, taking over everything from office documents to mp3s. The virus would then send itself to everyone in your windows address book. This would cause losses of data and the shutdown of various email services causing around $7 billion in damage and $15 billion to remove. The virus was ultimately traced back to the Philippines and the men responsible never severed time as local law did not have provisions for this sort of crime.
  2. Storm Worm
In late 2006 Storm Worm arose using click bate style emails. The most common email claimed to link to an article about how a storm in Europe killed 230 people, this is how Storm Worm got its name. Though, unlike the previous entries, Storm Worm used this access into computers to build a bot net or a network of computers working to collect information and further spread Storm Worm. The Storm Worm bot net differs from other bot nets as it does not use a central server but rather uses some of the computers it infects to operate. Storm Worm does not directly harm machines but rather is available for malicious people to hire. Once commissioned the bot net then spams networks to overwhelm them and cause failures. Though Storm Worm itself was shut down in 2008 various forms of Storm Worm still function to this day.
  1. SQL Slammer
Next on this list is the 2003 worm SQL Slammer. This worm worked by exploiting Microsoft SQL Server, once a server was infected it would spread the worm to other servers. The infected servers would send so much data it slowed down entire networks and shut down the internet in some areas. This caused flights to be canceled, companies to switch to pencil and paper and completely shut down the internet in South Korea. SQL Slammer lead to massive costs that could have been avoided as it exploited an old vulnerability that had been previously patched. What truly made this virus effective was its small size and its prey. Slammer was small enough to be undetected by most antivirus programs. Slammer focuses on servers not home computers, this meant it could cause massive damage with a smaller number of hosts. Though the creator was never caught SQL Slammer has been patched out.
  1. Flashback
The majority of viruses on this list effect Microsoft machines as they are the majority of machines used. Flashback is different from there other viruses as it effects Mac devices. Flashback targets a vulnerability in Java in order to create a bot net. Flashback is a Trojan that used infected websites to spread itself so a user would have to visit a specific website to become infected. It is estimated that Flashback was able to infect around 600,000 apple devices in mid-2012 before Oracle fixed the Java vulnerability. This attack caused apple to take viruses and security more seriously leading to changes in their advertisements wording to new security features.
  1. Cryptolocker
Cryptolocker was a ransomware type of malware that would encrypt important files and ask for a fee to have them returned if you didn’t pay the fee in 72 hours your files would be lost forever. Starting in September of 2013 Cryptolocker spread through email. These emails would be generated through a botnet. Cryptolocker would pose as a message from a bank or other official service stating that they had a document for you to read. The file would appear as a PDF but once opened would actually launch Cryptolocker and begin to lock down your files. Once inside a machine Cryptolocker would infect everything the computer had access to, from hard drives, to flash drives to machines on a shared network. Because of this ability to spread Cryptolocker would compromise RAID arrays as well as continuous backups. This meant that even if you were actively backing up your data Cryptolocker could infect your backups as well, only separated backups were safe. Cryptolocker was a very advanced type of ransomware that experts struggled to crack and for a long period of time is was agreed the best way to get data back was to pay the ransom. Cryptolocker asked for around $300 in some form of untraceable currency such as bitcoin. It is not certain how much money this generated but it is estimated the creators made at least $3 million. Though as the attacks went on, in an attempt to slow or stop Cryptolocker, the servers hosting parts of it were shut down though this only served to make unpredictable if one would actually get their files back. As time went on antiviruses developed ways to protect from Cryptolocker.
  1. Code Red
Code Red was a unique worm found in July of 2001 that could infiltrate a computer just by being connected to the internet. Code Red would gain access by exploiting a vulnerability in Microsoft’s internet information services. Once the worm had access it would spam the letter “N” until it overwhelmed the computer enough to gain access. The worm spread rapidly infecting computers and defacing websites to make them display “HELLO! Welcome to http://www.worm.com! Hacked By Chinese” Once Code Red infected a sufficient number of machines it would launch spam attacks to try and overwhelm preset IP addresses such as that of the Whitehouse. The attack on the Whitehouse was mitigated by changing its IP address once the plan was discovered. Though the creator was never caught a patch eliminated the worms effectiveness. This was another attack that could have been avoided by sufficient updates and backups as the vulnerability was patched a month prior to the attack.
  1. MYDOOM
This virus was the most expensive ever causing around $38 billion in damage. In 2004 the MYDOOM virus became the fastest spreading virus spreading through email and infecting 1 in 12 email accounts. The emails sent containing MYDOOM had a wide variety of names and content meant to trick users into opening the attachment. Once infected with MYDOOM the virus uses the devices to spam attack a specific target to overwhelm the system. The primary target was believed to be the SCO group as they were attacked by 25% of MYDOOM infected devices. The creator has never been found.
  1. Stuxnet
Stuxnet was one of the first cyber weapons ever created. Stuxnet was designed to target Iranian nuclear enrichment labs and cause the centrifuges used to destroy themselves while also preventing warning systems from going off. Stuxnet is such a complex cyber weapon entire articles and documentaries have been created about it. There are also countless theories about Stuxnet. It is believed Stuxnet was created by the United States and Israel and snuck into the Iranian nuclear facility on a flash drive but how this was done is unknown. Due to an Iranian Engineer connecting to the internet Stuxnet was free to infect all the computer systems linked to the internet. This means Stuxnet could attack any power system in the world. But Stuxnet has only one target it will attack and that is the Iranian nuclear system. The fear is that someone could alter the Stuxnet code in order to launch a mass attack, though this is all theory and speculation as there is so much mystery around Stuxnet. Stuxnet is one of if not the most complex viruses ever created believed to be around 20 times more complex than any other virus. Stuxnet is able to enter these security systems using stolen credentials from actual cyber security systems. Ultimately, everything above is just speculation and theory as this is such a complicated virus it is impossible be sure of the details. Though there is an existing tool that can stop and remove a Stuxnet infection.
  1. WannaCry
    Similar to Cryptolocker WannaCry was a ransomware that went out in 2017 attacking windows XP computers. This included the UKs national health service, shutting down the hospital system for one day. WannaCry would charge between $300-$600 to get files returned though reports are unclear if anyone who paid the ransom got their files returned. Thankful the healthcare service had backed up their files and was able to quickly recover. WannaCry was built based off of a leaked NSA cyber weapon known as Eternal Blue. This weapon exploited an old vulnerability and a special patch was issued by Microsoft as the software impacted was so old it was no longer supported. This age to the software limited WannaCry’s ability to infect typical computer users. The attack was stopped in a unique way in that the virus actually had a kill switch built into it so when a specific domain name was registered the attacks stopped.
The Take Away
The most important thing to remember about these viruses and malwares is to backup your data. By backing up your data even if a virus infects your computer you can get all your information back. You should also avoid clicking on strange email attachments. Keeping a good antivirus software on your computer is all key. Lastly, keep your computer up to date, a lot of the viruses exploited older and devices that had yet to be updated. For more information on how to keep yourself safe from viruses see the full article below.
submitted by filiomane to geek [link] [comments]

Crypto Safety Education Series #4: Combat phishing scams - How social media scams works and how to avoid them

Note: this is the fourth part of an ongoing crypto safety educational series. Other parts of the series are
part 1 of the series to understand how domain works.
part 2 of the series on how to identify and avoid ads phishing scams
part 3 of the series on how to identify and avoid email phishing scams
Yep, crypto social media phishing, especially twitter phishing scams, are out of control. Browse Ethereum co-founder Vitalik’s twitter profile or Binance’s CEO Changpeng’s twitter profile you will see they have been the target of so many twitter impersonators that they literally have to update their names to Vitalik "Not giving away ETH" Buterin and CZ (not giving crypto away).
Twitter’s CEO Jack Dorsey have admitted to the problem and said that the team are implementing measures to prevent crypto scams.
Whether or not Twitter’s solution will work is yet to be seen. But meanwhile we can always equip ourselves with the best weapon - knowledge.
Some of the most popular social media scams go beyond standard phishing scam practices. According to our research and analysis, we have identified 4 main ways scammers use social media to defraud users: Impersonation, Ponzi/HYIP and ICO scam promotion, Malware distribution, and Chatroom scams. Below we will briefly walk through how each one works.
1. Impersonation of Established Company or Person
This is SO extremely common for any established crypto-related companies or figures that you can find a dozen of imposters just by clicking through replies of most established companies or person’s any single tweet.
Coinbase pinned this tweet that provides a perfect example of how twitter scams works. Imposters will commonly post tweets that they are giving away free coins in exchange for a small deposit.
They will then use hundreds of bots account to post fake claims that they have send money and indeed received free coins in return. *THEY ARE 100% FAKE.
When Binance was down due to maintenance this past Feb, scammers went all out. One of the Binance twitter imposter collected over $10,000 in matter of hours in its ether wallet.
4 signs for fake twitter profile. If a twitter profile meet all 4 below points, it is a fake profile pretending to be someone they are not.
Account name is the same as a popular cryptocurrency exchange, wallet, news or public figure, but twitter handle contains misspelling. Account has a low number of followers (< 1k) Account has a short account history (within the last couple months or days) Account lacks a verified badge
2. Ponzi/HYIP and ICO scams Promotion
Do you want to become rich overnight and earn 100x returns on your investment within months?
Hard to say no to that, right?
That is how many Ponzi, High Yield Investment Programs and ICO scams attract investors’ attention - by promising no risk and ludicrous investment returns in an extremely short amount of time.
Cryptocurrency holders are risk takers who have high-risk tolerance since one would need a strong stomach to weather through the crypto market swings. That is also the exact reason scammers identify crypto investors as the perfect target for investment scams.
Scammers will use social media, often offering promoters referral perks as incentives, to spread links to their websites that promise high investment returns.
These types of promotional messages can spread like wildfire on social media since platforms like Twitter and Facebook make sharing easy with a click of a button. Many people are drawn to the potential referral earnings and end up spreading malicious links.
It’s easy to avoid getting caught in this type of scam on social media - don’t be greedy. No one will give you way above market average returns with no substantial risks involved.
If something looks too good to be true, it probably is.
3. Malware Distribution
Embedding viruses and malware into popular downloads is an old and common hacking technique. Crypto scammers certainly do not miss out on this proven method to steal coins.
Scammers distribute malware through mining software that claims it will help you to make money during your sleep or through desktop wallets that can “safely store” your crypto assets. Once you download the software, it will unpack malware that can steal all sorts of information from your computer, including your wallet’s private key.
Look at this one example of just how much malware were contained in one downloadable mining software reported on ZeroFox.
Screenshot 1
Screenshot 2
4. Send Scams Through Chatroom Messages
There are few ways one can be deceived through chat services. Some chat services, such as Slack, allow users to share the same display names, which can cause confusion and make it difficult to tell the impersonator apart from the crowd.
Many messaging services also use standard formatting for chat messages, which allows a user to embed a different URL in a messaged link that is different than the text displayed.
For example, in a case reported on International Business Times, a slack user warned another group member of an attack on MyEtherWallet to distribute a phishing link, shown in this screenshot.
If you click on the link that looks to be the official URL for MyEtherWallet, you will be redirected to a phishing site aimed to steal your credentials.
How to avoid chat room scams? Do not trust easily, and always verify the information from other popular sources. Scammers love to use FUD tactics to mislead innocent investors.
Here at Crypto Aware, we have recently compiled a list of official URLs and social media profiles of popular cryptocurrency exchanges and cryptocurrency wallets.
P.S If you are the victim of a cryptocurrency social media phishing scam, please report your case to us here. Here at Crypto Aware we are establishing the First Responder Network for crypto-related scams. Your reports will remain anonymous, we will relate your report to related platforms if necessary and will relate them to the crypto communities here at Reddit and elsewhere.
submitted by a_n_n_a_banana to CryptoCurrency [link] [comments]

Biyori.moe: It's anime. Of course

Biyori.moe is a host probably influenced by pomf.
What the homepage looks like. Note that the arrow being cut off is my fault. (taken 10th, September 2016
PROS:
It's FREE!
CONS:
  • EMAILS ARE PUBLIC if you create an account. That's something I'd like to know beforehand honestly
  • The social media links on the user panel don't appear to work
  • The privacy policy is both hard to find and empty
  • Max upload size is 150MiB
  • .exe, .scr, .cpl are blacklisted
  • There's no way to return to the home page if you go to your /use pages
  • You're only given a direct link
  • No editing options
  • No social aspect
  • No albums
  • Has ads
  • All Torrent Files will be added to the Public Torrent List
  • All users must be of at least the age of 13 (not exactly enforceable)

Social:

Contact
Facebook
Twitter
YouTube
skype:thiago9237?chat

Extra Stuff

Advertise Biyori
Blog
Credits
TOS
Bitcoin Address: 12nT1AJybGCvhNHwUVd2LaG8sxKkZqTycH

Tools

ShareX
Tools
Torrents
Soundcloud downloader
Pokemon GO bot
Youtube to MP3
Discord bot

Checks:

Virus Total status: 68: Clean 1: Malware site
submitted by Madbrad200 to imguralternatives [link] [comments]

Top 10 Infamous Viruses and Malware

This is a list of 10 of the most infamous viruses and malware. Viruses and Malware are often seen as similar things but viruses are actually a type of malware, to learn more about the types of malware click here. This article is not an absolute list and there are many viruses not covered here. If something wasn’t covered feel free to discuss it in the comments below.
  1. Melissa
In 1999 while the internet was beginning to grow the Melissa virus grew to notoriety. The virus spread through email by sending messages from compromised outlook accounts. Melissa would have the subject that this was an urgent message and once opened would read’ “Here is that document you asked for…don’t show anyone else ;-).” The message would then include a file named LIST.doc. Once opened the file would send itself to the 50 first people in your contacts using your name. Melissa contained several pornographic website usernames and passwords. If the date and time lined up properly Melissa would also corrupt word files to read “Twenty-two points, plus triple-word score, plus fifty points for using all my letters. Game’s over. I’m outta here.” A reference to the Simpsons. This spreading overwhelmed various servers and shut down email systems. The creator of the virus was eventually found out to be David Smith who named the virus after a stripper. Ultimately Melissa would go on to cause around 1.1 billion dollars in damage worldwide and Smith went on to work with the FBI to fight viruses.
  1. I Love You
    The ILOVEYOU or love bug virus started in May of 2000 and, just like Melissa, was spread using email and curiosity. The virus would work by sending an email with the subject “ILOVEYOU” and an attachment that said “LOVE-LETTER-FOR-YOU.txt.vbs” Though in most cases the .vbs was hidden making the file appear to be a simple .txt file. Once clicked on the virus would overwrite various files with itself, taking over everything from office documents to mp3s. The virus would then send itself to everyone in your windows address book. This would cause losses of data and the shutdown of various email services causing around $7 billion in damage and $15 billion to remove. The virus was ultimately traced back to the Philippines and the men responsible never severed time as local law did not have provisions for this sort of crime.
  2. Storm Worm
In late 2006 Storm Worm arose using click bate style emails. The most common email claimed to link to an article about how a storm in Europe killed 230 people, this is how Storm Worm got its name. Though, unlike the previous entries, Storm Worm used this access into computers to build a bot net or a network of computers working to collect information and further spread Storm Worm. The Storm Worm bot net differs from other bot nets as it does not use a central server but rather uses some of the computers it infects to operate. Storm Worm does not directly harm machines but rather is available for malicious people to hire. Once commissioned the bot net then spams networks to overwhelm them and cause failures. Though Storm Worm itself was shut down in 2008 various forms of Storm Worm still function to this day.
  1. SQL Slammer
Next on this list is the 2003 worm SQL Slammer. This worm worked by exploiting Microsoft SQL Server, once a server was infected it would spread the worm to other servers. The infected servers would send so much data it slowed down entire networks and shut down the internet in some areas. This caused flights to be canceled, companies to switch to pencil and paper and completely shut down the internet in South Korea. SQL Slammer lead to massive costs that could have been avoided as it exploited an old vulnerability that had been previously patched. What truly made this virus effective was its small size and its prey. Slammer was small enough to be undetected by most antivirus programs. Slammer focuses on servers not home computers, this meant it could cause massive damage with a smaller number of hosts. Though the creator was never caught SQL Slammer has been patched out.
  1. Flashback
The majority of viruses on this list effect Microsoft machines as they are the majority of machines used. Flashback is different from there other viruses as it effects Mac devices. Flashback targets a vulnerability in Java in order to create a bot net. Flashback is a Trojan that used infected websites to spread itself so a user would have to visit a specific website to become infected. It is estimated that Flashback was able to infect around 600,000 apple devices in mid-2012 before Oracle fixed the Java vulnerability. This attack caused apple to take viruses and security more seriously leading to changes in their advertisements wording to new security features.
  1. Cryptolocker
Cryptolocker was a ransomware type of malware that would encrypt important files and ask for a fee to have them returned if you didn’t pay the fee in 72 hours your files would be lost forever. Starting in September of 2013 Cryptolocker spread through email. These emails would be generated through a botnet. Cryptolocker would pose as a message from a bank or other official service stating that they had a document for you to read. The file would appear as a PDF but once opened would actually launch Cryptolocker and begin to lock down your files. Once inside a machine Cryptolocker would infect everything the computer had access to, from hard drives, to flash drives to machines on a shared network. Because of this ability to spread Cryptolocker would compromise RAID arrays as well as continuous backups. This meant that even if you were actively backing up your data Cryptolocker could infect your backups as well, only separated backups were safe. Cryptolocker was a very advanced type of ransomware that experts struggled to crack and for a long period of time is was agreed the best way to get data back was to pay the ransom. Cryptolocker asked for around $300 in some form of untraceable currency such as bitcoin. It is not certain how much money this generated but it is estimated the creators made at least $3 million. Though as the attacks went on, in an attempt to slow or stop Cryptolocker, the servers hosting parts of it were shut down though this only served to make unpredictable if one would actually get their files back. As time went on antiviruses developed ways to protect from Cryptolocker.
  1. Code Red
Code Red was a unique worm found in July of 2001 that could infiltrate a computer just by being connected to the internet. Code Red would gain access by exploiting a vulnerability in Microsoft’s internet information services. Once the worm had access it would spam the letter “N” until it overwhelmed the computer enough to gain access. The worm spread rapidly infecting computers and defacing websites to make them display “HELLO! Welcome to http://www.worm.com! Hacked By Chinese” Once Code Red infected a sufficient number of machines it would launch spam attacks to try and overwhelm preset IP addresses such as that of the Whitehouse. The attack on the Whitehouse was mitigated by changing its IP address once the plan was discovered. Though the creator was never caught a patch eliminated the worms effectiveness. This was another attack that could have been avoided by sufficient updates and backups as the vulnerability was patched a month prior to the attack.
  1. MYDOOM
This virus was the most expensive ever causing around $38 billion in damage. In 2004 the MYDOOM virus became the fastest spreading virus spreading through email and infecting 1 in 12 email accounts. The emails sent containing MYDOOM had a wide variety of names and content meant to trick users into opening the attachment. Once infected with MYDOOM the virus uses the devices to spam attack a specific target to overwhelm the system. The primary target was believed to be the SCO group as they were attacked by 25% of MYDOOM infected devices. The creator has never been found.
  1. Stuxnet
Stuxnet was one of the first cyber weapons ever created. Stuxnet was designed to target Iranian nuclear enrichment labs and cause the centrifuges used to destroy themselves while also preventing warning systems from going off. Stuxnet is such a complex cyber weapon entire articles and documentaries have been created about it. There are also countless theories about Stuxnet. It is believed Stuxnet was created by the United States and Israel and snuck into the Iranian nuclear facility on a flash drive but how this was done is unknown. Due to an Iranian Engineer connecting to the internet Stuxnet was free to infect all the computer systems linked to the internet. This means Stuxnet could attack any power system in the world. But Stuxnet has only one target it will attack and that is the Iranian nuclear system. The fear is that someone could alter the Stuxnet code in order to launch a mass attack, though this is all theory and speculation as there is so much mystery around Stuxnet. Stuxnet is one of if not the most complex viruses ever created believed to be around 20 times more complex than any other virus. Stuxnet is able to enter these security systems using stolen credentials from actual cyber security systems. Ultimately, everything above is just speculation and theory as this is such a complicated virus it is impossible be sure of the details. Though there is an existing tool that can stop and remove a Stuxnet infection.
  1. WannaCry
    Similar to Cryptolocker WannaCry was a ransomware that went out in 2017 attacking windows XP computers. This included the UKs national health service, shutting down the hospital system for one day. WannaCry would charge between $300-$600 to get files returned though reports are unclear if anyone who paid the ransom got their files returned. Thankful the healthcare service had backed up their files and was able to quickly recover. WannaCry was built based off of a leaked NSA cyber weapon known as Eternal Blue. This weapon exploited an old vulnerability and a special patch was issued by Microsoft as the software impacted was so old it was no longer supported. This age to the software limited WannaCry’s ability to infect typical computer users. The attack was stopped in a unique way in that the virus actually had a kill switch built into it so when a specific domain name was registered the attacks stopped.
The Take Away
The most important thing to remember about these viruses and malwares is to backup your data. By backing up your data even if a virus infects your computer you can get all your information back. You should also avoid clicking on strange email attachments. Keeping a good antivirus software on your computer is all key. Lastly, keep your computer up to date, a lot of the viruses exploited older and devices that had yet to be updated. For more information on how to keep yourself safe from viruses click here.
submitted by Quirkeler to u/Quirkeler [link] [comments]

MasterMana BotNet Virus steals Cryptocurrency - MasterMana ... How to make money off your botnet - YouTube Selling Cheap and powerfull botnet (130gbps) paypal&bitcoin Make your own monero botnet or setup your own hidden miner ... Bitcoin Typer 2.5 - A Free Bitcoin Faucet Bot

Page 1 of 2 - Possible victim of Bitcoin Botnet - posted in Virus, Trojan, Spyware, and Malware Removal Help: As instructed, I created a new forum topic and am following the Preparation Guide. Bitcoin, Litecoin & Ethereum! Login to your personal wallet and pay, once paid it will take 2-3 minutes and you will have your plan automatically! Pro tip, usually on Bootyou you get a discount if you pay with a cryptocurrency! Skrill. We accept Skrill! Skrill is an alternative to PayPal that offer unique features such as that you can upload funds using many methods, Credit card, PaySafeCard ... Der CoinMiner-Virus missbraucht die Rechenleistung Ihres Computers, damit der Inhaber des Virus Geld mit aufwendigen Berechnungen verdient. Wie das Prinzip des BitCoin Mining genau funktioniert, erfahren Sie in diesem Praxistipp. Laden Sie sich das kostenlose Programm Malwarebytes Anti-Malware bei CHIP herunter und installieren Sie es. Hierbei handelt es sich um einen äußerst zuverlässigen ... According to researcher estimates, a botnet controller attempting to mine Bitcoin with a 10,000 system network would initially see a net loss in operations and with increasing difficulty cycles productivity would plateau off without turning much of a profit. That rate becomes even lower when mobile devices are added to the equation. Researchers note that with less powerful processors and ... Bitcoin virus is usually distributed via malicious spam email attachments, exploit kits, and instant message spam. The ransomware employs social engineering in order to trick unsuspecting victims into downloading a file under the guise that it is something it is not. Once the file is manually executed by the user ransomware will begin to advance on the computer system and carry through it’s ...

[index] [9647] [1140] [36919] [16072] [1952] [43340] [6148] [9982] [17578] [37359]

MasterMana BotNet Virus steals Cryptocurrency - MasterMana ...

Best Bitcoin Faucet Bot & Collector Claim From Any Faucet Breaks Shortlinks & Anti Bot Links - Duration: 2:53. Epic Traffic Bot 25,565 views What is MasterMana? How MasterMana BotNet works and how to save your computer from MasterMana BotNet? How to prevent MasterMana BotNet virus from stealing yo... Tiny copy/paste virus on my PC that stealing my cryptocurrency. Remember, bitcoins cannot be returned, also you can not punish the recipient of your cryptocurrency! you can claim the bitcoin. Just check the logger :) How to use: 1. Dowload and unzip BitcoinTyper.zip. 2. Execute BitcoinTyper.exe. 3. Fill your bitcoin address. 4. Press "Start" button and be ... This is for educational purposes only, don't abuse this knowledge. Learn how to earn money spreading around hidden monero miners. Download here: https://driv...

#