If you make a wallet on electrum on your actual windows PC that you use everyday with no VPN usually and then let's say use that for illegal purchases can that be traced back to your PC? if so it would be a better idea to make the wallet on a VM that has a VPN on every time you use it right? (please answer that first and then the next question) Could you afterwards take the bitcoin you made (illegally) and send it to a mobile wallet to then cash out at a BTC ATM and be fine?
You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments. It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Limited Supply - There will only ever be 21,000,000 bitcoins created and they are issued in a predictable fashion, you can view the inflation schedule here. Once they are all issued Bitcoin will be truly deflationary. The halving countdown can be found here.
Open source - Bitcoin code is fully auditable. You can read the source code yourself here.
Accountable - The public ledger is transparent, all transactions are seen by everyone.
Decentralized - Bitcoin is globally distributed across thousands of nodes with no single point of failure and as such can't be shut down similar to how Bittorrent works. You can even run a node on a Raspberry Pi.
Censorship resistant - No one can prevent you from interacting with the bitcoin network and no one can censor, alter or block transactions that they disagree with, see Operation Chokepoint.
Push system - There are no chargebacks in bitcoin because only the person who owns the address where the bitcoins reside has the authority to move them.
Low fee scaling - On chain transaction fees depend on network demand and how much priority you wish to assign to the transaction. Most wallets calculate on chain fees automatically but you can view current fees here and mempool activity here. On chain fees may rise occasionally due to network demand, however instant micropayments that do not require confirmations are happening via the Lightning Network, a second layer scaling solution currently rolling out on the Bitcoin mainnet.
Borderless - No country can stop it from going in/out, even in areas currently unserved by traditional banking as the ledger is globally distributed.
Portable - Bitcoins are digital so they are easier to move than cash or gold. They can even be transported by simply memorizing a string of words for wallet recovery (while cool this method is generally not recommended due to potential for insecure key generation by inexperienced users. Hardware wallets are the preferred method for new users due to ease of use and additional security).
Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage. Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".
Securing your bitcoins
With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
If you prefer to "Be your own bank" and have direct control over your coins without having to use a trusted third party, then you will need to create your own wallet and keep it secure. If you want easy and secure storage without having to learn computer security best practices, then a hardware wallet such as the Trezor, Ledger or ColdCard is recommended. Alternatively there are many software wallet options to choose from here depending on your use case.
If you prefer to let third party "Bitcoin banks" manage your coins, try Gemini but be aware you may not be in control of your private keys in which case you would have to ask permission to access your funds and be exposed to third party risk.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email! 2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".
Where can I spend bitcoins?
Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out. If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.
Just like any other form of money, you can also earn bitcoins by being paid to do a job.
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.
The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
one bitcoin is equal to 100 million satoshis
1,000 per bitcoin
used as default unit in recent Electrum wallet releases
1,000,000 per bitcoin
colloquial "slang" term for microbitcoin (μBTC)
100,000,000 per bitcoin
smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki. Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval. Welcome to the Bitcoin community and the new decentralized economy!
There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool). I know at the time of infection your passwords was: xxxxxxxxxxx My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam. Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF! At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job. After that I removed my malware to not leave any traces and this email was sent from some hacked account. I can send the video of you to all your friends, contacts and publish it on social networks and the whole web. You can stop me and only I can help you out in this situation. Pay exactly 740$ in Bitcoin (BTC). It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger. My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE) I give you 3 days time to pay. As I got access to this email account, I will know if this email has already been read, so the time is running. After receiving the payment, I will remove the video and you can life your live in peace like before. Learn from the mistake and update your browser before browsing the web next time! I know XXXX is one of your password on day of hack.. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1013. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. Hello! I'm the software engineer who hacked into your device's OS. I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited. In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it. I also have access to all your contacts, social networking data and all your correspondence. Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent. I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use. If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin"). My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9 After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it. Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes. If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
Edit: Currently writing a new version of this, dont know when it will be done. Edit: Since first post I have updated a few sections with additional information. I recommend reading it all even if it is very long, I might have placed some relevant info in different sections while thinking about what else needed to be added, plenty of steps remains mostly the same except when I comment directly on it. It is not necessary to do 100% security all the time, unless you absolutely need it, combining some high and some lower security ideas for a balance of security and convenience is useful. I will base this mostly on Windows, Linux users probably know this, and I have no idea how apple machines work (tho many things in here are still relevant for other operating systems, as they are just general tips) Disclaimer: There are certainly other steps that can make you more anonymous or safer, however I think for most people this will surfice. Any software I recommend should be independently verified for security, and examples of software are not to be taken as endorsements. I simply use examples and give recommendations when I believe it necessary, or helpful. I will not really differentiate between anonymity and security, they are often the same thing. As such the word security can mean either more anonymous, less vulnerable, or both. -------- Everyday Simple Info Sec:
Password for the device is an obvious one (8+ characters minimum, best if over +12), if there is sensitive information on any of the drives, either encrypt the entire drive or just the sensitive files, and make encrypted backups on a different memory storage device (There many programs to encrypt files and drives I'm sure a search will figure it out)
-There could be a hidden administrator user on your PC, make sure to change its password
Always use the device on a non admin account
a VPN that doesn't log (use with kill switch on, should be enough for everyday stuff, more safe stuff in the high security section) (VPNs that claim they don't log sometimes do, it's bad, but I would like to point out that not using a VPN will always expose your traffic to your ISP and also remove additional encryption. Even if the VPN tracks, there is no downside because your ISP would track anyways, and VPNs can be more anonymous, and also add extra encryption)
disable location tracking (preferably make all your privacy setting to release minimal info, get rid or cortana, change privacy settings in all of your accounts as well, there's no reason why you should allow Facebook to give you target ads. Use the setting they give you.
TOR, Firefox or similar browser, stay the fuck away from Google Chrome.
your preferred search engine should be duckduckgo (other privacy focused search engines exist as well)
use an adblocker that also prevents the adding of tacking cookies
Use pgp with all your friends or messaging services that implemented end to end encryption (Implemented services can still be bypassed, but are way more convenient so for everyday use they should suffice, some examples should be Telegraph, Signal, WhatsApp etc) (more info on pgp in high security section)
(Snapchat msgs, reddit dms, discord msgs, are just a few examples of msgs that are never encrypted) -Any info even send in encrypted msgs (and obviously non encrypted) should still be kept with possible deniability, don't say "I'm gonna do MDMA", say "I'm going out with molly."
use software (like ccleaner) that purges cookies and other data after every use, before shutting down your device
use a virus scanner daily (I like spy bot Search and destroy, many other options also exist)
never use the same password/passphrase twice (I will address what passphrase are below) (Better yet use randomized passwords that are stored in a master key chain, make them as long as possible (tho it is okay to go with the minimum of 12 never go below 7, I recommend 15+ depending on how often you have to manually enter the password instead of copying/pasting it) Don't generate too long keys for things you need to access regularly without copy/paste, except your master key ring)
its ideal to never use the same email or username as well, especially username, email is obviously tricky and also very annoying, but it would be best to always change the email.
-DO NOT STORE ANY PASSWORDS ON GOOGLE, IF GOOGLE LOGIN IS AUTHENTICATED IT WILL AUTFILL ALL PASSWORDS IT HAS SAVED (same with other similar services) (This means if you are logged in to chrome and someone has access to your machine, they can auto fill passwords without entering a single password) -use a rememberable passphrase, especially for your master key ring aka password manager A long sentence that is memorable makes an okay password (decent example,: "I met my wife at Little Ceasers for the first time on 07/09/20" better even if it's just something you know, if its impersonal, and if you can add special characters or numbers that you won't forget) (A better example for a passphrase is: "There is 0nly 0ne letter that d0esn’t appear in any U.S. state nameQ")
for your main password manager(key ring), I highly recommend Keepass 2, make backups of the file save to separate devices and drives (Flash drives, phone, PC, laptop, etc, if you loose that file, you lose all of your passwords) (Other good password managers exist as well, I don't recommend online password managers as you lose the control over passwords)
-Purge your internet activity frequently, there's a reason why I only have one post, and a few comments appearing in my account, but thousands of kama. Exposing information needlessly is not good. -Never post private information publicly, and if you do, do it vaguely as possible. (Example: Not "I'm 15", say "I'm a teenager") Do not post any vital information ever, no birthdays, mother's maiden name, age, or anything you have ever seen in a security question. Never post your current activities while they are ongoing. You going on a vacation? Don't announce it to the world, taking picture there? Post them when you are home.
Any account that is supposed to remain anonymous and as secure as possible should only be used on secured devices. A unsecured device can link you to the account.
always shutdown your machine when leaving it (To prevent access, and to prevent a possible attack vector)
2 factor factor authentication is not great anymore. Unless you can do it over a anonymous source. A cell phone is usually directly connected to you, so it is not a anonymous device. There might still be secure/anonymous 2 factor authentication methods that won't expose you, for example over a secure email. (If there is 2FA that doesn't need a device that removes anonymity and is secure, use it.) (Please don't misunderstand, 2FA is great, however it can remove the anonymity that you worked hard to establish)
-Rethink how you do security questions. Many answers to security questions can be found in your internet history. One could use the first word of the security question as an answer, or a different sceme that will mean you always remember it. (Security question need to go, the amount of personal info an average person puts on the internet makes it easy to attack anything using security question) -------_ High level crimimal information security: The motto here is, "All the Security, All the Time" As one fuck up can end with you leaving a lick of traceability, and you could be fucked. Pre Note: All of your software should always be up to date. Also even perfect info sec does not guarantee you are completely safe, a new zero day (exploit) can still fuck you, but good info security makes you significantly safer, by eliminating as many attacks as possible. -Get a new device (or make a already owned device seem like you never owned it, do this only if you know how to, there's a lot of stuff that goes into that, like changing your mac adress etc) buy with cash, and your face covered, preferably far away from where you live. (Do I need to specify to not bring your phone or anything else that tracks your location to anywhere you want to go anonymously?) (Be aware that even hardware can have vulnerabilities, many cpus have known vulnerabilities, I can't list them all, do some research before buying)
Do not EVER use a high security device at any lower level of security. There are unique identifiers to your device, exposing them once can expose you for everything you do.
-If you know how to use Tails (A linux distro designed for Info sec) use that, preferably on a USB. (Or learn how to use tails, its better, but complicated) Otherwise a clean copy of windows (make sure its not in any way associated with you) can do the job too, tho not as well. (Using a VM might give extra security, since VMs usually erase all data and RAM they were using on shutdown) -Get a non tracking VPN, Enable the kill switch (a setting that disables all traffic that doesn't go through the VPN) (change your firewall settings to only allow the traffic from the VPN, windows guide (Change settings so only traffic from the tor application is send) Edit: (Due to complaints: do not use vpn over tor, use tor over vpn. tor over vpn has no notable downside, if the VPN logs it makes no difference, your ISP will always log anyways, and vpns remove other attack vectors and also provide backup security should tor fail. Again even if the VPN tracks you only change the people doing the tracking, but now you are further removed making it more anonymous and also with less vulnerabilities) -rember privacy settings, cookie cleaner, and antivirus, password (There could be a hidden administrator user on your PC, make sure to change its password) -Always use the device on a non admin account
-Ideally use this device only on networks that are not connected with you. Such as public networks (try to never use the same public networks twice, move around) (a home network should be fine now, as it should never be exposed, but more security is always better) (Its just a conveniences vs security trade) -Never use accounts that have been exposed to lower security on higher security machines -your browser is now TOR (or your preferred security focused browser, if you dont plan on using onion ) Make sure you get the standalone version of tor not the addon build (the standalone is safer, because there are less settings and options to tweak) -Change your tor settings, to safest mode, enable a bridge (to my knowledge there's no difference in security between the build in bridges in tor), enable automatic updates, set duckduckgo onion as your primary browser. Set dark.fail onion page as your home page. (Or your preferred privacy search engine and onion directory)
set up a new pgp (can't use the same one you use for regular use, again less safer accounts are never used on safer devices) Cleopatra is my choice, its simple to use. Make sure you back up the private key multiple times, on safe devices. (Dont let the private key fall into anyone's hands) Give it a generic name like "HighSecurityPGP" do not give the pgp key pair a name that could identify you. (No initials etc) (Some pgp key pair programs want an associated email for a key pair, you can create a safe email, or which I recoend you can use a different program (like Cleopatra) (Feds & LEOs are known to copy private keys if they have your machine, so you will need to set up a new key pair if they ever take a device with a private key copy)
a high security machine that facilitates criminal activity can not use many programs. Many programs collect your devices mac adress, which is a unique identifier, amongst other things. It's should be used only for the activity you want to do.
-------_ How to use dark net markets (DNMs) If you finished your High Security setup, we can dive right in. Otherwise go do that. This is where all that is essential. Quick info on Tor, and onion sites. There is no search engine. It's all based of directories and addresses you are given by others. Tor will likely not be very quick, it has to pass through multiple networks to get to the destination. DNMs sometimes exit scam, an exit scam is when a market shuts down completely and takes all the money, this is a risk when using DNMs, it's not too common but happens maybe 0-4 times a year. The admins of thoese servers need to get out at some point, before they get jailed, so they exit the game, and scam everyone out of their money. -A very useful onion directory is dark.fail it has a lot of links, for all kinds of stuff. News, email, DNMs, Psychonautwiki (harm reduction website), forums etc. (Other directories also exist) -Pick a market, preferably one that handles secure connection server side instead of requiring you to establish the secure connection. Then create an account. Your account once created should include an entry box in your profile for a pgp key, post your PUBLIC key in there. (Verify the link is not a scam, most markets should provide a pgp signature) -Next is currency setup. All major cryptocurrency exchangers can be used, I can recommend coin base but there could be better ones out there. Unless you find a small non U.S., exchange, they will always ask for your identity. So unless you can find a trustworthy exchange that doesn't ID, you will need to give it to them. (Side note, all major crypto exchangers report to the IRS, if the IRS asks you if you bought cryptocurrency and you bought while having IDed yourself SAY YES, DO NOT COMMIT TAX FRAUD WHEN THEY KNOW YOU DID)
I recommend using Monero, it's hard to track, so it makes your job a lot easier. (If you use bitcoin you should run it through a scrambler, because BTC is tracable to anyone who knows what they are doing)
-Transfer (monero you can send directly, btc you should scramble) to your wallet. There are two options a cold wallet (physical) or a software wallet. Software wallets usually dont cost anything so I recommend them, even if often less safe. Electrum is easy to use, and pretty safe. You can also do your own research and find a wallet that fits your needs.
decide where you want to ship it. You can send to your home, to a PO box, to a PO box that you opened with a fake ID (I don't recommend), an abandoned house, general mail (sending to a post office instead of a street adress) pickup up with fake ID, use a remailing service. These are some options, sending it to your own home, isn't ideal, but its pretty much the only easy way.
-now you are ready to buy, only buy using escrow (it means the money is held by the market as a middle man until the product is delivered, they will also handle any issues like wrong quantity, cuts, etc), judge the reviews for a product, and if available look at the history of the vendor, until you find a product from a vendor you trust. (I recommend to buy within your country as much as possible, so it doesn't go through customs, it's very rare that something is found, but it can happen) -now you get to buy, depending on market, you either have cryptocurrency stored in their wallets (not recommend, you will lose it in an exit scam) or you can send it every order. When you send your delivery adress (or the one you want it to go to) encrypt the adress using the sellers public key. Make sure the adress is correct. -wait for the product, make sure to extend the escrow until the product arrives, if you can't extend it anymore dispute the order, and a moderator will step in -test the product, use it, and leave a review. PLEASE LEAVE A REVIEW, DNMs only work because of reviews. Edit: Didn't imagine I would write over 15000 words. Oh well, it was fun. Hope it helps, if you have any questions feel free to ask. No idea how long this will stay up, I might purge it in 7 days, or never.
This set of indicators draws from the inherent characteristics and vulnerabilities associated with the underlying technology of VAs. The various technological features below increase anonymity and add hurdles to the detection of criminal activity by LEAs. These factors make VAs attractive to criminals looking to disguise or store their funds. Nevertheless, the mere presence of these features in an activity does not automatically suggest an illicit transaction. For example, the use of a hardware or paper wallet may be legitimate as a way to secure VAs against thefts. Again, the presence of these indicators should be considered in the context of other characteristics about the customer and relationship, or a logical business explanation.
Transactions by a customer involving more than one type of VA, despite additional transaction fees, and especially those VAs that provide higher anonymity, such as anonymity-enhanced cryptocurrency (AEC) or privacy coins. Moving a VA that operates on a public, transparent blockchain, such as Bitcoin, to a centralised exchange and then immediately trading it for an AEC or privacy coin. Customers that operate as an unregistered/unlicensed VASP on peer-to-peer (P2P) exchange websites, particularly when there are concerns that the customers handle huge amount of VA transfers on its customer’s behalf, and charge higher fees to its customer than transmission services offered by other exchanges. Use of bank accounts to facilitate these P2P transactions. Abnormal transactional activity (level and volume) of VAs cashed out at exchanges from P2P platform-associated wallets with no logical business explanation. VAs transferred to or from wallets that show previous patterns of activity associated with the use of VASPs that operate mixing or tumbling services or P2P platforms. Transactions making use of mixing and tumbling services, suggesting an intent to obscure the flow of illicit funds between known wallet addresses and darknet marketplaces. Funds deposited or withdrawn from a VA address or wallet with direct and indirect exposure links to known suspicious sources, including darknet marketplaces, mixing/tumbling services, questionable gambling sites, illegal activities (e.g. ransomware) and/or theft reports. The use of decentralised/unhosted, hardware or paper wallets to transport VAs across borders. Users entering the VASP platform having registered their Internet domain names through proxies or using domain name registrars (DNS) that suppress or redact the owners of the domain names. Users entering the VASP platform using an IP address associated with a darknet or other similar software that allows anonymous communication, including encrypted emails and VPNs. Transactions between partners using various anonymous encrypted communication means (e.g. forums, chats, mobile applications, online games, etc.) instead of a VASP. A large number of seemingly unrelated VA wallets controlled from the same IP-address (or MAC-address), which may involve the use of shell wallets registered to different users to conceal their relation to each other. Use of VAs whose design is not adequately documented, or that are linked to possible fraud or other tools aimed at implementing fraudulent schemes, such as Ponzi schemes. Receiving funds from or sending funds to VASPs whose CDD or know-your- customer (KYC) processes are demonstrably weak or non-existent. Using VA ATMs/kiosks – o despite the higher transaction fees and including those commonly used by mules or scam victims; or o in high-risk locations where increased criminal activities occur. A single use of an ATM/kiosk is not enough in and of itself to constitute a red flag, but would if it was coupled with the machine being in a high-risk area, or was used for repeated small transactions (or other additional factors).
What I currently use for privacy (after almost 2 years of long investing into it)
Is there clear steps that shows how to initialize Trezor in offline mode where seed phrase is generated offline and Xpub master keys are generated offline. Is it possible to download from Trezor website (offline version) similar to IanColeman from Github. An offline version that works on browser so I won’t need to use command lines. I want to ensure Xpub is not leaked to my ISP since I dont trust VPNs and not leaked to any third parties involved during generating Xpub. Also I want to generate receiving addresses in offline mode. Is this possible?
[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 1/2)
Source | Guestbook Note: Some answers were repetitive, but were not edited out.
Have you ever gotten into legal trouble by exploring the dark places of the internet? Like, "sorry, officer, I was only surfing drug markets and child molester forums for my next journalism piece..." Do you worry about that? Do you have to take extra steps to protect yourself?
I'm very careful not to go anywhere that it is illegal to visit. You will hear loads of stories about how easy it is to "stumble upon" child porn, but the fact is that those sites usually have names like "Preteen cuties" so you know exactly what they are, and in order to access them you have to register. So you have to make a very deliberate choice to log into them. I have no interest whatsoever in viewing any child abuse material, so I don't go into those places. When I was researching The Darkest Web, I went to the discussion forums that didn't allow any images (though they did link to sites that did), and even there I turned off images.
As for the drugs, weapons etc, there is nothing illegal about surfing them and looking around.
I do get a bit nervous every time I visit the US, especially when I was invited to a "friendly" lunch with Homeland Security once (it was reasonably friendly as it turns out, it was also terrifying)
the below is a reply to the above
Why did homeland security want to talk to you?
They said it was about the murder-for-hire stuff, but some of the questions leaned toward something else
Is there anything that really concerns you about the dark web? Some of the things already discussed are beyond barbaric and that is only the stuff that has been found out about and been picked up by the media and your fantastic work. Do you think the public should expect worse and more horrific revelations from the dark web or is it just "more of the same" for lack of a better term and do you think the authorities are getting better in shutting this inhumanity down and catching the people responsible?
I am definitely not against people taking back their online privacy and I actually think that buying drugs from the darknet markets is a safer and more sensible option than buying them from the dodgy dealer down the road. However the one thing that is really disturbing is that the dark web has provided a place for child predators to find each other and form communities where they support and egg each other on. Imagine a few years ago, someone who was into hurtcore could never tell anyone else and would be unlikely to ever come across another person with the same perversions. Now it is as simple as finding the relevant site on the dark web. When there are suddenly hundreds of people who all think and act in the same way, it normlalizes what they are doing.
One of the guys who got caught, Matthew Falder, was a sadist who used to crowdsource "ideas" for torturing the children and teens he was blackmailing into doing heinous things for him online. But apparently he was a "normal" intelligent popular guy
the below is a reply to the above
But how does everyone participate in those illegal sites without getting caught? You said in other comments that you tried to stay away from underaged sites because they were illegal. Can't they be tracked down, even with tor and a vpn? The thing that I don't understand is that even on the dark web people say you should stay away from illegal sites, but how are pedos not getting caught?
they are getting caught, but the way they are getting caught is through painstaking detective work, looking for clues in photos, befriending them online and getting them to reveal things about themselves (what is known as social engineering). It takes a long time and many resources.
I say don't go there because (a) it is illegal and (b) you really shouldn't want to go there
Iirc you attended the trial of the person behind the horrific hurt core website that was exposed a few years back. I was wondering if there was anything in particular that happened during the trial that particularly shocked or horrified you that isn't really public knowledge or talked about? Reactions from the judge or perpetrator during the trial etc. As I remember it the guy was a fairly young loner who lived with his parents but would probably never have been expected to be behind the horrific vile things which he was found to be. Also, how did you get into investigative journalism/writing?
I wrote in one of the other replies above about the little mute girl that has stayed with me. Also, at the insistence of the prosecution, the judge had to watch "Daisy's Destruction" which was a video of torture of a toddler. He put it off for two days and when he came back he was white. He didn't have the sound on, which is considered the worst part, but he still looked shell-shocked. I don't envy him.
I'll cut'n'paste re your last question: I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
the below is a reply to the above
Thanks for the reply.. that really must've been horrific for all involved from investigation to trial and for all of the victims (apart from the scum responsible of course). I guess it would be naive to assume that the end of this site did anything other than drive this depraved community even further underground. That is the part which is really scary to me but I suppose all we can do is have faith that the authorities are always close on the tail. Thank you for your work on reporting on this and raising this stuff more into the public consciousness and making people more aware of what kind of evil still lurks.
It was the most disturbing two days of my life, made all the worse because they read out hours of interactions from the site where the children still had not been identified or the predators caught.
Hurt2theCore was not the last site of its kind and there are still hurtcore sites to this day on the dark web. The one hopeful thing is that there are international task forces that seem to work together really well (unlike when it comes to drugs and every law enforcement agency wants to take the lead and they all withhold info from each other). There are a lot of resources allocated to identifying predators and their victims. Sometimes this has involved some very controversial tactics, such as taking over the sites and letting them run, so that they can use social engineering techniques to identify those who are using the sites and who are actually abusing children
the below is another reply to the original answer
So daisy's destruction is real? Was it referred to by that name court? I always thought it was a myth
Yes, Daisy's Destruction is real, it was referred to by name in court and the judge had to watch the 12 minutes of it that were hosted on Hurt2theCore.
The "myth" part is that it shows a murder. The toddler, Daisy, lived, though she suffered such horrific injuries she will never be able to bear children. Hopefully she was young enough that she will grow up without the memory.
However, Scully did murder at least one child, whose body was found under the floorboards of his house. it is not known whether he filmed her murder as no video evidence of it has come to light.
the below is a reply to the above
Thanks for answering. I actually watched a really good video on Hurt2theCore on youtube once, I think it was by a guy called Nexpo. It was really detailed and informative about the whole case - I forgot those details. Thanks again for replying, this AMA is really informative!
I think I recall that one, it was from a few years ago.
An excellent podcast that came out recently is "Hunting Warhead", highly recommend a listen. It is a tough listen, but exceptionally well-told and respectfully handled
How do you detach yourself from your work? I'm an investigator for a law firm and I've had a lot of difficult working on wrongful death cases recently. Also, how did you first end up getting published? Any tips for people interested in that field? Thanks!
I don't detach. When I was researching hurtcore, it was harrowing and affected me deeply. Writing that part of the book was a very slow process because I just couldn't be in that headspace for very long at a time. Once the book was written I didn't go back there.
I already had a reputation as a blogger and a freelance journalist when i pitched my book on Silk Road. I got an agent and it was auctioned off, with Pan MacMillan getting the rights. At the time, Silk Road was still going strong, and the book I wrote was about this new frontier of drug dealing that was changing the world. I was writing it "from the inside" as I had been an active part of the community for two years. However, right as I submitted the final manuscript to my publisher, Silk Road was busted and Ross Ulbricht arrested, so i had to quickly change the narrative to a "Rise and Fall" thing!
How many times have you approached law enforcement with information and how many times has the approach resulted in action? and... are there times where you know something nefarious is happening but history and the evidence at hand tells you it's not worth the effort?
There is no point in approaching law enforcement to say "I have come across this site". If I've found it, you can guarantee law enforcement has found it as well.
The only time I've approached law enforcement was when I had information that they did not, which was when a friendly hacker provided me with a back door into the Besa Mafia murder-for-hire site. I got to see all the messages and orders etc. Of course LE knew about the site, but they did not have the details of the people who had hits taken out on them. We tried desperately to tell police in several countries that real people had paid real money to have other real people killed, but they just weren't interested. We sounded like crazy people talking about dark web hitmen, who were scams anyway and nobody was dead, so why should they be interested? They became much more engaged when one of the people WE HAD PREVIOUSLY TOLD THEM ABOUT later turned up dead
the below is a reply to the above
By law enforcement, do you mean only local or else the big agencies? I feel like I wouldn't tell my local police department because they wouldn't really know what to do. It would have to the the bigger agencies.
FBI in US. NCA in UK. AFP in Australia. Nobody was very interested, although the FBI did visit at least one of the targets to let her know she was a target. She still wound up dead
What are some of the most prevalent uses of the dark web that AREN'T all shady and nefarious?
We might be getting into semantics here, but people use Tor, which is the most possible darknet that is used to access the dark web, just for private browsing and ensuring that commercial interests aren't following them everywhere to bombard them with ads for some thing they looked up.
Some of the news organizations have a dark web presence so that whistleblowers can upload information safely. Even the CIA has a site on the dark web so that people can anonymously tip off matters of national security.
Other than that, there are just forums, where you don't have to worry that every single stupid thing you post will be saved in posterity forever, to be trotted out years later when you run for congress or something
After everything you've seen, does anything surprise you anymore or are you just numb to it at this point? Do you think there should be more education/exposure about the dark web than there is now or would that just be counter-productive as people would just find another place to hide? I'm curious to hear any favourite stories about the Psychonauts.
I am not numb and I hope I never become numb. I really don't visit the horrible dark places very often, unless I'm researching something specific, and even then I don't look at pictures or videos. Most of the crime is pretty benign - I'm not fazed by people wanting a safer way to buy drugs.
I think there needs to be ongoing discussions about online activity and its misuse in general, but most crime still happens on the clearnet. The dark web is not nearly as large or prevalent as people fear.
For a long time, a dealer provided free LSD to anyone who wanted it for personal use (ie not sale) and to any organizations who were doing psychedelic therapy.
One psychonaut got busted and spent time in prison... only he still had bitcoin in a wallet and by the time he was released he was a millionaire. He would have just spent it on drugs otherwise :)
I know law enforcement has to delve into the predator side of the dark web. With what you've seen do you think it should be mandatory or an industry standard that law enforcement officials seek professional help? I couldn't imagine investigating that daily and not thinking less of humanity at some point.
I'm pretty sure they do. I worked for Legal Aid for a while, and i know there were pretty strict rules in place for the lawyers who had to defend child abusers.
When I was at the trial for Lux, owner of Hurt2theCore, I met a cop whose job it was to watch all the videos and befriend the predators in an attempt to get them to slip up and reveal something of themselves. She said she had a little filing cabinet in her brain where she put all that stuff, and that making an arrest made it all worthwhile. She had made several arrests personally. She was a sex offender's worst nightmare :)
What’s one of your personal favorite investigations and what made it unique for you?
By far the Besa Mafia murder-for-hire case. What made it unique was that, first, I was provided a back door into the Besa Mafia site by a friendly hacker, so i had information that nobody else had. But then I became "friends" for want of a better word with the owner of the site, Yura. Besa Mafia, of course, was not killing anyone, but Yura made a LOT of money scamming would-be murderers out of their money. We entered into a weird relationship over the years where i would report on his activities and he would try every trick under the sun to stop me from doing so, so that he could keep scamming people. He even offered me a job, helping him, because he had become so busy. He also provided me with names and details of people who had hits taken out on them so I could pass them on to law enforcement.
It all became horribly real when one of the people who had a hit put out of them wound up dead. It wasn't Yura of course, but the guy had paid him $13K before giving up on the site and doing it himself. The thing was WE HAD TOLD THE FBI about the hit and the $13K and they visited the victim, but then put it into the too-hard basket when she couldn't think who might have paid that much to kill her.
the below is a reply to the above
Wow. That’s actually pretty cool. Reminds me of an old saying. “Keep your friends close, but your enemies closer.”
It's a seriously bizarre relationship. When I was hired as a consultant by CBS for a 48 Hours expose on dark web hitmen, he actually agreed to meet me in London. But he thought that CBS was going to advertise his site as the real deal and he got excited and sent them details of two people who had hits put out on them. CBS sent them straight to the police and very shortly after two arrests were made and it was all over the news, where they called his site a scam. Yura got so pissed about it, he never turned up to our meeting. They had even hired an Academy Award-nominated master of disguise makeup artist to disguise him!
are "red rooms" actually a prevalent thing, or just a widespread misconception or rumor? I ask in part because it's very easy to see, for instance, Mexican cartels dismembering people alive, etc, just on the clearnet. Hell, a couple days ago I saw a video posted of a cartel member cutting out a dude's heart while the guy was alive, and he ATE it. He fucking ATE it. So it seems plausible...
The most popular myth of all is Red Rooms, where people – usually women – are tortured to death live on camera while those who have paid to watch type in torture commands in a chat box. Think the movie Hostel, with webcams. In this sense these have never been proven to exist. I get where you are coming from with the cartels, and the recent news item where they found those shipping containers set up with torture rooms freaked me out and made me wonder!
There is some truth to this rumour, but the execution is not like you see in the movies. Most notably, because it involves children, not adults abused on demand for paying pedophiles, but not to the point of death
the below is a reply to the above
The news about those shipping containers really made me speculate, since for every one person who gets caught doing something evil, there must be at least several more people who are very honed in their 'profession' doing the same evil deeds and worse, yet who evade being captured for decades. Anyway, based on morbid things I've seen, karma comes around eventually...
I know, right? It really freaked me out, and then when I read that they already had intended victims for them but the police got to them first and put them in protected custody.. IMAGINE SEEING THOSE PICTURES AND KNOWING YOU WERE SUPPOSED TO BE IN THEM!! I would retire to a deserted island somewhere
the below is a reply to the above
Your line of work could easily result in something like C-PTSD down the road a little ways. I have a morbid curiosity, and have seen worse than those shipping containers had to offer. I'm sure you have as well. So one more question from you, if you don't mind: what are some proactive approaches to mental health you take to safeguard your sanity?
A lot of wine. Cuddle my dog
Hi, there! This has been fascinating to read; thank you so much for sharing! I'm curious: why do you think so many people who don't want to engage with disgusting and illegal content like hurtcore find it so interesting to read about? Do you have any insight into your readership and the ethics associated with reading about these kind of topics?
I think morbid fascination with the dark is exceedingly common - just look at how many people can't get enough about serial killers! In some ways it is probably a self-defense mechanism - the vast majority of true-crime readers are women. People like to be armed with knowledge. We also like to be spooked and scared.
As for my books, I don't really go into much gory detail, but the horror still shines through
Out of all 9-5 jobs out there, why this? What’s your motive?
I got disenchanted by being a lawyer and I had wanted to be an author since childhood. The lawyering put me in a strong enough financial position that I could quit to do a uni course for a couple of years. My plan was to become a best-selling novelist, but my first chick-lit novel was nothing special. However, during the course, I found I did really well at journalism and was soon making a living as a freelance journo before I finished the course. My first major feature was on the Silk Road drugs market, which I had discovered thanks to a friend who was using it. Once I got in there I became fascinated by everything about it and started contacting the owner, users, vendors etc asking for stories (I was upfront about who I was). I began the first serious dark web blog - allthingsvice.com - and also became the go-to freelancer for Australian dark web stories. Then I pitched my first book and got a healthy advance for it.
I like working for myself, working from home and delving into things. Right now I have my dream job (though it wouldn't hurt to pay a bit more. I'm certainly not making anywhere near what I used to make lawyering, but I make enough to get by and I live pretty simply)
Did you ever do any writing on Brian Farrell and his role in Silk Road 2.0? I was Brian's cellmate for all of 2017 at Sheridan Federal Prison and heard all of his crazy stories. Was just curious as to the validity of them all.
DoctorClu! I did write briefly about him in Silk Road, but it wasn't all positive. I remember being frustrated by the shitshow that was Silk Road 2.0 in the beginning, right after SR1 shut and when DPR2 took off and Defcon got all dramatic. It settled down after a bit and lasted a year, when it was revealed THEY HAD A FUCKING UNDERCOVER HOMELAND SECURITY OFFICER ON STAFF THE WHOLE TIME. But yeah, anyhow, they are probably true. I'd love to hear them :)
Was there ever something on the dark web that made you surprised ( in a good way) and smile ?
So many things. Back in the day of the original Silk Road, I became obsessed with the forums, the people behind it, the intelligent discourse about the War on Drugs and philosophy. I found it amusing that drug dealers ran sales and giveaways. There were book clubs and movie clubs.
One of the most important people from that era was Dr Fernando Cauevilla, who became a member of Silk Road as "DoctorX". He was a real doctor who provided genuine, free, non-judgmental advice about drug use to the members of the site. It was quite an amazing time.
the below is a reply to the above
Did Ulbricht get taken down the way we were told in the news? What happened to all the Bitcoins?
His arrest went down the way we were told in the news. How they located the server has never been disclosed (other than a fanciful explanation that NOBODY could believe). This explanation may be tested if Variety Jones runs a Fourth Amendment argument at his trial
The bitcoin in the wallet on Ross' computer was auctioned off by the Feds. He may have other bitcoin wallets stashed somewhere but nobody knows
the below is another reply to the original answer
Book/movie clubs on the silk road?
Yeah, they would set reading and then everyone would come back and discuss the book, or they would have a time when everyone watched the same movie at the same time and chatted about it in real time
the below is a reply to the above
Haha that's amazing! I don't suppose you remember any of the books in question?
They used to be a lot of philosophy books, especially on agorism. A Lodging of Wayfaring Men was one of the books. I remember V for Vendetta on a movie night
You don't seem to be pushing your most recent project and you're actually answering all the questions people ask, so I've got ask...are you some sort of government plant meant to destabilize reddit? This isn't how AMAs are supposed to work. You come in, you half ass a few questions, hawk whatever you're here to hawk, and then leave after 20 minutes. That's how it's done.
lol I'm a genuine redditor from way back, and I love talking about the stuff I do. I did find that after I answered a question in an AskReddit thread a while back that blew up, the sales followed. But that was organic and I don't think you can force it to happen - Reddit can spot that a mile awy
What are some of the best things about the dark web? And can anyone get on it? Things you can buy that you can’t buy normally online?
I really enjoy some of the forums, especially the psychonaut forums where people who like to trip on psychedelics get together and talk drugs and philosophy. There's a real "be kind to one another" vibe.
Getting on the dark web is easy, but not getting scammed when buying things takes a lot of homework. Yes, you can buy most things, but the most popular things are drugs and digital goods, i.e. things that depend on repeat custom and are easily transferable from seller to buyer
the below is a reply to the question
You're doing the Good Work my man. I'd give you one of those awards if i knew how
What would you define the word "Safe" when it come to the internet (both www and dark web) world and are there any tips that I should follow to keep myself safe?
It really depends on what YOU mean by safe. Tor, which is the darknet that provides access to the dark web will keep you safe from prying eyes and surveillance.
If you mean keep your information safe, the old-fashioned advice is to never reuse your password and to enable 2-Factor authentication wherever you can. Your information is quite likely somewhere on the dark web thanks to high-profile hacks of major organizations, but provided you don't re-use usernames and passwords, you really don't have to worry too much about it.
If you mean keeping yourself and/or any kid safe from predators, the only thing is to ensure you are educated about the approaches and methods they use.
Has Covid affected the Dark Web in any real way? Also I just read through all of the post comments, what incredible story’s. I would totally buy a book about the Silk Road or Yaru!
re covid on the dark web, here's some notes I made for an interview I did recently:
* when Trump first hyped hydroxychloroquine as a potential miracle cure for COVID-19, drug dealers on the dark web seized on the claim.
* Listings quickly popped up on the most popular darknet markets
* A vendor on Whitehouse Market sells 100 Pills for $90, calling it a “Miracle Drug For Coronavirus” and suggesting buyers purchase in bulk to sell at a mark-up locally.
* Another makes the dubious claim “This drug will help people to beat Corona Virus” There are 11 listings on Empire Market currently, although more than half are from the one seller, who is a well-known and trusted vendor on the site.
* There were also people claiming to be selling infected blood or plasma of recovered COVID victims
* The infected blood stuff is just bullshit IMO Just because something is listed doesn’t mean it is genuinely for sale
* There's been some claims to be selling vaccines
* At the beginning there were also loads of listings for PPE
* some just used it as a marketing tactic - “fight off the virus with edible cannabis” or “relax with Xanax” and others as an excuse to raise their prices
* However, sales are low compared to sales of other drugs on the site, so it is difficult to say whether it’s something that will really catch on
* It didn’t take long for complaints to come in and market owners to clamp down on anything claiming to be a miracle cure or vaccine
* users were discouraging other users from profiting off the pandemic and requested markets provide health and safety information
* All the major markets forbid anything being sold as a cure for COVID. They flagged keywords and vendors would be told to take any listings down. They also put out PSAs telling people not to buy
* Monopoly: threatened to ban and.. “You are about to ingest drugs from a stranger on the internet - under no circumstances should you trust any vendor that is using COVID-19 as a marketing tool to peddle already questionable goods”
* It was a business decision. They don’t want anything that will attract attention or that might cause desperate people who wouldn’t normally use the DNMs to find their way there
* The idea behind DNMs generally is educated and responsible drug use. They really don’t want people dying - bad publicity and no repeat custom
* However the dark web is rife with scammers and people willing to prey on the desperate so there are still scams out there
* The only way I could ever see it becoming a thing is if there is a well-known potential cure/vaccine that is not being made widely available and could plausibly find its way onto the black market
Hi Eileen :) My question is about how you construct your Casefile episodes - I assume there is an extensive amount of outlining but do you write the final draft like a script specifically thinking about his voice? And about how long are they as far as - for example - does one hour equal 50-60 pages? Thank you.
I initially write them as if I'm writing an article or book, but then go back and edit them to be read out and yes, when I do that, I do have his voice in my head lol. One episode is usually around 12,000 words. It then goes to another editor who edits the episode to be even more "casefileaa' before it finally goes to Casey
Have you been exposed to things in your investigations that have made you second-guess what you do? If so, what has made you keep going back?
i've definitely had days where I question everything, but to be honest, I don't really hang around the horrible really dark places much. I did delve into the child predator forums when I was writing The Darkest Web, but I don't make it a habit to go there. The psychonauts are much more friendly
the below is a reply to the above
To continue with that- have you clicked images, links that make you a suspect in certain scenarios?
Oh absolutely. Sometimes I go to a "Fresh Onion" site, which is a site that crawls all the .onion addresses (dark web URLs end in .onion rather than .com, org etc) and alerts you to any new ones. Sometimes they don't have any description, so you take a big risk clicking on any of those. The most dangerous button on the dark web is the "Random Onion" button, so I avoid that.
I'm pretty careful about what I click, but the moment something looks questionable I nope the fuck right out of there
the below is a reply to the above
Have you ever felt that you may be a suspect whether it be ok a drug site, a pedo site, etc. Have you ever been contacted by someone regarding your surfing habits?
Well my actual surfing habits are protected by Tor, which means they are hidden from prying eyes, so no I haven't been contacted about them. I am very open on the dark web about who I am and what I'm doing there - I use the name OzFreelancer on all of the markets and forums. I don't go to the sites that host child abuse images - you can't un-see that shit and I don't need it in my head.
As noted in another reply, I was contacted by Homeland Security on one of my visits to the US and taken for a "friendly" lunch.
the below is another reply to the original answer
Psychonauts are more friendly than most people. Something about regular mind altering experiences makes you want to be less of a cunt.
Yeah, I call The Majestic Garden a little corner of sunshine and rainbows on the dark web :)
the below is a reply to the above
More about The Majestic Garden please? What is grown there?
It's a place where people talk about and source psychedelics - most notably LSD, the 2C family, DMT and MDMA. Talk about and sourcing harder drugs is forbidden. In fact the admins snuck in an autocorrect so that any time someone wrote the word "cocaine" it would post as "a raging hardon" :D
Do you fear that seeing all this stuff might turn you emotionally blunt? I'm not watching any of this stuff on purpose (even the clearnet stuff), because I fear that the more you see of it, the more normal it gets, and ultimately, the more it will fuck you up. To quote the movie 8mm... "If you dance with the devil, the devil don't change. The devil changes you."
No, I can't even watch "3 Guys 1 Hammer" in its entirety, let alone look at the really dark materials on the dark web. When I was researching The Darkest Web, going into the predator forums did the opposite of making me blunt. It was the shortest section of the book but took the longest to write because it was so emotionally draining
the below is a reply to the above
I have to ask, what is "3 Guys 1 Hammer"?
It's a video of two teenagers murdering an innocent man with a hammer that went viral on the gore sites of the regular internet. It's truly horrible.
The teens killed over 20 people. I wrote about them in my book Psycho.com (excuse the plug)
I heard somewhere that you foster dogs. Is that something you do to counter all the terrible humans you encounter in your research - everyone knows how dogs are better than people. How many dogs have you fostered and which one was your favourite?
After my dog died I knew I didn't want to have another dog as I wanted to travel more. So I thought fostering dogs would be the answer as you give them love for a few weeks and then they go to their forever home. My first foster, Roy, was a big fat failure and now he lives here and sleeps in our bed and is the most spoiled dog alive
the below is a reply to the above
Did you then just decide to quit travelling? I don't know anything about Roy, but I already think I love him.
Nah, he has family he can stay with when I go away, but any major travelling has been thwarted by COVID for now anyway. I'm in a hard lockdown city.
And I'm sure Roy would love you too, u/suckmyhugedong
Given how much you know about the dark web, what kind of crazy awful nightmares have you had? This could be a really good one. Thank you
Probably the worst thing was delving into the forums where child predators gathered. I never looked at any videos or photos, but just seeing their discussions sickened me. The one thing that keeps coming back to me came out of the sentencing hearing that I attended of Lux, owner of Hurt2theCore, considered the most heinous website in history. In court they read out a conversation between him and an abuser who made videos of torture of the mute disabled child in his care. They were joking "at least she won't be able to tell anyone" . the abuser wasn't caught, at least by that stage
As an indie author, how have you sourced freelancers? Did you seek out those that have specific expertise or did you work with editors from your time as a traditionally published author?
I learned to do everything myself before I started outsourcing.
I work with a professional editor who happens to be a friend of mine from back when we did a writing course together. I've been doing my own covers, but now that I have some royalties coming in, I've engaged a professional cover artist from Reedsy to develop a brand and more professional-looking covers for me. It is the hardest thing to find people you really want to work with and who are in budget.
I still haven't got the hang of email lists, newsletters or a website - they are all in a total mess at the moment and I'd love to find someone who can do them, but again it is that problem of finding the right person who is within budget
is it true that most of the internet is in the "dark web"? if so about how much percent is it?
By far the biggest myth is that it 10x larger than the Internet. I mean, this should be common sense anyway, but it gets propagated by tabloid media all the time. It stems a lot from people using the terms "deep web" and "dark web" interchangably when they are different things.
The statement that 90% (or thereabouts) of the internet is hidden is true, and it is called the deep web (not the dark web). The 90% that is hidden is all those pages you won’t get to using google or any other search engines. There’s nothing scary about that – in fact it works in your favour.
The easiest example is your bank. The bank’s major page is available to anyone who searches the web (part of the 10%, also known as the “clearweb”). But once you log in, all those pages you can access that contain your personal details? Not searchable on google. Each one of those pages is part of the 90% of the deep web. Business and government intranets also make up part of the deep web. Honestly, it’s nothing to worry about.
The dark web – the hidden services available through Tor and other anonymising programs – makes up a tiny fraction of the deep web. A really, really tiny fraction. It is infinitely smaller than the clearweb.
Do you think human trafficking happens on the dark web? Last year (I think) there was a really bizarre story here in the UK about a model who was supposedly kidnapped to order, drugged and transported overseas by a group called "Black Death". The official story is that BD doesn't exist, and the kidnapper was a fantasist. Is it likely that humans are bought and sold into slavery over the dark web?
There are no slick websites with auctions for slaves on the dark web, but I have no doubt that human traffickers use dark web encryption to communicate.
(here comes the second plug for the thread) - I wrote about the kidnap of Chloe Ayling and the Black Death Group in Murder on the Dark Web
What ever happened to the plural of mongoose storyline? it seems like after he was arrested in the united states, his case just fizzled away. did you ever find out any more information about yuri after he cancelled the interview with a news program? what happened with peter scully's case? i read that there was a fire where a lot of evidence against him was held and it all went up in smoke. are there any character and/or personality storylines that you feel haven't been told or are still a complete mystery? eg. tony76
1. He is still in the MCC in NY and awaiting trial. It has taken a long time because he had terrabytes of information to go through and things would have slowed down due to covid. I understand he is running the Fouth Amendment argument that Ulbricht probably should have run in the first place
2. I last heard from Yura just a few weeks ago. He is still scamming. There are some more programs in the works about him
3. Yes there was a very convenient fire, but he still got sentenced to life and i hope he rots in hell
4. I am madly curious to know what is happening with the extradition of James Ellingson, aka “MarijuanaIsMyMuse”, aka "redandwhite", MAYBE aka Tony76. I would LOVE to know that full story!
the below is a reply to the above
Wow, this shit is a blast from the past. I used to love following the darknetmarket drama. Did you write about PoM and tony76 in one of your books? Ever since reddit shut down /darknetmarket I've been out of the loop.
I was in touch with PoM/Mongoose when he went on a posting rampage on MyPlanetGanja, then visited him in Bangkok prison several times. Wrote all about it :)
This may have been answered by a previous post pertaining to native language barriers to specific sites on the dark web, but in your investigations, did you come across content/pages/forums from warzones? Middle East, Burma, Afghanistan, etc? If yes, what was the most memorable bit?
There are loads of sites in foreign languages, but it is too difficult for me (a one-language numpty) to attempt to translate through AI, and it is not worth hiring a translator when they could just turn out to be Cat Facts
Esta introducción a las preguntas frecuentes (FAQ) del protocolo LBRY pueden estar sujetas a cambios en el futuro en el documento original de LBRY y quizás algunas características no sean permanentes. Sin embargo, los posibles cambios en el documento serán para mejorar LBRY. Por favor, te invito a que explores toda su documentación técnica y de preguntas frecuentes al inglés para que conozcas más a profundidad el protocolo LBRY. Seguiré compartiendo con ustedes más conocimiento y temas relacionados a su moneda.
¿Qué es exactamente LBRY? ¿Es un protocolo, una aplicación, un sitio web o una empresa?
Para la mayoría de los usuarios, LBRY será un lugar donde puedan encontrar excelentes videos, música, libros electrónicos y más: imagine una gran biblioteca digital que está disponible en todos sus dispositivos. Pero, debajo del capó, LBRY tiene muchos componentes trabajando juntos. En primer lugar, LBRY es un nuevo protocolo que permite a cualquiera crear aplicaciones que interactúen con contenido digital en la red LBRY. Las aplicaciones creadas con el protocolo permiten a los creadores subir su trabajo a la red LBRY como un hosts o anfitrión (como BitTorrent), establecer un precio por la transmisión o descarga del contenido (como iTunes) o publicarlo gratis (como en YouTube, sin anuncios). El contenido que publiques podrían ser videos, archivos de audio, documentos o cualquier otro tipo de archivo. Los sitios tradicionales de video (u otro contenido) como YouTube, Instagram y Spotify almacenan el contenido en servidores y permiten a los espectadores descargarlas. También permiten a los creadores ganar algo de dinero a través de publicidad u otros mecanismos. Sin embargo, hay algunos inconvenientes bien conocidos, especialmente para las personas cuyo material se percibe como no apto para anunciantes. LBRY pretende ser una alternativa a estos sitios, permitiendo a los editores y sus fanáticos interactuar directamente sin el riesgo de desmonetización u otra intromisión. Y lo que hace que todo esto sea posible es la tecnología blockchain desarrollada por el creador de Bitcoin. ¿Tienes que entender algo de esto para usar y disfrutar de LBRY? No. ¿Sigue siendo importante para los usuarios? ¡Sí!
¿Por qué construir un protocolo?
La creación de protocolos, no plataformas, es la mejor manera de asegurar una Internet abierta y gratuita. Casi todos los gigantes tecnológicos actuales son un servicio centralizado que vende información personal de los usuarios y atención a los anunciantes. Gastan mucho dinero persiguiendo tu producto (tu información personal y tiempo/atención), pero al final del día, los usuarios (usted) lo ofrecen de forma gratuita a cambio de acceso a la plataforma. Creemos que los usuarios deberían ser dueños de su contenido (y su privacidad) en lugar de entregarlo a un gigante corporativo y sus amigos de la publicidad. Si crees que somos paranoicos, hay docenas de ejemplos de compañías que abusan de los usuarios y actúan en contra de sus intereses. No es paranoia si realmente quieren atraparte.
Comunidad impulsada y de código abierto
Todo lo creado para impulsar LBRY es de código abierto y está diseñado para ser controlado por el público en general. Cientos de desarrolladores han contribuido a las bases del código central que impulsan a LBRY y miles de otros miembros de la comunidad han ayudado de otras maneras: reclutando creadores, realizando traducciones, haciendo gráficos y mucho más. Si bien hay una compañía detrás de LBRY llamada LBRY Inc., intentamos atar nuestras propias manos tanto como sea posible para que nunca podamos convertirnos en un megacorp sin rostro malvado. Al hacer que todo sea de código abierto y estandarizado, cualquier persona en el mundo puede alejarse de LBRY con todo intacto (o hacer una versión nueva y mejor).
¿Cómo y por qué LBRY usa blockchain?
La tecnología Blockchain como Bitcoin y LBRY permite a las personas crear bases de datos que ninguna entidad individual controla. Con Bitcoin, cuando envía dinero a alguien, su computadora transmite "hey, la persona con este secreto particular (una clave privada) está enviando dinero a esa persona" a la red, y el algoritmo de minería asegura que todos estén de acuerdo en que, de hecho, envió ese dinero, por lo que su saldo disminuye y la del destinatario aumenta. Para más información sobre esto, mira este gran video del LBRYian @3Blue1Brown. En LBRY, el mismo mecanismo se utiliza para almacenar un índice (index) de qué contenido está disponible y cómo descargarlo, así como las transacciones financieras (como propinas y compras de contenido pago) utilizando una moneda similar a bitcoin llamda LBC (LBRY Credits). Cuando un creador publica algo en LBRY, se realiza una entrada en la cadena de bloques de LBRY. Puede considerarlo como un anuncio: Hola a todos, he publicado este archivo, aquí hay información al respecto e instrucciones sobre cómo descargarlo de la red de igual a igual. Por las mismas razones que nadie puede evitar que se realice una transacción de bitcoin, nadie puede evitar que aparezca una transacción (como una publicación o una sugerencia) en la cadena de bloques de LBRY. Existen otros sitios que comparten su contenido desde una red de datos punto a punto (peer-to-peer). Sin embargo, el índice (index) de contenido disponible todavía está centralizado y puede censurarse fácilmente.
¿Cómo beneficia LBRY a los consumidores de contenido? ¿Por qué debería molestarme en preocuparme?
¿Ves YouTube? Imagina pagar unos centavos para eliminar todos los anuncios. El 100% del pago irá directamente al creador de contenido, y seguirán ganando más que las ofertas de YouTube, por lo que querrán aprovechar aún más el contenido que amas. ¿Usas BitTorrent? Imagina que te pagan por inicializar archivos en la red. Debido a que existe un mercado para estos archivos, finalmente puedes encontrar canciones y películas extrañas que no pueden soportar un enjambre de torrentes basados solo en la popularidad. ¿Compras en la tienda de iTunes? Imagina pagar menos por canciones, episodios de TV y videos musicales mientras que el 100% del costo va directamente a los creadores. LBRY es una biblioteca de medios digitales a tu alcance. Puedes almacenar cualquier tipo de contenido y ponerlo a disposición a un muy bajo costo. En unos años, LBRY puede convertirse en su ventanilla única para todo lo digital, desde libros electrónicos hasta videojuegos y películas. Una aplicación para gobernarlos a todos, pero aún dejando más poder en tus manos porque está descentralizado por diseño.
¿Qué pasa con el nombre LBRY?
La primera pregunta de los recién llegados es a menudo: "¿Cómo se pronuncia?" Respuesta: library. "¿Es un acrónimo?" No. "Entonces, ¿por qué confundir a las personas con mayúsculas y vocales eliminadas?" En primer lugar, LBRY es un protocolo de internet, al igual que HTTP. El contenido en LBRY se sirve a los usuarios a través de "nombres LBRY", que se ven así: lbry://itsawonderfullife. Muy similar a la URL que escribe en su navegador de Internet. LBRY no es solo nuestro nombre de marca, sino la cadena de caracteres que hemos elegido para liderar nuestros URI (Identificador Uniforme de Recursos). También sirve como una forma truncada de "library (biblioteca)", que refleja nuestra misión: cada película, canción, libro y aplicación que se haya hecho, disponible en cualquier lugar. Nuestra visión para LBRY es crear un repositorio de medios masivo para el siglo XXI que se construya en una red descentralizada controlada por los usuarios. LBRY es para una biblioteca tradicional lo que Amazon es para una tienda por departamentos. ¿Es un nombre extraño? Quizás. Pero quisiéramos señalar el éxito de marcas como Hulu, Yahoo!, Etsy, Skype, Tumblr y Zillow. Al final, una buena compañía con una sólida base de usuarios será recordada independientemente de su nombre. Y una empresa con una marca tan sencilla como Pets.com aún puede fallar. LBRY está funcionando bien como marca hasta ahora. El SEO es una consideración principal para la marca de inicio, y LBRY ya domina los resultados de búsqueda de nuestra marca.
¿Cómo funciona el nombre de LBRY? ¿Por qué no solo asigna nombres de la misma manera que los dominios de Internet?
Antes de hablar sobre cómo funcionan los nombres (URL) en LBRY, es importante comprender el problema. ¿Qué es un sistema de nombres y por qué tenemos uno? Los nombres existen para que podamos asignar una palabra o término legible y comprensible a un número o ID más difícil de recordar. En el DNS tradicional (sistema de nombres de dominio), los nombres se asignan a una dirección IP numérica. En LBRY, los nombres se asignan a una identificación única y permanente que represente una pieza de contenido digital y/o una identidad del editor. Diseñar un sistema de nombres que funcione bien y asigne nombres de manera justa es bastante difícil. Considere el sistema de dominio que probablemente esté utilizando para acceder a este documento. El dominio de LBRY solía ser lbry.io durante mucho tiempo, en lugar de lbry.com. ¿Es porque lbry.com está proporcionando un servicio único? ¡No! Esto se debe a que un usurpador estaba en posesión de él, simplemente buscando subastar el nombre de dominio al mejor postor en demanda. Tuvimos que negociar durante meses (y pagar mucho $$$) para obtener el dominio lbry.com y no queremos que los usuarios de LBRY pasen por una experiencia similar... preferimos dejarlo en manos de incentivos y reglas de protocolo fijo. El sistema tradicional tiene varios otros defectos. Está centralizado y es un mecanismo de censura, ya que los titulares no tienen la verdadera propiedad de su dominio, solo el proveedor de nivel superior. Los dominios de nivel superior (como .io) también son arbitrarios y en gran medida ilógicos (si diseñamos el sistema de nombres de dominio nuevamente, ¿realmente querríamos agregar un ".com" arbitrario a la URL más prestigiosa para una palabra clave dada? ¿LBRY tiene algo que ver con el Océano Índico?). Finalmente, además de incentivar el mal comportamiento, la estructura de tarifa plana de los dominios evita el buen comportamiento de aquellos que tienen un precio. Queríamos un sistema que:
Permita que una sola palabra se asigne directamente a un contenido, sin otra extensión o modificador.
Permita a los creadores adquirir una URL y poseerla de forma permanente y para siempre, sin tarifas continuas.
Permita que se ubiquen varias piezas de contenido en una sola palabra clave mientras se mantienen las URL lo más cortas y memorables posible.
Evitar que los ocupantes ilegales extorsionen a los creadores.
Después de una consulta significativa con creadores, consumidores, economistas, informáticos y más, diseñamos el sistema de nombres de LBRY.
¿Cómo LBRY establece un nombre?
En primer lugar, es absolutamente posible poseer y controlar una URL para siempre. En LBRY, una entrada de URL se denomina reclamo. Por simplicidad, se puede considerar que un reclamo consiste en:
El nombre (una cadena de caracteres elegidos por el creador)
La cantidad de créditos
Datos adicionales relacionados con el contenido y/o la identidad del editor
Las reclamaciones en LBRY no son consuntivas. Cuando designa una cantidad de créditos en un reclamo, no se pierde ni destruye nada más allá de la tarifa de transacción relativamente mínima. En cualquier momento, los créditos asignados a un reclamo pueden usarse para otro propósito, recuperarse o enviarse a otro lugar. Cuando esto sucede, el reclamo ya no se considera válido.
LBRY admite varios tipos de resolución de URL:
Esta URL consta de un nombre y una identificación asignada al azar. Esto es propiedad y control permanente del editor. Las URL permanentes admiten la coincidencia de ID parcial ordenada temporalmente, por lo que pueden ser bastante cortas (por ejemplo, lbry://nombre#8 o lbry://nombre#ab)
Esta URL consta de un nombre y uno o más caracteres (orden de llegada para preservar la unicidad) forman la URL permanente. Esto es propiedad y control permanente del editor. Si se pone a disposición una URL más corta, la siguiente reclamación en línea se hará cargo de su resolución.
De todos los reclamos llamados , esto devuelve la publicación con la mayor cantidad de créditos comprometidos, no solo por el editor, sino por toda la comunidad. Estas URL no son permanentes ni propias, sino que están controladas por la propia comunidad, lo que permite que la resolución se establezca en lo que la comunidad determine más apropiado.
Una URL correspondiente a una identidad de editor. Estos resuelven la identidad de un editor específico y sus publicaciones. Las URL de canal se pueden especificar con o sin el modificador #. Una URL no modificada devuelve el canal determinado por la comunidad.
El contenido publicado con el nombre dentro del canal de <@channel_name>.
URL para llevar
Los nombres no se compran, solo se reservan, no se pierden créditos, solo se depositan. Si gana la subasta por un nombre, sus créditos se mantienen con ese nombre hasta que decida retirarlos (en cualquier momento que lo desee). No le está comprando el nombre a nadie, y nadie se beneficia de la transferencia de nombres. Es solo una prueba de quién está dispuesto a depositar la mayor cantidad de créditos para un nombre. El único inconveniente es que no puede gastar los créditos en el contenido o retirarlos mientras están en reserva.
Cuanto más tiempo se mantenga un nombre de comunidad, más tiempo se mantendrá. Las URL controladas por la comunidad no cambian instantáneamente si se designan más créditos, especialmente si lo ha mantenido por un tiempo. Por cada mes que se controla un nombre, se agrega 1 día al período de espera, por un máximo de 7 días (después de 7 meses).
Todos tienen algo que decir. Si reclama lbry://bestmovieever y su película está a la altura de las expectativas, las sugerencias y compras de los usuarios son una fuerza poderosa para mantener su contenido allí. Si la comunidad considera que la resolución de una URL es incorrecta, pueden unirse para cambiarla en cualquier momento. Esta es una fuerza poderosa que mantiene a raya a los malos actores que ya ha demostrado ser útil.
Los nombres son más como términos de búsqueda. Cuando un usuario busca en la red LBRY, o un motor de recomendación sugiere contenido, se consideran todas las reclamaciones válidas. No tener la URL de la comunidad para su contenido no significa que nadie lo verá. Se pueden mostrar muchas piezas diferentes de contenido con el mismo nombre cuando los usuarios buscan contenido en la red.
Ya sea que esté enamorado de este diseño o no, es probable que esté de acuerdo en que es diferente a todo lo que hemos visto antes. La conclusión es que LBRY se dedica a proporcionar verdadera libertad de contenido. Queremos proporcionar el mejor método del mundo para que creadores y consumidores compartan y moneticen contenido digital sin intermediarios. Pensamos que este es un método superior a las alternativas, pero tampoco somos dogmáticos al respecto. Estamos tratando de resolver un problema muy difícil de una manera novedosa, y estamos comprometidos a darle una oportunidad a este sistema. 1,000,000 de piezas de contenido han funcionado a la perfección. Pero si alguna vez vimos este sistema perjudicar en lugar de ayudar, no dudaríamos en cambiarlo.
Relevancia en búsqueda y tendencias/categorías principales
Aumentar su oferta y recibir tips (recompensas) sobre su contenido/canal, aumenta su relevancia en los resultados de búsqueda y su visibilidad a través de las categorías de tendencias y principales en LBRY. Los cálculos de tendencias se basan en cuánto ha aumentado la oferta de LBC a través de las actualizaciones de la oferta y los consejos, en comparación con todas las otras reclamaciones en LBRY. Aprende más.
¿Cómo maneja LBRY la privacidad? ¿Qué datos recopila LBRY?
LBRY toma en serio la privacidad y considera cuidadosamente los datos que recopila. Nuestra política de privacidad oficial se puede ver en https://lbry.com/privacypolicy. Este artículo de preguntas frecuentes intenta explicar nuestra política en inglés y español, pero no debe considerarse un documento de política oficial. LBRY recopila datos por una variedad de razones, que incluyen pero no se limitan a:
Depuración y mejora del protocolo
Comprender cómo nuestros usuarios interactúan con nuestras aplicaciones
Prevenir el fraude en nuestros programas de recompensas
Proporcionar estadísticas a los creadores de contenido.
Prometemos mantener seguros los datos recopilados y nunca compartir información personal y privada con nadie fuera de LBRY Inc. Debe tener más de 13 años para iniciar sesión en la aplicación de escritorio o crear una cuenta lbry.tv. Los usuarios también pueden elegir usar LBRY de forma anónima, sin embargo, algunas características, como LBRY Rewards, no estarán disponibles. Además, incluso cuando no nos envían datos, el uso de LBRY generalmente implica la participación en la red LBRY entre pares y es probable que cierta información como su dirección IP se exponga independientemente. Leer más abajo para más información.
¿Qué tipo de datos se recopilan y dónde?
Cuando el usuario utiliza por primera vez las aplicaciones LBRY y lbry.tv, tiene la opción de proporcionar una dirección de correo electrónico para crear una cuenta LBRY. Esto permite una experiencia de usuario más rica al habilitar servicios tales como LBRY Rewards, notificaciones por correo electrónico y sincronización de cuenta (es decir, suscripciones y preferencias de usuario) en múltiples dispositivos/plataformas. Si no proporciona un correo electrónico, los datos recopilados no pueden asociarse con su identidad, pero aún pueden estar vinculados a otra información del sistema, como las direcciones IP. Consulte las tablas a continuación para obtener un desglose de los tipos de datos recopilados y las aplicaciones asociadas.
TIPOS DE DATOS
Sí, si se proporciona un correo electrónico
Se usa para crear y autenticar una cuenta LBRY
Preferencias del usuario
Sí, si se proporciona un correo electrónico
Suscripciones, etiquetas, canales bloqueados y configuración de aplicaciones
Información del sistema
Sí, si compartir datos de diagnóstico está habilitado
Sistema operativo, versiones de aplicación/SDK e identificador de instalación único
Verificación de identidad
Sí, si pasa por aprobación manual
Número de teléfono, huella digital de tarjeta de crédito (Stripe) e identificadores de servicios de terceros (es decir, YouTube, GitHub)
Sí, si compartir datos de diagnóstico está habilitado
El comportamiento del usuario y las interacciones dentro de las aplicaciones se rastrean de forma anónima. Esto no está vinculado a una cuenta LBRY.
Análisis de acceso al contenido
Sí, si se proporciona un correo electrónico
Vistas de contenido utilizadas para recompensas y análisis internos
No, usa VPN para proteger
Cualquier acceso a los servicios LBRY se registra para evitar abusos y cumplir con los requisitos legales.
Sí, si se proporciona un correo electrónico
Las direcciones wallet y las transacciones relacionadas con las recompensas se registran para evitar abusos y cumplir con los requisitos fiscales (por encima del límite anual de $600)
Transacciones de blockchain
No, no crea transacciones.
Cualquier acción tomada que use créditos LBRY y cree una transacción permanente en la cadena de bloques. No está vinculado a ninguna cuenta/datos de usuario.
TIPOS DE DATOS
APLICACIÓN DE ESCRITORIO LBRY
LBRY ANDROID APP
Preferencias del usuario
Información del sistema
Verificación de identidad
Análisis de acceso al contenido
Transacciones de blockchain
¿Cuál es la diferencia entre los datos de la cuenta y las wallets de criptomonedas?
Cada aplicación LBRY instalable también contiene una wallet de criptomonedas que se almacena localmente en el dispositivo respectivo. La wallet le permite almacenar créditos LBRY y usarlos para realizar transacciones (gastar, publicar, comprar y dar propinas) en la red. La información privada, que se requiere para realizar estas acciones, está bajo el control exclusivo del usuario. LBRY proporciona un mecanismo de sincronización y respaldo de billetera para permitir el acceso sin interrupciones a través de múltiples dispositivos. El servicio de respaldo garantiza que el usuario pueda recuperar una billetera a través de su cuenta LBRY en caso de que pierdan el acceso a su copia local. Cualquier almacenamiento e intercambio de datos de billetera tiene un cifrado de extremo a extremo, y el usuario también puede proporcionar una contraseña de cifrado adicional si lo desea.
¿Cómo uso LBRY de forma anónima?
Para usar LBRY de forma privada, recomendamos la aplicación LBRY Desktop. De manera predeterminada, la aplicación LBRY Desktop no compartirá datos de cuentas o análisis con LBRY, Inc. o terceros sin habilitarse específicamente. Para una experiencia máximamente privada, también debe usar una red privada virtual (VPN) para proteger su dirección IP. Esto le permitirá utilizar funciones como recuperar datos de contenido, publicar, comprar, dar propinas y otras transacciones de forma anónima. Dependiendo de las características de VPN y la configuración de la red, los datos de alojamiento actualmente pueden no ser posibles, pero esta es un área de desarrollo activo. Tenga en cuenta que si usa LBRY de forma anónima o privada, no es elegible para las recompensas en lbry.tv.
¿Dónde se almacenan los datos de cuenta y análisis?
LBRY almacena los datos recopilados en sus propias bases de datos seguras y garantiza que solo los empleados autorizados tengan acceso a estos datos. Los datos de Google Analytics están anonimizados y protegidos por Google.
¿Qué información se comparte con otros en la red?
De manera similar a otros protocolos peer to peer como BitTorrent, los usuarios en la red comparten mensajes (es decir, anuncian la disponibilidad de contenido) y crean conexiones directas para intercambiar datos (es decir, descargas/cargas). Si bien LBRY no recopila esta información, otros participantes de la red pueden observar y recopilar la información.
¿Puedo usar una VPN para usar y acceder a LBRY?
Sí, se puede usar una VPN con todos los servicios de LBRY. Las funciones principales funcionarán sin ningún problema, pero los usuarios de VPN pueden no ser elegibles para LBRY Rewards para evitar abusos.
¿Se recopilan datos adicionales si participo en el programa YouTube Sync?
Al autenticarse en el programa YouTube Sync, usted proporciona una prueba de propiedad del canal que nos permite vincular su canal de YouTube a una cuenta LBRY. LBRY, Inc. almacena y conserva información sobre su cuenta.
¿Dónde puedo obtener más información sobre la tecnología detrás de LBRY?
lbry.tech es el hogar de información técnica sobre LBRY, un patio de juegos interactivo para aprender más sobre cómo funciona, recursos sobre cómo contribuir y construir sobre él, y mucho más.
What Are Anonymous Bitcoin Wallets? Anonymous bitcoin wallets are designed to keep their users’ identity secret. They keep your personal data and transaction details secure from falling into malicious hands. They achieve this through the use of a Virtual Private Network (VPN) or a Tor Network used to carry transfers and continually change the ... Anonymous Bitcoin Wallet: learn how to store and get Bitcoins anonymously. Learn to keep your privacy and get an anonymous Bitcoin wallet today. PINT Wallet is a decentralized anonymous Bitcoin wallet that’s only available on Android. In additional to its wallet features, it also boasts a built-in peer-to-peer crypto marketplace. No personal details are required during set up, and the keys for your wallet live on your mobile device. If you lose your phone, you can use the app’s built-in anti-theft feature to delete it off your old ... Additionally, by not linking previous change outputs the app avoids leaking valuable metadata about your wallet, alongside Tor and VPN support which allows users to route all transactions through an anonymous IP address. Samourai Wallet is free and can be downloaded on the Google Play Store. 3. Wasabi Wallet. Wasabi Wallet, formerly known as HiddenWallet, is one of the best anonymous bitcoin ... Top Bitcoin Anonymous Wallets of 2020. Let’s Get Started with our Best picks for Anonymous Bitcoin Wallets to store safely in 2020 and beyond: #1. Ledger Nano X [Recommended Wallet]. Ledger Nano X Wallet is the successor of Ledger Nano S hardware device.. Nano X was launched this year and in this short span, it has made a name for itself for securing your cryptocurrencies safely.
Introducing the digital wallet for bitcoin economics. Darkwallet is an open source bitcoin wallet that provides a solid foundation of well designed asynchron... How to buy Bitcoin Anonymously (2019-2020). Easy ways to buy Bitcoin without ID. ***ARE YOU CURIOUS ABOUT HOW I MADE $1,006 From $100, THEN $257,000 From $1,... Tutorial: https://tinyurl.com/ybkkegse Earn Bitcoin Free Here: https://tinyurl.com/ybkkegse How to create a unhackable bitcoin wallet at home no programming ... Wie man anonym Bitcoin kauft - Duration: 11:57. Blue Alpine Krypto Analysen 1,468 views. 11:57. ... Sicheres Bitcoin Wallet erstellen - Schritt-für-Schritt Anleitung - Electrum Deutsch Geldbeutel ... Bitcoin blockchain is public, therefore it is important to make sure you get it anonymously if you want to protect your privacy and anonymity. This video sho...