#1 Simple Bitcoin Price History Chart (Since 2009)

Why Bitcoin is Superior to Gold

There is a constant war being fought between goldbugs, like Peter Schiff, and Bitcoin enthusiasts so I decided to make an outline, with links, comparing and contrasting gold and Bitcoin. I made this in November of 2019 (thus the information therein is based on figures from that time) but, being scatter brained, neglected to post this for the Bitcoin community to see. The yardsticks I used to compare the two assets included the following: shipping/transactions costs, storage costs, censorship factor, settlement time, stock to flow, blockchain vs clearing house, validation, etc. I will also touch on Roosevelt's gold confiscation executive order in 1933, transporting gold during the Spanish Civil War in 1936, and the hypothetical cost for Venezuela to repatriate its gold more recently.
I will provide a brief summary first then follow that with the outline I made. This information can be used as a tool for the Bitcoin community to combat some of the silly rhetoric coming from goldbugs such as Peter Schiff and James Rickards. I would like to make it clear, however, that I am not against gold and think that it performed its role as money very well in a technologically inferior era, namely Victorian times but I think Bitcoin performs the functions of money better than gold does in the current environment.
I have been looking to make a contribution to the Bitcoin community and I hope this is a useful and educational tool for everyone who reads this.
Summary:
Shipping/transaction costs: 100 ounces of gold could be shipped for 315 dollars; the comparable dollar value in Bitcoin could be sent for 35 dollars using a non-segwit address. Using historical precendent, it would cost an estimated $32,997,989 to transport $1 billion in gold using the 3.3% fee that the Soviets charged the Spaniards in 1936; a $1 billion Bitcoin transaction moved for $690 last year by comparison. Please note that the only historic example we can provide for moving enormous sums of gold was when the government of Spain transported gold to Moscow during the Spanish Civil War in 1936. More information on this topic will be found in the notes section.
Storage costs: 100 ounces of gold would require $451 per year to custody while the equivalent value of Bitcoin in dollar terms could be stored for the cost of a Ledger Nano S, $59.99. $1 billion USD value of gold would cost $2,900,000 per year while an Armory set up that is more secure would run you the cost of a laptop, $200-300.
Censorship factor: Gold must pass through a 3rd party whenever it is shipped, whether for a transaction or for personal transportation. Gold will typically have to be declared and a customs duty may be imposed when crossing international borders. The key take-away is gatekeepers (customs) can halt movement of gold thus making transactions difficult. $46,000 of gold was seized in India despite the smugglers hiding it in their rectums.
Settlement time: Shipping gold based on 100 ounces takes anywhere from 3-10 days while Bitcoin transactions clear in roughly 10 minutes depending on network congestion and fee size.
Historic confiscation: Franklin Roosevelt confiscated and debased the paper value of gold in 1933 with Executive Order 6102. Since gold is physical in nature and value dense, it is often stored in custodial vaults like banks and so forth which act as a honeypot for rapacious governments.
Stock to flow: Plan B's stock to flow model has become a favorite on twitter. Stock to flow measures the relationship between the total stock of an asset against the amount that is produced in a given year. Currently gold still has the highest value at 62 while Bitcoin sits at 50 in 2nd place. Bitcoin will overtake gold in 2024 after the next halving.
Blockchain vs clearing house: gold payments historically passed through a 3rd party (clearinghouse) in order to be validated while Bitcoin transactions can be self validated through the use of a node.
Key Takeaway from above- Bitcoin is vastly superior to gold in terms of cost, speed, and censorship resistance. One could theoretically carry around an enormous sum of Bitcoin on a cold card while the equivalent dollar value of gold would require a wheelbarrow...and create an enormous target on the back of the transporter. With the exception of the stock to flow ratio (which will flip in Bitcoin's favor soon), Bitcoin is superior to gold by all metrics covered.
Notes:
Shipping/transaction costs
Gold
100 oz = 155,500. 45 x 7 = $315 to ship 100 oz gold.
https://seekingalpha.com/instablog/839735-katchum/2547831-how-much-does-it-cost-to-ship-silver-and-gold
https://www.coininvest.com/en/shipping-prices/
211 tonnes Venezuela; 3.3% of $10.5 billion = 346,478,880 or 32,997,989/billion usd
http://blogs.reuters.com/felix-salmon/2011/08/23/how-to-get-12-billion-of-gold-to-venezuela/ (counter party risk; maduro; quotes from article)
Bitcoin
18 bitcoin equivalent value; 35 USD with legacy address
https://blockexplorer.com/
https://bitcoinfees.info/
1 billion; $690 dollars
https://arstechnica.com/tech-policy/2019/09/someone-moved-1-billion-in-a-single-bitcoin-transaction/
Storage costs
Gold
.29% annually; https://sdbullion.com/gold-silver-storage
100 oz – $451/year
$1 billion USD value – $2,900,000/year
Bitcoin
Ledger Nano S - $59.00 (for less bitcoin)
https://shop.ledger.com/products/ledger-nano-s/transparent?flow_country=USA&gclid=EAIaIQobChMI3ILV5O-Z5wIVTtbACh1zTAwqEAQYASABEgJ5SPD_BwE
Armory - $200-300 cost of laptop for setup
https://www.bitcoinarmory.com/
Censorship factor (must pass through 3rd party)
Varies by country
Gold will typically have to be declared and a customs duty may be imposed
Key take-away is gatekeepers (customs) can halt movement of gold thus making transactions difficult
$46,000 seized in India
https://www.foxnews.com/travel/indian-airport-stops-29-passengers-smuggling-gold-in-their-rectums
Settlement time
Gold
For 100 oz transaction by USPS 3-10 days (must pass through 3rd party)
Bitcoin
Roughly 10 minutes to be included in next block
Historic confiscation-roosevelt 1933
Executive Order 6102 (forced spending, fed could ban cash, go through and get quotes)
https://en.wikipedia.org/wiki/Executive_Order_6102
“The stated reason for the order was that hard times had caused "hoarding" of gold, stalling economic growth and making the depression worse”
Stock to flow; https://medium.com/@100trillionUSD/modeling-bitcoins-value-with-scarcity-91fa0fc03e25 (explain what it is and use charts in article)
Gold; SF of 62
Bitcoin; SF of 25 but will double to 50 after May (and to 100 in four years)
Blockchain vs clearing house
Transactions can be validated by running a full node vs. third party settlement
Validation
Gold; https://www.goldismoney2.com/threads/cost-to-assay.6732/
(Read some responses)
Bitcoin
Cost of electricity to run a full node
Breaking down Venezuela conundrum; http://blogs.reuters.com/felix-salmon/2011/08/23/how-to-get-12-billion-of-gold-to-venezuela/
“The last (and only) known case of this kind of quantity of gold being transported across state lines took place almost exactly 75 years ago, in 1936, when the government of Spain removed 560 tons of gold from Madrid to Moscow as the armies of Francisco Franco approached. Most of the gold was exchanged for Russian weaponry, with the Soviet Union keeping 2.1% of the funds in the form of commissions and brokerage, and an additional 1.2% in the form of transport, deposit, melting, and refining expenses.”
“Venezuela would need to transport the gold in several trips, traders said, since the high value of gold means it would be impossible to insure a single aircraft carrying 211 tonnes. It could take about 40 shipments to move the gold back to Caracas, traders estimated. “It’s going to be quite a task. Logistically, I’m not sure if the central bank realises the magnitude of the task ahead of them,” said one senior gold banker.”
“So maybe Chávez intends to take matters into his own hands, and just sail the booty back to Venezuela on one of his own naval ships. Again, the theft risk is obvious — seamen can be greedy too — and this time there would be no insurance. Chávez is pretty crazy, but I don’t think he’d risk $12 billion that way.”
“Which leaves one final alternative. Gold is fungible, and people are actually willing to pay a premium to buy gold which is sitting in the Bank of England’s ultra-secure vaults. So why bother transporting that gold at all? Venezuela could enter into an intercontinental repo transaction, where it sells its gold in the Bank of England to some counterparty, and then promises to buy it all back at a modest discount, on condition that it’s physically delivered to the Venezuelan central bank in Caracas. It would then be up to the counterparty to work out how to get 211 tons of gold to Caracas by a certain date. That gold could be sourced anywhere in the world, and transported in any conceivable manner — being much less predictable and transparent, those shipments would also be much harder to hijack. How much of a discount would a counterparty require to enter into this kind of transaction? Much more than 3.3%, is my guess. And again, it’s not entirely clear who would even be willing to entertain the idea. Glencore, perhaps?”
“But here’s one last idea: why doesn’t Chávez crowdsource the problem? He could simply open a gold window at the Banco Central de Venezuela, where anybody at all could deliver standard gold bars. In return, the central bank would transfer to that person an equal number of gold bars in the custody of the Bank of England, plus a modest bounty of say 2% — that’s over $15,000 per 400-ounce bar, at current rates. It would take a little while, but eventually the gold would start trickling in: if you’re willing to pay a constant premium of 2% over the market price for a good, you can be sure that the good in question will ultimately find its way to your door. And the 2% cost of acquiring all that gold would surely be much lower than the cost of insuring and shipping it from England. It would be an elegant market-based solution to an artificial and ideologically-driven problem; I daresay Chávez might even chuckle at the irony of it. He’d just need to watch out for a rise in Andean banditry, as thieves tried to steal the bars on their disparate journeys into Venezuela.”
submitted by cornish_roots to Bitcoin [link] [comments]

Why we need to think more carefully about what money is and how it works

Most of us have overlooked a fundamental problem that is currently causing an insurmountable obstacle to building a fairer and more sustainable world. We are very familiar with the thing in question, but its problematic nature has been hidden from us by a powerful illusion. We think the problem is capitalism, but capitalism is just the logical outcome of aggregate human decisions about how to manage money. The fundamental problem is money itself, or more specifically general purpose money and the international free market which allows you to sell a chunk of rainforest and use the money to buy a soft drink factory. (You can use the same sort of money to sell anything and buy anything, anywhere in the world, and until recently there was no alternative at all. Bitcoin is now an alternative, but is not quite what we are looking for.) The illusion is that because market prices are free, and nobody is forced into a transaction, those prices must be fair – that the exchange is equitable. The truth is that the way the general money globalised free market system works means that even though the prices are freely determined, there is still an unequal flow of natural resources from poor parts of the world to rich parts. This means the poor parts will always remain poor, and resources will continue to accumulate in the large, unsustainable cities in rich countries. In other words, unless we re-invent money, we cannot overturn capitalism, and that means we can't build a sustainable civilisation.
Why does this matter? What use is it realising that general purpose money is at the root of our problems when we know that the rich and powerful people who run this world will do everything in their power to prevent the existing world system being reformed? They aren't just going to agree to get rid of general purpose money and economic globalisation. It's like asking them to stop pursuing growth: they can't even imagine how to do it, and don't want to. So how does this offer us a way forwards?
Answer: because the two things in question – our monetary system and globalisation – look like being among the first casualties of collapse. Globalisation is already going into reverse (see brexit, Trump's protectionism) and our fiat money system is heading towards a debt/inflation implosion.
It looks highly likely that the scenario going forwards will be of increasing monetary and economic chaos. Fiat money systems have collapsed many times before, but never a global system of fiat currencies floating against each other. But regardless of how may fiat currencies collapse, or how high the price of gold goes in dollars, it is not clear what the system would be replaced with. Can we just go back to the gold standard? It is possible, but people will be desperately looking for other solutions, and the people in power might also be getting desperate.
So what could replace it? What is needed is a new sort of complementary money system which both
(a) addresses the immediate economic problems of people suffering from symptoms of economic and general collapse and
(b) provides a long-term framework around which a new sort of economy can emerge – an economy which is adapted to deglobalisation and degrowth.
I have been searching for answers to this question for some time, and have now found what I was looking for. It is explained in this recently published academic book, and this paper by the same professor of economic anthropology (Alf Hornborg). The answer is the creation of a new sort of money, but it is critically important exactly how this is done. Local currencies like the Bristol Pound do not challenge globalisation. What we need is a new sort of national currency. This currency would be issued as a UBI, but only usable to buy products and services originating within an adjustable radius. This would enable a new economy to emerge. It actually resists globalisation and promotes the growth of a new sort of economy where sustainability is built on local resources and local economic activity. It would also reverse the trend of population moving from poor rural areas and towns, to cities. It would revitalise the “left behind” parts of the western world, and put the brakes on the relentless flow of natural resources and “embodied cheap labour” from the poor parts of the world to the rich parts. It would set the whole system moving towards a more sustainable and fairer state.
This may sound unrealistic, but please give it a chance. I believe it offers a way forwards that can
(a) unite disparate factions trying to provoke systemic change, including eco-marxists, greens, posthumanists and anti-globalist supporters of “populist nationalism”. The only people who really stand to lose are the supporters of global big business and the 1%.
(b) offers a realistic alternative to a money system heading towards collapse, and to which currently no other realistic alternative is being proposed.
In other words, this offers a realistic way forwards not just right now but through much of the early stages of collapse. It is likely to become both politically and economically viable within the forseeable future. It does, though, require some elements of the left to abandon its globalist ideals. It will have to embrace a new sort of nationalism. And it will require various groups who are doing very well out of the current economic system to realise that it is doomed.
Here is an FAQ (from the paper).
What is a complementary currency? It is a form of money that can be used alongside regular money.
What is the fundamental goal of this proposal? The two most fundamental goals motivating this proposal are to insulate local human subsistence and livelihood from the vicissitudes of national and international economic cycles and financial speculation, and to provide tangible and attractive incentives for people to live and consume more sustainably. It also seeks to provide authorities with a means to employ social security expenditures to channel consumption in sustainable directions and encourage economic diversity and community resilience at the local level.
Why should the state administrate the reform? The nation is currently the most encompassing political entity capable of administrating an economic reform of this nature. Ideally it is also subservient to the democratic decisions of its population. The current proposal is envisaged as an option for European nations, but would seem equally advantageous for countries anywhere. If successfully implemented within a particular nation or set of nations, the system can be expected to be emulated by others. Whereas earlier experiments with alternative currencies have generally been local, bottom-up initiatives, a state-supported program offers advantages for long-term success. Rather than an informal, marginal movement connected to particular identities and transient social networks, persisting only as long as the enthusiasm of its founders, the complementary currency advocated here is formalized, efficacious, and lastingly fundamental to everyone's economy.
How is local use defined and monitored? The complementary currency (CC) can only be used to purchase goods and services that are produced within a given geographical radius of the point of purchase. This radius can be defined in terms of kilometers of transport, and it can vary between different nations and regions depending on circumstances. A fairly simple way of distinguishing local from non-local commodities would be to label them according to transport distance, much as is currently done regarding, for instance, organic production methods or "fair trade." Such transport certification would of course imply different labelling in different locales.
How is the complementary currency distributed? A practical way of organizing distribution would be to provide each citizen with a plastic card which is electronically charged each month with the sum of CC allotted to him or her.
Who are included in the category of citizens? A monthly CC is provided to all inhabitants of a nation who have received official residence permits.
What does basic income mean? Basic income is distributed without any requirements or duties to be fulfilled by the recipients. The sum of CC paid to an individual each month can be determined in relation to the currency's purchasing power and to the individual's age. The guiding principle should be that the sum provided to each adult should be sufficient to enable basic existence, and that the sum provided for each child should correspond to the additional household expenses it represents.
Why would people want to use their CC rather than regular money? As the sum of CC provided each month would correspond to purchases representing a claim on his or her regular budget, the basic income would liberate a part of each person's regular income and thus amount to substantial purchasing power, albeit restricted only to local purchases. The basic income in CC would reduce a person's dependence on wage labor and the risks currently associated with unemployment. It would encourage social cooperation and a vitalization of community.
Why would businesses want to accept payment in CC? Business entrepreneurs can be expected to respond rapidly to the radically expanded demand for local products and services, which would provide opportunities for a diverse range of local niche markets. Whether they receive all or only a part of their income in the form of CC, they can choose to use some of it to purchase tax-free local labor or other inputs, and to request to have some of it converted by the authorities to regular currency (see next point).
How is conversion of CC into regular currency organized? Entrepreneurs would be granted the right to convert some of their CC into regular currency at exchange rates set by the authorities.The exchange rate between the two currencies can be calibrated so as to compensate the authorities for loss of tax revenue and to balance the in- and outflows of CC to the state. The rate would thus amount to a tool for determining the extent to which the CC is recirculated in the local economy, or returned to the state. This is important in order to avoid inflation in the CC sector.
Would there be interest on sums of CC owned or loaned? There would be no interest accruing on a sum of CC, whether a surplus accumulating in an account or a loan extended.
How would saving and loaning of CC be organized? The formal granting of credit in CC would be managed by state authorities and follow the principle of full reserve banking, so that quantities of CC loaned would never exceed the quantities saved by the population as a whole.
Would the circulation of CC be subjected to taxation? No.
Why would authorities want to encourage tax-free local economies? Given the beneficial social and ecological consequences of this reform, it is assumed that nation states will represent the general interests of their electorates and thus promote it. Particularly in a situation with rising fiscal deficits, unemployment, health care, and social security expenditures, the proposed reform would alleviate financial pressure on governments. It would also reduce the rising costs of transport infrastructure, environmental protection, carbon offsetting, and climate change adaptation. In short, the rising costs and diminishing returns on current strategies for economic growth can be expected to encourage politicians to consider proposals such as this, as a means of avoiding escalating debt or even bankruptcy.
How would the state's expenditures in CC be financed? As suggested above, much of these expenditures would be balanced by the reduced costs for social security, health care, transport infrastructure, environmental protection, carbon offsetting, and climate change adaptation. As these savings may take time to materialize, however, states can choose to make a proportion of their social security payments (pensions, unemployment insurance, family allowance, etc.) in the form of CC. As between a third and half of some nations' annual budgets are committed to social security, this represents a significant option for financing the reform, requiring no corresponding tax levies.
What are the differences between this CC and the many experiments with local currencies? This proposal should not be confused with the notion, or with the practical operation, of local currencies, as it does not imply different currencies in different locales but one national,complementary currency for local use. Nor is it locally initiated and promoted in opposition to theregular currency, but centrally endorsed and administrated as an accepted complement to it. Most importantly, the alternative currency can only be used to purchase products and services originating from within a given geographical range, a restriction which is not implemented in experiments with Local Exchange Trading Systems (LETS). Finally, the CC is provided as a basic income to all residents of a nation, rather than only earned in proportion to the extent to which a person has made him- or herself useful in the local economy.
What would the ecological benefits be? The reform would radically reduce the demand for long-distance transport, the production of greenhouse gas emissions, consumption of energy and materials, and losses of foodstuffs through overproduction, storage, and transport. It would increase recycling of nutrients and packaging materials, which means decreasing leakage of nutrients and less garbage. It would reduce agricultural intensification, increase biodiversity, and decrease ecological degradation and vulnerability.
What would the societal benefits be? The reform would increase local cooperation, decrease social marginalization and addiction problems, provide more physical exercise, improve psycho-social and physical health, and increase food security and general community resilience. It would decrease the number of traffic accidents, provide fresher and healthier food with less preservatives, and improved contact between producers and consumers.
What would the long-term consequences be for the economy? The reform would no doubt generate radical transformations of the economy, as is precisely the intention. There would be a significant shift of dominance from transnational corporations founded on financial speculation and trade in industrially produced foodstuffs, fuels, and other internationally transported goods to locally diverse producers and services geared to sustainable livelihoods. This would be a democratic consequence of consumer power, rather than of legislation. Through a relatively simple transformation of the conditions for market rationality, governments can encourage new and more sustainable patterns of consumer behavior. In contrast to much of the drastic and often traumatic economic change of the past two centuries, these changes would be democratic and sustainable and would improve local and national resilience.
Why should society want to encourage people to refrain from formal employment? It is increasingly recognized that full or high employment cannot be a goal in itself, particularly if it implies escalating environmental degradation and energy and material throughput. Well-founded calls are thus currently made for degrowth, i.e. a reduction in the rate of production of goods and services that are conventionally quantified by economists as constitutive of GDP. Whether formal unemployment is the result of financial decline, technological development, or intentional policy for sustainability, no modern nation can be expected to leave its citizens economically unsupported. To subsist on basic income is undoubtedly more edifying than receiving unemployment insurance; the CC system encourages useful community cooperation and creative activities rather than destructive behavior that may damage a person's health.
Why should people receive an income without working? As observed above, modern nations will provide for their citizens whether they are formally employed or not. The incentive to find employment should ideally not be propelled only by economic imperatives, but more by the desire to maintain a given identity and to contribute creatively to society. Personal liberty would be enhanced by a reform which makes it possible for people to choose to spend (some of) their time on creative activities that are not remunerated on the formal market, and to accept the tradeoff implied by a somewhat lower economic standard. People can also be expected to devote a greater proportion of their time to community cooperation, earning additional CC, which means that they will contribute more to society – and experience less marginalization – than the currently unemployed.
Would savings in CC be inheritable? No.
How would transport distances of products and services be controlled? It is reasonable to expect the authorities to establish a special agency for monitoring and controlling transport distances. It seems unlikely that entrepreneurs would attempt to cheat the system by presenting distantly produced goods as locally produced, as we can expect income in regular currency generally to be preferable to income in CC. Such attempts would also entail transport costs which should make the cargo less competitive in relation to genuinely local produce, suggesting that the logic of local market mechanisms would by and large obviate the problem.
How would differences in local conditions (such as climate, soils, and urbanism) be dealt with?It is unavoidable that there would be significant variation between different locales in terms of the conditions for producing different kinds of goods. This means that relative local prices in CC for agiven product can be expected to vary from place to place. This may in turn mean that consumption patterns will vary somewhat between locales, which is predictable and not necessarily a problem. Generally speaking, a localization of resource flows can be expected to result in a more diverse pattern of calibration to local resource endowments, as in premodern contexts. The proposed system allows for considerable flexibility in terms of the geographical definition of what is categorized as local, depending on such conditions. In a fertile agricultural region, the radius for local produce may be defined, for instance, as 20 km, whereas in a less fertile or urban area, it may be 50 km. People living in urban centers are faced with a particular challenge. The reform would encourage an increased production of foodstuffs within and in the vicinity of urban areas, which in the long run may also affect urban planning. People might also choose to move to the countryside, where the range of subsistence goods that can be purchased with CC will tend to be greater. In the long run, the reform can be expected to encourage a better fit between the distribution of resources (such as agricultural land) and demography. This is fully in line with the intention of reducing long-distance transports of necessities.
What would the consequences be if people converted resources from one currency sphere into products or services sold in another? It seems unfeasible to monitor and regulate the use of distant imports (such as machinery and fuels) in producing produce for local markets, but as production for local markets is remunerated in CC, this should constitute a disincentive to invest regular money in such production processes. Production for local consumption can thus be expected to rely mostly – and increasingly – on local labor and other resource inputs.

submitted by anthropoz to sustainability [link] [comments]

A realistic way forwards (long, but I believe important)

Most of us have overlooked a fundamental problem that is currently causing an insurmountable obstacle to building a fairer and more sustainable world. We are very familiar with the thing in question, but its problematic nature has been hidden from us by a powerful illusion. We think the problem is capitalism, but capitalism is just the logical outcome of aggregate human decisions about how to manage money. The fundamental problem is money itself, or more specifically general purpose money and the international free market which allows you to sell a chunk of rainforest and use the money to buy a soft drink factory. (You can use the same sort of money to sell anything and buy anything, anywhere in the world, and until recently there was no alternative at all. Bitcoin is now an alternative, but is not quite what we are looking for.) The illusion is that because market prices are free, and nobody is forced into a transaction, those prices must be fair – that the exchange is equitable. The truth is that the way the general money globalised free market system works means that even though the prices are freely determined, there is still an unequal flow of natural resources from poor parts of the world to rich parts. This means the poor parts will always remain poor, and resources will continue to accumulate in the large, unsustainable cities in rich countries. In other words, unless we re-invent money, we cannot overturn capitalism, and that means we can't build a sustainable civilisation.
Why does this matter? What use is it realising that general purpose money is at the root of our problems when we know that the rich and powerful people who run this world will do everything in their power to prevent the existing world system being reformed? They aren't just going to agree to get rid of general purpose money and economic globalisation. It's like asking them to stop pursuing growth: they can't even imagine how to do it, and don't want to. So how does this offer us a way forwards?
Answer: because the two things in question – our monetary system and globalisation – look like being among the first casualties of collapse. Globalisation is already going into reverse (see brexit, Trump's protectionism) and our fiat money system is heading towards a debt/inflation implosion.
It looks highly likely that the scenario going forwards will be of increasing monetary and economic chaos. Fiat money systems have collapsed many times before, but never a global system of fiat currencies floating against each other. But regardless of how may fiat currencies collapse, or how high the price of gold goes in dollars, it is not clear what the system would be replaced with. Can we just go back to the gold standard? It is possible, but people will be desperately looking for other solutions, and the people in power might also be getting desperate.
So what could replace it? What is needed is a new sort of complementary money system which both
(a) addresses the immediate economic problems of people suffering from symptoms of economic and general collapse and
(b) provides a long-term framework around which a new sort of economy can emerge – an economy which is adapted to deglobalisation and degrowth.
I have been searching for answers to this question for some time, and have now found what I was looking for. It is explained in this recently published academic book, and this paper by the same professor of economic anthropology (Alf Hornborg). The answer is the creation of a new sort of money, but it is critically important exactly how this is done. Local currencies like the Bristol Pound do not challenge globalisation. What we need is a new sort of national currency. This currency would be issued as a UBI, but only usable to buy products and services originating within an adjustable radius. This would enable a new economy to emerge. It actually resists globalisation and promotes the growth of a new sort of economy where sustainability is built on local resources and local economic activity. It would also reverse the trend of population moving from poor rural areas and towns, to cities. It would revitalise the “left behind” parts of the western world, and put the brakes on the relentless flow of natural resources and “embodied cheap labour” from the poor parts of the world to the rich parts. It would set the whole system moving towards a more sustainable and fairer state.
This may sound unrealistic, but please give it a chance. I believe it offers a way forwards that can
(a) unite disparate factions trying to provoke systemic change, including eco-marxists, greens, posthumanists and anti-globalist supporters of “populist nationalism”, as well as large numbers of confused and worried "ordinary" people. The only people who really stand to lose are the supporters of global big business and the 1%.
(b) offers a realistic alternative to a money system heading towards collapse, and to which currently no other realistic alternative is being proposed.
In other words, this offers a realistic way forwards not just right now but through much of the early stages of collapse. It is likely to become both politically and economically viable within the forseeable future. It does, though, require some elements of the left to abandon its globalist ideals. It will have to embrace a new sort of nationalism. And it will require various groups who are doing very well out of the current economic system to realise that it is doomed.
Here is an FAQ (from the paper).
What is a complementary currency? It is a form of money that can be used alongside regular money.
What is the fundamental goal of this proposal? The two most fundamental goals motivating this proposal are to insulate local human subsistence and livelihood from the vicissitudes of national and international economic cycles and financial speculation, and to provide tangible and attractive incentives for people to live and consume more sustainably. It also seeks to provide authorities with a means to employ social security expenditures to channel consumption in sustainable directions and encourage economic diversity and community resilience at the local level.
Why should the state administrate the reform? The nation is currently the most encompassing political entity capable of administrating an economic reform of this nature. Ideally it is also subservient to the democratic decisions of its population. The current proposal is envisaged as an option for European nations, but would seem equally advantageous for countries anywhere. If successfully implemented within a particular nation or set of nations, the system can be expected to be emulated by others. Whereas earlier experiments with alternative currencies have generally been local, bottom-up initiatives, a state-supported program offers advantages for long-term success. Rather than an informal, marginal movement connected to particular identities and transient social networks, persisting only as long as the enthusiasm of its founders, the complementary currency advocated here is formalized, efficacious, and lastingly fundamental to everyone's economy.
How is local use defined and monitored? The complementary currency (CC) can only be used to purchase goods and services that are produced within a given geographical radius of the point of purchase. This radius can be defined in terms of kilometers of transport, and it can vary between different nations and regions depending on circumstances. A fairly simple way of distinguishing local from non-local commodities would be to label them according to transport distance, much as is currently done regarding, for instance, organic production methods or "fair trade." Such transport certification would of course imply different labelling in different locales.
How is the complementary currency distributed? A practical way of organizing distribution would be to provide each citizen with a plastic card which is electronically charged each month with the sum of CC allotted to him or her.
Who are included in the category of citizens? A monthly CC is provided to all inhabitants of a nation who have received official residence permits.
What does basic income mean? Basic income is distributed without any requirements or duties to be fulfilled by the recipients. The sum of CC paid to an individual each month can be determined in relation to the currency's purchasing power and to the individual's age. The guiding principle should be that the sum provided to each adult should be sufficient to enable basic existence, and that the sum provided for each child should correspond to the additional household expenses it represents.
Why would people want to use their CC rather than regular money? As the sum of CC provided each month would correspond to purchases representing a claim on his or her regular budget, the basic income would liberate a part of each person's regular income and thus amount to substantial purchasing power, albeit restricted only to local purchases. The basic income in CC would reduce a person's dependence on wage labor and the risks currently associated with unemployment. It would encourage social cooperation and a vitalization of community.
Why would businesses want to accept payment in CC? Business entrepreneurs can be expected to respond rapidly to the radically expanded demand for local products and services, which would provide opportunities for a diverse range of local niche markets. Whether they receive all or only a part of their income in the form of CC, they can choose to use some of it to purchase tax-free local labor or other inputs, and to request to have some of it converted by the authorities to regular currency (see next point).
How is conversion of CC into regular currency organized? Entrepreneurs would be granted the right to convert some of their CC into regular currency at exchange rates set by the authorities.The exchange rate between the two currencies can be calibrated so as to compensate the authorities for loss of tax revenue and to balance the in- and outflows of CC to the state. The rate would thus amount to a tool for determining the extent to which the CC is recirculated in the local economy, or returned to the state. This is important in order to avoid inflation in the CC sector.
Would there be interest on sums of CC owned or loaned? There would be no interest accruing on a sum of CC, whether a surplus accumulating in an account or a loan extended.
How would saving and loaning of CC be organized? The formal granting of credit in CC would be managed by state authorities and follow the principle of full reserve banking, so that quantities of CC loaned would never exceed the quantities saved by the population as a whole.
Would the circulation of CC be subjected to taxation? No.
Why would authorities want to encourage tax-free local economies? Given the beneficial social and ecological consequences of this reform, it is assumed that nation states will represent the general interests of their electorates and thus promote it. Particularly in a situation with rising fiscal deficits, unemployment, health care, and social security expenditures, the proposed reform would alleviate financial pressure on governments. It would also reduce the rising costs of transport infrastructure, environmental protection, carbon offsetting, and climate change adaptation. In short, the rising costs and diminishing returns on current strategies for economic growth can be expected to encourage politicians to consider proposals such as this, as a means of avoiding escalating debt or even bankruptcy.
How would the state's expenditures in CC be financed? As suggested above, much of these expenditures would be balanced by the reduced costs for social security, health care, transport infrastructure, environmental protection, carbon offsetting, and climate change adaptation. As these savings may take time to materialize, however, states can choose to make a proportion of their social security payments (pensions, unemployment insurance, family allowance, etc.) in the form of CC. As between a third and half of some nations' annual budgets are committed to social security, this represents a significant option for financing the reform, requiring no corresponding tax levies.
What are the differences between this CC and the many experiments with local currencies? This proposal should not be confused with the notion, or with the practical operation, of local currencies, as it does not imply different currencies in different locales but one national,complementary currency for local use. Nor is it locally initiated and promoted in opposition to theregular currency, but centrally endorsed and administrated as an accepted complement to it. Most importantly, the alternative currency can only be used to purchase products and services originating from within a given geographical range, a restriction which is not implemented in experiments with Local Exchange Trading Systems (LETS). Finally, the CC is provided as a basic income to all residents of a nation, rather than only earned in proportion to the extent to which a person has made him- or herself useful in the local economy.
What would the ecological benefits be? The reform would radically reduce the demand for long-distance transport, the production of greenhouse gas emissions, consumption of energy and materials, and losses of foodstuffs through overproduction, storage, and transport. It would increase recycling of nutrients and packaging materials, which means decreasing leakage of nutrients and less garbage. It would reduce agricultural intensification, increase biodiversity, and decrease ecological degradation and vulnerability.
What would the societal benefits be? The reform would increase local cooperation, decrease social marginalization and addiction problems, provide more physical exercise, improve psycho-social and physical health, and increase food security and general community resilience. It would decrease the number of traffic accidents, provide fresher and healthier food with less preservatives, and improved contact between producers and consumers.
What would the long-term consequences be for the economy? The reform would no doubt generate radical transformations of the economy, as is precisely the intention. There would be a significant shift of dominance from transnational corporations founded on financial speculation and trade in industrially produced foodstuffs, fuels, and other internationally transported goods to locally diverse producers and services geared to sustainable livelihoods. This would be a democratic consequence of consumer power, rather than of legislation. Through a relatively simple transformation of the conditions for market rationality, governments can encourage new and more sustainable patterns of consumer behavior. In contrast to much of the drastic and often traumatic economic change of the past two centuries, these changes would be democratic and sustainable and would improve local and national resilience.
Why should society want to encourage people to refrain from formal employment? It is increasingly recognized that full or high employment cannot be a goal in itself, particularly if it implies escalating environmental degradation and energy and material throughput. Well-founded calls are thus currently made for degrowth, i.e. a reduction in the rate of production of goods and services that are conventionally quantified by economists as constitutive of GDP. Whether formal unemployment is the result of financial decline, technological development, or intentional policy for sustainability, no modern nation can be expected to leave its citizens economically unsupported. To subsist on basic income is undoubtedly more edifying than receiving unemployment insurance; the CC system encourages useful community cooperation and creative activities rather than destructive behavior that may damage a person's health.
Why should people receive an income without working? As observed above, modern nations will provide for their citizens whether they are formally employed or not. The incentive to find employment should ideally not be propelled only by economic imperatives, but more by the desire to maintain a given identity and to contribute creatively to society. Personal liberty would be enhanced by a reform which makes it possible for people to choose to spend (some of) their time on creative activities that are not remunerated on the formal market, and to accept the tradeoff implied by a somewhat lower economic standard. People can also be expected to devote a greater proportion of their time to community cooperation, earning additional CC, which means that they will contribute more to society – and experience less marginalization – than the currently unemployed.
Would savings in CC be inheritable? No.
How would transport distances of products and services be controlled? It is reasonable to expect the authorities to establish a special agency for monitoring and controlling transport distances. It seems unlikely that entrepreneurs would attempt to cheat the system by presenting distantly produced goods as locally produced, as we can expect income in regular currency generally to be preferable to income in CC. Such attempts would also entail transport costs which should make the cargo less competitive in relation to genuinely local produce, suggesting that the logic of local market mechanisms would by and large obviate the problem.
How would differences in local conditions (such as climate, soils, and urbanism) be dealt with? It is unavoidable that there would be significant variation between different locales in terms of the conditions for producing different kinds of goods. This means that relative local prices in CC for agiven product can be expected to vary from place to place. This may in turn mean that consumption patterns will vary somewhat between locales, which is predictable and not necessarily a problem. Generally speaking, a localization of resource flows can be expected to result in a more diverse pattern of calibration to local resource endowments, as in premodern contexts. The proposed system allows for considerable flexibility in terms of the geographical definition of what is categorized as local, depending on such conditions. In a fertile agricultural region, the radius for local produce may be defined, for instance, as 20 km, whereas in a less fertile or urban area, it may be 50 km. People living in urban centers are faced with a particular challenge. The reform would encourage an increased production of foodstuffs within and in the vicinity of urban areas, which in the long run may also affect urban planning. People might also choose to move to the countryside, where the range of subsistence goods that can be purchased with CC will tend to be greater. In the long run, the reform can be expected to encourage a better fit between the distribution of resources (such as agricultural land) and demography. This is fully in line with the intention of reducing long-distance transports of necessities.
What would the consequences be if people converted resources from one currency sphere into products or services sold in another? It seems unfeasible to monitor and regulate the use of distant imports (such as machinery and fuels) in producing produce for local markets, but as production for local markets is remunerated in CC, this should constitute a disincentive to invest regular money in such production processes. Production for local consumption can thus be expected to rely mostly – and increasingly – on local labor and other resource inputs.
submitted by anthropoz to ExtinctionRebellion [link] [comments]

How Blockchain.com harms the cryptocurrency community

How Blockchain.com harms the cryptocurrency community
This post has been written to draw Blockchain.com's attention to the issues of its product.
Blockchain.com (formerly Blockchain.info) was founded in 2011 and with no doubt has helped the Bitcoin community to create a block explorer and has proven itself as a valuable service. Millions of people from all over the world use their wallet. However, time goes on, Bitcoin develops, but one of the main cryptocurrency companies not only slows down the process of its development, but also discredits the usability of cryptocurrencies. Why is that? We have tried to explain that in this post.
https://preview.redd.it/i0yk7qraqkw41.jpg?width=1024&format=pjpg&auto=webp&s=963dc18551d2900bca456bfa3a6cfd3636c7c93c

1. Lack of Segwit Address Support

This is the most painful problem for our service. To receive cryptocurrency we use segwit addresses by default. If a customer contacts our support, we can of course change an address in an order to P2SH (the one that begins with number "3"), but it reduces the usability of the service. Why don't we use P2SH by default? It is less beneficial both for us and for our client, as the cost of the consolidation of the transaction is taken into account when calculating the exchange rate. With a high network load and with orders for a small amount, the commission becomes significant. To compare — segwit addresses (or Bech32 that starts with "bc1") are 15% more advantageous than P2SH.
Segwit (Segregated Witness) was activated in 2017. At the end of the same year the CEO of Blockchain.info announced its support starting from (most likely) 2018. We can understand certain fears at the beginning of the way, as the company's security system is for sure not that bad. However more than 2 years have passed since then and that is a lot for the crypto world.

2. Using Legacy (P2PKH) Addresses Only

As of now only a P2PKH address (that starts with number "1") is used in the Blockchain.com wallet to receive cryptocurrency. Why is that bad? It is unfavorable for the users of this wallet. They spend 29% more than those using P2SH addresses.

3. Confusion with PAX and USD Digital

Changing the names of the currencies from one to another only in a Blockchain.com wallet is a rather strange decision. The key problem is that nowhere in the wallet are there any clues that this is an ERC-20 PAX token on the Ethereum blockchain. New wallet users will most likely be confused by this.
We sometimes get questions: "do we have USD Digital to buy or to sell?" and our technical support is forced to explain that it is PAX.

4. Incompetence of mobile application developers

In fact, this post was inspired by this particular problem. We will not focus on performance or shortcomings, we will just tell you about the main issue.
It is worth starting with questions. What problem does a mobile application solve when a person needs to pay for something? What is the best way to fill in the recipient address and the payment amount on the smartphone? Answer: QR code.
Scanning the QR code in this application is done not just badly, but also in such a way that creates maximum number of problems for a user.
The fact is that in the Android application when scanning code with the bitcoin:
?amount=, the value of the amount to be inserted in the corresponding field may differ from the encoded value by 1-100 Satoshi! Our team simply does not understand how this was implemented.
Do not believe? Try it yourself. Amount to insert — 0.00143452 BTC
bitcoin:3LAxDr5CxwBJT4tCejV8rpAXETz7bUH3tG?amount=0.00143452
After receiving information on such a problem from our users, we began to monitor updates to this application. After 2 updates had come out, the problem was not fixed.
And what about iOS? When scanning a QR code with a sum in iOS , the sum value is simply not inserted into the field! No comments. Bravo!
Blockchain.com wallet has different currencies, not just Bitcoin. Let's try Ethereum. You want to scan QR codes for Ethereum payment with the relevant sum? There is no such possibility. The application will respond with an "Invalid address" to all such codes:
  • eth:
    ?amount=
  • ether:
    ?amount=
  • ethereum:
    ?amount=
For BitcoinCash, the task of identifying the amount in the line is also an impossible task. Line with wallet bitcoincash:qpk0689rt3xkzlw8ap4yy72amp2zpws6zujkcgavptconsidered true, but with the amount bitcoincash:qpk0689rt3xkzlw8ap4yy72amp2zpws6zujkcgavpt?amount=0.1 — "Invalid address"
But there are applications that understand all such formats, or at least one of them. The string parsing function is pretty trivial and should not be a problem for the developer.
This article has been written based on the experience of using the application of the members of our team (who have used it for many years) and our users.
We encourage Blockchain.com to fix at least 3 of the 4 problems that we covered in this article. We still hope that the company will work on the bugs and will earn back trust of its users.
In the meantime — use other applications! ;)
The post is published on our blog:https://fixedfloat.com/blog/guides/how-blockchain-com-harms
submitted by FixedFloat to Bitcoin [link] [comments]

Bitcoin (BTC)A Peer-to-Peer Electronic Cash System.

Bitcoin (BTC)A Peer-to-Peer Electronic Cash System.
  • Bitcoin (BTC) is a peer-to-peer cryptocurrency that aims to function as a means of exchange that is independent of any central authority. BTC can be transferred electronically in a secure, verifiable, and immutable way.
  • Launched in 2009, BTC is the first virtual currency to solve the double-spending issue by timestamping transactions before broadcasting them to all of the nodes in the Bitcoin network. The Bitcoin Protocol offered a solution to the Byzantine Generals’ Problem with a blockchain network structure, a notion first created by Stuart Haber and W. Scott Stornetta in 1991.
  • Bitcoin’s whitepaper was published pseudonymously in 2008 by an individual, or a group, with the pseudonym “Satoshi Nakamoto”, whose underlying identity has still not been verified.
  • The Bitcoin protocol uses an SHA-256d-based Proof-of-Work (PoW) algorithm to reach network consensus. Its network has a target block time of 10 minutes and a maximum supply of 21 million tokens, with a decaying token emission rate. To prevent fluctuation of the block time, the network’s block difficulty is re-adjusted through an algorithm based on the past 2016 block times.
  • With a block size limit capped at 1 megabyte, the Bitcoin Protocol has supported both the Lightning Network, a second-layer infrastructure for payment channels, and Segregated Witness, a soft-fork to increase the number of transactions on a block, as solutions to network scalability.

https://preview.redd.it/s2gmpmeze3151.png?width=256&format=png&auto=webp&s=9759910dd3c4a15b83f55b827d1899fb2fdd3de1

1. What is Bitcoin (BTC)?

  • Bitcoin is a peer-to-peer cryptocurrency that aims to function as a means of exchange and is independent of any central authority. Bitcoins are transferred electronically in a secure, verifiable, and immutable way.
  • Network validators, whom are often referred to as miners, participate in the SHA-256d-based Proof-of-Work consensus mechanism to determine the next global state of the blockchain.
  • The Bitcoin protocol has a target block time of 10 minutes, and a maximum supply of 21 million tokens. The only way new bitcoins can be produced is when a block producer generates a new valid block.
  • The protocol has a token emission rate that halves every 210,000 blocks, or approximately every 4 years.
  • Unlike public blockchain infrastructures supporting the development of decentralized applications (Ethereum), the Bitcoin protocol is primarily used only for payments, and has only very limited support for smart contract-like functionalities (Bitcoin “Script” is mostly used to create certain conditions before bitcoins are used to be spent).

2. Bitcoin’s core features

For a more beginner’s introduction to Bitcoin, please visit Binance Academy’s guide to Bitcoin.

Unspent Transaction Output (UTXO) model

A UTXO transaction works like cash payment between two parties: Alice gives money to Bob and receives change (i.e., unspent amount). In comparison, blockchains like Ethereum rely on the account model.
https://preview.redd.it/t1j6anf8f3151.png?width=1601&format=png&auto=webp&s=33bd141d8f2136a6f32739c8cdc7aae2e04cbc47

Nakamoto consensus

In the Bitcoin network, anyone can join the network and become a bookkeeping service provider i.e., a validator. All validators are allowed in the race to become the block producer for the next block, yet only the first to complete a computationally heavy task will win. This feature is called Proof of Work (PoW).
The probability of any single validator to finish the task first is equal to the percentage of the total network computation power, or hash power, the validator has. For instance, a validator with 5% of the total network computation power will have a 5% chance of completing the task first, and therefore becoming the next block producer.
Since anyone can join the race, competition is prone to increase. In the early days, Bitcoin mining was mostly done by personal computer CPUs.
As of today, Bitcoin validators, or miners, have opted for dedicated and more powerful devices such as machines based on Application-Specific Integrated Circuit (“ASIC”).
Proof of Work secures the network as block producers must have spent resources external to the network (i.e., money to pay electricity), and can provide proof to other participants that they did so.
With various miners competing for block rewards, it becomes difficult for one single malicious party to gain network majority (defined as more than 51% of the network’s hash power in the Nakamoto consensus mechanism). The ability to rearrange transactions via 51% attacks indicates another feature of the Nakamoto consensus: the finality of transactions is only probabilistic.
Once a block is produced, it is then propagated by the block producer to all other validators to check on the validity of all transactions in that block. The block producer will receive rewards in the network’s native currency (i.e., bitcoin) as all validators approve the block and update their ledgers.

The blockchain

Block production

The Bitcoin protocol utilizes the Merkle tree data structure in order to organize hashes of numerous individual transactions into each block. This concept is named after Ralph Merkle, who patented it in 1979.
With the use of a Merkle tree, though each block might contain thousands of transactions, it will have the ability to combine all of their hashes and condense them into one, allowing efficient and secure verification of this group of transactions. This single hash called is a Merkle root, which is stored in the Block Header of a block. The Block Header also stores other meta information of a block, such as a hash of the previous Block Header, which enables blocks to be associated in a chain-like structure (hence the name “blockchain”).
An illustration of block production in the Bitcoin Protocol is demonstrated below.

https://preview.redd.it/m6texxicf3151.png?width=1591&format=png&auto=webp&s=f4253304912ed8370948b9c524e08fef28f1c78d

Block time and mining difficulty

Block time is the period required to create the next block in a network. As mentioned above, the node who solves the computationally intensive task will be allowed to produce the next block. Therefore, block time is directly correlated to the amount of time it takes for a node to find a solution to the task. The Bitcoin protocol sets a target block time of 10 minutes, and attempts to achieve this by introducing a variable named mining difficulty.
Mining difficulty refers to how difficult it is for the node to solve the computationally intensive task. If the network sets a high difficulty for the task, while miners have low computational power, which is often referred to as “hashrate”, it would statistically take longer for the nodes to get an answer for the task. If the difficulty is low, but miners have rather strong computational power, statistically, some nodes will be able to solve the task quickly.
Therefore, the 10 minute target block time is achieved by constantly and automatically adjusting the mining difficulty according to how much computational power there is amongst the nodes. The average block time of the network is evaluated after a certain number of blocks, and if it is greater than the expected block time, the difficulty level will decrease; if it is less than the expected block time, the difficulty level will increase.

What are orphan blocks?

In a PoW blockchain network, if the block time is too low, it would increase the likelihood of nodes producingorphan blocks, for which they would receive no reward. Orphan blocks are produced by nodes who solved the task but did not broadcast their results to the whole network the quickest due to network latency.
It takes time for a message to travel through a network, and it is entirely possible for 2 nodes to complete the task and start to broadcast their results to the network at roughly the same time, while one’s messages are received by all other nodes earlier as the node has low latency.
Imagine there is a network latency of 1 minute and a target block time of 2 minutes. A node could solve the task in around 1 minute but his message would take 1 minute to reach the rest of the nodes that are still working on the solution. While his message travels through the network, all the work done by all other nodes during that 1 minute, even if these nodes also complete the task, would go to waste. In this case, 50% of the computational power contributed to the network is wasted.
The percentage of wasted computational power would proportionally decrease if the mining difficulty were higher, as it would statistically take longer for miners to complete the task. In other words, if the mining difficulty, and therefore targeted block time is low, miners with powerful and often centralized mining facilities would get a higher chance of becoming the block producer, while the participation of weaker miners would become in vain. This introduces possible centralization and weakens the overall security of the network.
However, given a limited amount of transactions that can be stored in a block, making the block time too longwould decrease the number of transactions the network can process per second, negatively affecting network scalability.

3. Bitcoin’s additional features

Segregated Witness (SegWit)

Segregated Witness, often abbreviated as SegWit, is a protocol upgrade proposal that went live in August 2017.
SegWit separates witness signatures from transaction-related data. Witness signatures in legacy Bitcoin blocks often take more than 50% of the block size. By removing witness signatures from the transaction block, this protocol upgrade effectively increases the number of transactions that can be stored in a single block, enabling the network to handle more transactions per second. As a result, SegWit increases the scalability of Nakamoto consensus-based blockchain networks like Bitcoin and Litecoin.
SegWit also makes transactions cheaper. Since transaction fees are derived from how much data is being processed by the block producer, the more transactions that can be stored in a 1MB block, the cheaper individual transactions become.
https://preview.redd.it/depya70mf3151.png?width=1601&format=png&auto=webp&s=a6499aa2131fbf347f8ffd812930b2f7d66be48e
The legacy Bitcoin block has a block size limit of 1 megabyte, and any change on the block size would require a network hard-fork. On August 1st 2017, the first hard-fork occurred, leading to the creation of Bitcoin Cash (“BCH”), which introduced an 8 megabyte block size limit.
Conversely, Segregated Witness was a soft-fork: it never changed the transaction block size limit of the network. Instead, it added an extended block with an upper limit of 3 megabytes, which contains solely witness signatures, to the 1 megabyte block that contains only transaction data. This new block type can be processed even by nodes that have not completed the SegWit protocol upgrade.
Furthermore, the separation of witness signatures from transaction data solves the malleability issue with the original Bitcoin protocol. Without Segregated Witness, these signatures could be altered before the block is validated by miners. Indeed, alterations can be done in such a way that if the system does a mathematical check, the signature would still be valid. However, since the values in the signature are changed, the two signatures would create vastly different hash values.
For instance, if a witness signature states “6,” it has a mathematical value of 6, and would create a hash value of 12345. However, if the witness signature were changed to “06”, it would maintain a mathematical value of 6 while creating a (faulty) hash value of 67890.
Since the mathematical values are the same, the altered signature remains a valid signature. This would create a bookkeeping issue, as transactions in Nakamoto consensus-based blockchain networks are documented with these hash values, or transaction IDs. Effectively, one can alter a transaction ID to a new one, and the new ID can still be valid.
This can create many issues, as illustrated in the below example:
  1. Alice sends Bob 1 BTC, and Bob sends Merchant Carol this 1 BTC for some goods.
  2. Bob sends Carols this 1 BTC, while the transaction from Alice to Bob is not yet validated. Carol sees this incoming transaction of 1 BTC to him, and immediately ships goods to B.
  3. At the moment, the transaction from Alice to Bob is still not confirmed by the network, and Bob can change the witness signature, therefore changing this transaction ID from 12345 to 67890.
  4. Now Carol will not receive his 1 BTC, as the network looks for transaction 12345 to ensure that Bob’s wallet balance is valid.
  5. As this particular transaction ID changed from 12345 to 67890, the transaction from Bob to Carol will fail, and Bob will get his goods while still holding his BTC.
With the Segregated Witness upgrade, such instances can not happen again. This is because the witness signatures are moved outside of the transaction block into an extended block, and altering the witness signature won’t affect the transaction ID.
Since the transaction malleability issue is fixed, Segregated Witness also enables the proper functioning of second-layer scalability solutions on the Bitcoin protocol, such as the Lightning Network.

Lightning Network

Lightning Network is a second-layer micropayment solution for scalability.
Specifically, Lightning Network aims to enable near-instant and low-cost payments between merchants and customers that wish to use bitcoins.
Lightning Network was conceptualized in a whitepaper by Joseph Poon and Thaddeus Dryja in 2015. Since then, it has been implemented by multiple companies. The most prominent of them include Blockstream, Lightning Labs, and ACINQ.
A list of curated resources relevant to Lightning Network can be found here.
In the Lightning Network, if a customer wishes to transact with a merchant, both of them need to open a payment channel, which operates off the Bitcoin blockchain (i.e., off-chain vs. on-chain). None of the transaction details from this payment channel are recorded on the blockchain, and only when the channel is closed will the end result of both party’s wallet balances be updated to the blockchain. The blockchain only serves as a settlement layer for Lightning transactions.
Since all transactions done via the payment channel are conducted independently of the Nakamoto consensus, both parties involved in transactions do not need to wait for network confirmation on transactions. Instead, transacting parties would pay transaction fees to Bitcoin miners only when they decide to close the channel.
https://preview.redd.it/cy56icarf3151.png?width=1601&format=png&auto=webp&s=b239a63c6a87ec6cc1b18ce2cbd0355f8831c3a8
One limitation to the Lightning Network is that it requires a person to be online to receive transactions attributing towards him. Another limitation in user experience could be that one needs to lock up some funds every time he wishes to open a payment channel, and is only able to use that fund within the channel.
However, this does not mean he needs to create new channels every time he wishes to transact with a different person on the Lightning Network. If Alice wants to send money to Carol, but they do not have a payment channel open, they can ask Bob, who has payment channels open to both Alice and Carol, to help make that transaction. Alice will be able to send funds to Bob, and Bob to Carol. Hence, the number of “payment hubs” (i.e., Bob in the previous example) correlates with both the convenience and the usability of the Lightning Network for real-world applications.

Schnorr Signature upgrade proposal

Elliptic Curve Digital Signature Algorithm (“ECDSA”) signatures are used to sign transactions on the Bitcoin blockchain.
https://preview.redd.it/hjeqe4l7g3151.png?width=1601&format=png&auto=webp&s=8014fb08fe62ac4d91645499bc0c7e1c04c5d7c4
However, many developers now advocate for replacing ECDSA with Schnorr Signature. Once Schnorr Signatures are implemented, multiple parties can collaborate in producing a signature that is valid for the sum of their public keys.
This would primarily be beneficial for network scalability. When multiple addresses were to conduct transactions to a single address, each transaction would require their own signature. With Schnorr Signature, all these signatures would be combined into one. As a result, the network would be able to store more transactions in a single block.
https://preview.redd.it/axg3wayag3151.png?width=1601&format=png&auto=webp&s=93d958fa6b0e623caa82ca71fe457b4daa88c71e
The reduced size in signatures implies a reduced cost on transaction fees. The group of senders can split the transaction fees for that one group signature, instead of paying for one personal signature individually.
Schnorr Signature also improves network privacy and token fungibility. A third-party observer will not be able to detect if a user is sending a multi-signature transaction, since the signature will be in the same format as a single-signature transaction.

4. Economics and supply distribution

The Bitcoin protocol utilizes the Nakamoto consensus, and nodes validate blocks via Proof-of-Work mining. The bitcoin token was not pre-mined, and has a maximum supply of 21 million. The initial reward for a block was 50 BTC per block. Block mining rewards halve every 210,000 blocks. Since the average time for block production on the blockchain is 10 minutes, it implies that the block reward halving events will approximately take place every 4 years.
As of May 12th 2020, the block mining rewards are 6.25 BTC per block. Transaction fees also represent a minor revenue stream for miners.
submitted by D-platform to u/D-platform [link] [comments]

Subreddit Stats: CryptoCurrency top posts from 2017-06-16 to 2020-03-29 14:02 PDT

Period: 1017.08 days
Submissions Comments
Total 934 259273
Rate (per day) 0.92 254.49
Unique Redditors 752 54249
Combined Score 2439059 2983723

Top Submitters' Top Submissions

  1. 55770 points, 8 submissions: DestroyerOfShitcoins
    1. CryptoNick is deleting all of his BitConnect videos, and so are his buddies. Please never forget what he and his cohorts did to so many people, and how much money those people lost in the process thanks to CryptoNick, Trevon James, and Craig Grant! (26497 points, 3056 comments)
    2. Listen up folks, if you "did", or still do promote cryptocurrency related scams, you will be called out on it via this sub-Reddit. We don't care about you, or your ill-gotten gains, we care about the general well-being of our community first and foremost. (17888 points, 1277 comments)
    3. So no one else finds it a bit odd that Verge is actually going up in price in a bear market, after a hack attack, after being outed for paying McAfee to promote it, and after the 1 developer begged for money from his own community to allegedly help pay his taxes? (2548 points, 867 comments)
    4. Not 2 days after the fall of BitConnect, and Trevon James is already promoting his next Ponzi scheme affiliate program in his latest video called Davor... the nerve of this guy! (2230 points, 412 comments)
    5. Cryptonick is selling a cryptocurrency course for $497, and yet he doesn't even know the difference between a public key and a private key... welcome to crypto folks! (1803 points, 238 comments)
    6. You guys have to stop expecting any of these business men of old to champion "decentralized" cryptocurrencies... it's just not going to happen. (1790 points, 449 comments)
    7. The bulls are back baby, and Ethereum is taking over the pairing business on exchanges... it's about time! (1642 points, 733 comments)
    8. Trevon James, legendary BitConnect scammer gets caught trying to cheat on Steemit, by up-voting shit on a fake account to make money... has this guy ever done anything honest in his entire life? (1372 points, 192 comments)
  2. 47580 points, 13 submissions: coinmoon_com
    1. Nasdaq is open to becoming cryptocurrency exchange, CEO says (17168 points, 830 comments)
    2. Facebook bans crypto advertising. Then says it’s working on its own crypto coin. Hypocrites! (6036 points, 335 comments)
    3. JUSTICE: Bitconnect Leader Arrested (4283 points, 315 comments)
    4. Apparently there is no SEC hearing on Ethereum today and it is all just orchestrated FUD. (2863 points, 437 comments)
    5. Nasdaq May Launch Bitcoin Trading in October 2018 (2650 points, 182 comments)
    6. UPbit audit confirms South Korea’s biggest Cryptocurrency Exchange was not at fault. It was all just FUD! (2328 points, 110 comments)
    7. LET THIS SINK IN: "Bitcoin has the potential to become the first worldwide currency and we're trying to make that happen" - NYSE Owner (2224 points, 587 comments)
    8. Coinbase Survey Shows 18% of all US Students Now Own Cryptocurrency (1793 points, 331 comments)
    9. Beyond Huge! With $10.7 trillion worth of assets under custody and administration, Northern Trust opens doors to Cryptocurrency hedge funds (1770 points, 143 comments)
    10. CNN Video: "People around the world are starting to trust Bitcoin more than the Central Banks". Damn Right! (1679 points, 434 comments)
  3. 44336 points, 8 submissions: arsonbunny
    1. Why we won't have a long term bear market, and how to systematically pick your future investments in crypto (14599 points, 917 comments)
    2. I've created an Excel Crypto Portfolio Tracker that draws live prices and coin data from CoinMarketCap.com. Here is how to create your own. (12287 points, 687 comments)
    3. Want to start fresh after the crypto crash? Here is a comprehensive guide on how to invest and prosper over the long term. (6087 points, 636 comments)
    4. This sub is a mess and needs to get out of the anger stage: How to move forward from the crash if you're a bagholder (3356 points, 392 comments)
    5. Understanding Tether: Why it accounts for a substantial part of the crypto market cap and why its the #1 outstanding issue in crypto markets today (2703 points, 709 comments)
    6. How and why exchanges are manipulating the price in order to capitalize on the new market dynamics (2361 points, 491 comments)
    7. I built these 3 fundamental valuation models for Bitcoin in Excel. Details in the comment. (1507 points, 109 comments)
    8. Understanding Bitcoin Futures: How they work and why they are NOT going to crash the crypto market (1436 points, 122 comments)
  4. 25819 points, 15 submissions: Kashpantz
    1. When you are a known scammer in the crypto space and get called out by one of your investors. Exciting times indeed. (2568 points, 237 comments)
    2. The Gloves Are Off. Ripple laying into J.P Morgan As They Enter The Crypto Space. (2091 points, 555 comments)
    3. The Scam That Is Volitility & Fees (2077 points, 322 comments)
    4. Crypto Explained By The Simpsons (2005 points, 134 comments)
    5. When Investingin In The Stocks Seems Crazy. (1983 points, 284 comments)
    6. Pretty much this sums it up for crypto and politics. (1831 points, 118 comments)
    7. Don't look at ATHs, the story starts when you look at ATLs. (1783 points, 223 comments)
    8. When things go bad in Argentina... Use Crypto (1782 points, 195 comments)
    9. Is this unjust? Where a bank can shut you down for investing in the cannabis industry even if it's legal in your country or state? A perfect use case for crypto where it is borderless and censorship resistant. No longer the banks are the gatekeepers of our own money. (1658 points, 280 comments)
    10. Some Simple Tips to Avoid Traps in the Crypto Sphere. (1558 points, 251 comments)
  5. 20147 points, 1 submission: Suuperdad
    1. I will tell you exactly what is going on here, this is critical information to understand if you are going to make money in this space. How prices work, and what moves them - and it's not money invested/withdrawn. (20147 points, 1442 comments)
  6. 19965 points, 1 submission: Gabriel-Lewis
    1. Robinhood is launching a Crypto Trading app to compete with Coinbase (19965 points, 3895 comments)
  7. 19632 points, 1 submission: sash187
    1. Checkmate, Bill. (19632 points, 1097 comments)
  8. 18484 points, 1 submission: x2P
    1. Delta's app store description seems appropriate today. (18484 points, 317 comments)
  9. 17374 points, 4 submissions: Rupispupis
    1. When you're holding altcoins but your friends only heard of Bitcoin and all congratulate you because they think you had an incredible day (12352 points, 587 comments)
    2. It'd be sad if it wasn't funny (2174 points, 108 comments)
    3. Brave uncovers widespread surveillance of UK citizens by private companies embedded on UK council websites (1625 points, 80 comments)
    4. Ask, and ye shall receive (1223 points, 93 comments)
  10. 17265 points, 2 submissions: mtimetraveller
    1. The true power of Bitcoin 🔥 (14638 points, 1274 comments)
    2. Microsoft Excel recognizes Bitcoin as a currency (2627 points, 163 comments)

Top Commenters

  1. arsonbunny (13668 points, 114 comments)
  2. martinkarolev (5448 points, 48 comments)
  3. hanzyfranzy (5299 points, 6 comments)
  4. Toyake (5151 points, 254 comments)
  5. Bungwads (5078 points, 1 comment)
  6. throwawayLouisa (4784 points, 408 comments)
  7. Raymikqwer (4768 points, 71 comments)
  8. JohnDalysJohn (4768 points, 2 comments)
  9. Thefriendlyfaceplant (4410 points, 324 comments)
  10. rockyrainy (4306 points, 117 comments)

Top Submissions

  1. CryptoNick is deleting all of his BitConnect videos, and so are his buddies. Please never forget what he and his cohorts did to so many people, and how much money those people lost in the process thanks to CryptoNick, Trevon James, and Craig Grant! by DestroyerOfShitcoins (26497 points, 3056 comments)
  2. I will tell you exactly what is going on here, this is critical information to understand if you are going to make money in this space. How prices work, and what moves them - and it's not money invested/withdrawn. by Suuperdad (20147 points, 1442 comments)
  3. Robinhood is launching a Crypto Trading app to compete with Coinbase by Gabriel-Lewis (19965 points, 3895 comments)
  4. Checkmate, Bill. by sash187 (19632 points, 1097 comments)
  5. Delta's app store description seems appropriate today. by x2P (18484 points, 317 comments)
  6. Listen up folks, if you "did", or still do promote cryptocurrency related scams, you will be called out on it via this sub-Reddit. We don't care about you, or your ill-gotten gains, we care about the general well-being of our community first and foremost. by DestroyerOfShitcoins (17888 points, 1277 comments)
  7. Nasdaq is open to becoming cryptocurrency exchange, CEO says by coinmoon_com (17168 points, 830 comments)
  8. The true power of Bitcoin 🔥 by mtimetraveller (14638 points, 1274 comments)
  9. Why we won't have a long term bear market, and how to systematically pick your future investments in crypto by arsonbunny (14599 points, 917 comments)
  10. Great news from Korea! Banks will allow cryptocurrency trading again from today and next week account registration is opened again. by riverflop (13419 points, 462 comments)

Top Comments

  1. 5078 points: Bungwads's comment in Checkmate, Bill.
  2. 4792 points: hanzyfranzy's comment in Bitcoin breaches $4000 in 15 minutes. What is happening 😳
  3. 3630 points: eNte19's comment in Enjoy the massacre. It could be a once in life opportunity.
  4. 3533 points: sakata_gintoki113's comment in Russian nuclear scientists arrested for trying to use one of Russia's most powerful supercomputers to mine Bitcoins
  5. 3462 points: JohnDalysJohn's comment in CryptoNick is deleting all of his BitConnect videos, and so are his buddies. Please never forget what he and his cohorts did to so many people, and how much money those people lost in the process thanks to CryptoNick, Trevon James, and Craig Grant!
  6. 2988 points: Xgatt's comment in CryptoNick is deleting all of his BitConnect videos, and so are his buddies. Please never forget what he and his cohorts did to so many people, and how much money those people lost in the process thanks to CryptoNick, Trevon James, and Craig Grant!
  7. 2909 points: dankmeter's comment in Coinbase/GDAX Warning - $50,000 Wire DEPOSIT Missing Since December 12th
  8. 2884 points: regecide2025's comment in No one was complaining about "manipulation" when it was going up from 2500 to 20,000 in less than 6 months.
  9. 2854 points: harambissimo's comment in Who would win?
  10. 2781 points: LivingWithWhales's comment in ETH has passed $900 and has retaken the #2 market cap spot from XRP
Generated with BBoe's Subreddit Stats
submitted by subreddit_stats to subreddit_stats [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

DIFFERENCE BETWEEN FIAT AND CRYPTO

• Fiat Currency is backed by Governments/Countries itself. What determines the value of a currency is the economic health, demand, growth, political stability to name a few, of the respective country. Before 1930, most fiat currencies were backed by gold and silver.
• Since 1971, U.S. citizens have been able to utilize Federal Reserve Notes as the only form of money that for the first time had no currency with any gold or silver backing. This is where you get the saying that U.S. dollars are backed by the “full faith and credit” of the U.S. Government - quoted in google.com.
• What backs crypto value is purely supply and demand. The demand creation of a crypto is its sole objective. To create demand, the crypto has to have a purpose. And most purpose commonly promoted is utility. The number of ways you can utilize the said crypto. The more utilization factors the more demand there is for it.
• There are other ways to substantiate value of a crypto and that is to back the crypto with a 1 to 1 ratio in assets or in USD. Then the question is, how 3,000 crypto currencies in circulation be monetary eco sustainable? Can anyone imagine walking into McDonald and view a chart of 3,000 different pricing? Which also means the crypto is a payment gateway pegging against USD instead of bearing any true characteristic of a currency.
• A country’s currency is in its own legit form of legal tender, the only currency acceptable under financial sovereigns of a country. People in the world must be made to understand that. Retailers in Thailand cannot put up products price tags in EUROS/USD, it is illegal. It has to be in Thai Baht.
• It is hardly imaginable for everyone in the world to retail with a Crypto-Currencies at a rate of 7 transactions per second. When mining nodes are reduced due to non-performing mining ratio, mining blocks in the Blockchain will significantly be limited too, rendering delays in transactions while usage increases.
• In time to come, as trends of crypto picks up, Thailand can issue BAHT COIN or UK the STERLING COIN, exactly what China wishes to do. Digital RMB, but would such crypto currencies be fully decentralized? We all have our answers. Absurd to even think of producing Thai Baht, Pound Sterling or Chinese Yuan at the cost of electricity. It is currencies in digital forms.
KRATSCOIN is not meant for that purpose. In some opinion, apart from utilization, a crypto can be for safekeeping, an entity for keeping money while allowing easy liquidation, at a click of a mobile button, not to mention sending or transferring without the trouble of going to banks, which was the original purpose of Bitcoin to begin with. Therefore, KRATSCOIN would be better termed as Crypto Commodity, sharing similarities as Metal Commodities.
An individual cannot use gold to make a purchase, neither can one eat gold. It can only be kept or invest in for appreciative value over time. Gold is being exampled for its scarcity which reasons for its higher value over its cousin, silver or bronze. Who or what determines the value of gold? Just like any other crypto, demand by humanity. As in all other commodities, it must also be placed in checks by governments. To put in checks, serial numbers are introduced to protect a country’s commodities outflows or illegal exports.
Humanity made Bitcoin a reality. Acceptance by the majority members of the public made Bitcoin to what is it today with the trust they entrusted it with, or is the majority public hopping on the band wagon to make a few quick extra bucks? Whatever the reasons are, the characteristics of Crypto Currencies are only matched by the behavior of Commodities.
SERIALIZED COINS - WHAT IT MEANS FOR THE PUBLIC: Every currency has its own remarkable name, design and colors. Dollars, Euros, Pound, Tugrik, Peso, Rupee, Rupiah, Dina, Ringgit, Baht and the list carries on. One thing every currency have in common - Serial Numbers.
In any crime, investigators will firstly establish motives and mode of operation, both of which are very likely related to money. So following the money trial is a natural thing to do for investigators/authorities and it has become a common practice. Crimes require funding ie robbers need money to buy guns to carry out its robbing activities. Cutting off financing will reduce criminal activities. That’s the approach governments of the WORLD have adopted for crime fighting.
Perhaps people do not realize this while most do not feel the pinch. Humanity tends to take life for granted until apocalypse happens. Take a minute to visualize the tallest tower in your homeland collapse into a pile of dust with thousands of casualties effecting everything else that comes to mind. Imagine a family member, just 1 is enough, is among those casualties.
• Imagine if monetary system is not in place and drug dealers, among many, roam the earth freely distributing what can be death threatening substance to your kids. What if you are mugged of your inheritance [items left to you by your father] that is beyond retrieval? As for crypto enthusiast, what if your wallet gets hacked as even the mighty Pentagon gets hacked. All the above can go away if the crypto system leaves a trail for hound dogs to sniff out. Money Trail or Serial Codes Trail to be exact.
• Citizens rely on governments and their countries to do what is best for them to lead their daily lives, flourish, advance, improve and strive but at the same time, citizens want to take away the single most important thing deemed crucial in the hierarchy of humanity from governments with additional boastful remarks such as “I transferred $400 million from one corner of the earth to another corner in a single transaction and no governments can do anything about it”.
• In-short, to boast unregulated financial movement is to arrogantly promote crime without realizing it while challenging the world’s monetary authority. Oldest advice in the book teaches us never to pick a fight we can’t win.
• Serial Coded Coins does not take away the financial movement freedom nor does it take away your privacy. It merely provides Authorities the necessary means needed for crime prevention and fighting. It only re-inforce security and safety. SERIALIZED COINS - WHAT IT MEANS FOR GOVERNMENTS: • Governments are relentlessly trying to find new ways to keep track of crypto transactions. Crypto Currency Exchanges, just like all other Financial Institutions and Banks, are required to practice the most stringent Know Your Customer (widely known as KYC) process. The KYC is designed to provide governing agencies and authorities with information pertaining to crypto ownerships.
• But no governments can have information on Peer-to-Peer (also known as P2P) transactions unless the government in question launch a full scale Federal Investigation on certain suspected individuals seeking Wallet Developers to unveil the ownership of certain wallet addresses. Do not forget, National and Global Security trumps Privacy Act. Refusal to co-operate under the pretext of Global or National Security will only result in an out-right ban, which is exactly what happened to Blackberry.
• Questions to Governments – What if Wallet Developers or Crypto Exchanges shuts down which can happen for various reasons be it foul-play, sinister or forcefully under threat? What if servers are damaged and ruined? An EMP strike or a simple magnet can make it happen. Information/identities of suspected customers of such addresses shall be lost forever and along with it the Money Trial.
• The most probable way of evading Authorities with crypto assets are developing an e-wallet for own illicit purpose. Since the cost of developing an e-wallet is relatively low in considerable cost to hiding, what can governments do to flush out these ants from the vast networks of tunnels?
• With Serialized Coded Crypto Assets, it doesn’t matter if servers of Exchanges or Wallets are destroyed. The Serial Codes of each token/coin enables governments of every participating country to track both origin and destination by identifying records of each token/coin in wallet address. It can disappear into a cold wallet but emerging some place later yet Authorities can still detail which particular token/coin has at one moment of time been into which wallet, on what day and date.
• If the battle of financial crimes can be resolved with a simple Serialize Coded Crypto Asset, the eradication of corruptions, money laundering, unlawful proceeds and terrorism financing will be made possible. Criminals can no longer exploit the genius creation of Sathoshi – Blockchain and Crypto-Currencies.
• Global Security, Anti-Terrorism Financing and Money Laundering could just be excuses granting government agencies the need to have access to financial information in the Monetary System. Nonetheless, it is in the interest of every nation that capital outflow is controlled. Capital Outflow is most frequent when the economy of a country is deteriorating. In the face of an economy meltdown, monetary flow is most needed and yet citizens tend to transfer monies further away illegally from their own country in an act of selfishness. This would not be tolerated by any country. Serial Coded Coin shall prove this attempt futile.
• In most part of Asian Countries, many crypto-currency mining operations are carried out illegally. The legality sits on thin fine line where Authorities can pin only stealing of electricity as a major concern to the respective country. Since most Power Companies belongs to the Country in one way or another, it is financially damaging to Power Producers and Utility Suppliers. Serial Codes can determine if the KRATSCOIN is mined legally or illegally making it difficult for miners or mining farms to mine crypto while avoiding making electricity payments. Will this deterrent disrupt the chain of KRATSCOIN supply? That’s not how Blockchain Tech works. TAXATIONS - WHAT IT MEANS FOR PUBLIC AND GOVERNMENTS: • Taxation cannot be imposed on “Illegal & Unlawful Proceeds” instead confiscation is enforced in many countries. Origins or proceeds of Serialized Coded Crypto Assets can be easily identified by the Serial Codes in-conjunction with the Blockchain. This exercise can evidently proof the legitimacy of the aforesaid token/coin. By “Illegal & Unlawful Proceeds” also refers to crypto coins obtained via illegal mining operations.
• Taxation on Crypto Assets are calculated on profits deriving from the sale/disposal of the crypto Assets. If we are small crypto believers, the amount of taxation rendered by Inland Revenue will be insignificant. Why risk Freedom of Life over Freedom of Small Monies. If we are big crypto believers, taxation on Serialized Coded Coins can be considered added security to your assets protection.
• By adopting Serialized Crypto Assets, declaration is made easily possible via proof of token/coin origin via the Blockchain. If the Authorities can know where our crypto assets come from, the Authorities will know where it will disappear to. It is taxation cum insurance in one tiny sum. This added security with freedom feature will encourage self-declarations of crypto assets to Authorities and Agencies. PRIVACY & ANONIMITY: • Many may be skeptical of their wealth being tracked and monitored. But in this era of technological advance society, everything we touches has our signature. Banks, iPhones, Samsung Mobiles, Google, Facebook, Whatsapp, WeChat, LINE, Viber, Facebook, Properties, Utilities. Almost everything. It is to this fact that there is a need for Privacy Protection Act.
• As explained before, Crypto Currency Exchange KYC procedures is designed to expose the identity of Crypto Assets ownership. The Blockchain is supposed to serve as a transparent information platform. The question of privacy over Serialized Coded Coins does not exist, it does not make Serialized Coded Coins ownership any less private.
• Ownership of wallet addresses shall always remain anonymous while the only way Authorities can get to it is through Wallet Developers by virtue of Global/National Security Threats or by a Court Order as per the Privacy Protection Act. SAFETY & SECURITY (CODED CRYPTO VS FIAT + COMMODITIES): • No human mind can memorize the millions of serial numbers printed on fiat currencies. The records of Serialized Coded Coins will forever be in the Blockchain embedded within each transaction from wallet to wallet.
• Serialized Commodities such as gold can be melted down. Diamonds recrafted. Fiat double printed. But not Serialized Coded Crypto Assets.
• Should an accessory system be added into the KRATSCOIN Blockchain, allowing reports on criminal activity be made within the Blockchain, notifying all ledgers of certain stolen Serial Coded Coins, enabling WARNINGS and forbidding next transaction of that particular Serial Coded Coin, wouldn’t this function enhance protection. A theft deterrent function which can never be achieved with physical gold, diamonds or fiat. KRATSCOIN SUMMARY: • Most crypto currencies have not reach a level of security alert for governments. This could be the only reason why a possible ban has not been discussed. China and India has begun efforts to control or ban crypto currencies in their quest to combat capital outflow, writer’s personal opinion. The EU has stopped Libra from implementation. “A company cannot be allowed Authoring Power for issuance of currencies” quoted the governments. KRATSCOIN is fully decentralized with no ownership nor control by any country, company or individual. Once again, the beauty of Bitcoin decentralization concept prevails.
• “There is no such thing as a world currency. However, since World War II, the dominant or reserve currency of the world has been the U.S. dollar” quoted in google.com.
• Most countries have “Foreign Reserves” as backing to a country’s fiat currency. It is a mean of “back up” attempt should all factors above mentioned leading to the value of their currencies collapse. Then what will happen if the Country of the Foreign Reserves collapse?
• Serial Coded KRATSCOIN belongs to no one, no country, no company and therefore theoretically shall not be effected by politics, war or global economy meltdown yet everyone, every country and every government is able to benefit from KRATSCOIN.
"Quoted by" https://lintangnews.com/ada-kratscoin-ini-bedanya-dengan-bitcoin/ https://0xzx.com/201910111244312902.html https://news.tokocrypto.com/tag/kratscoin-ktc/ http://bbs.tianya.cn/post-lookout-836105-1.shtml https://zhuanlan.zhihu.com/p/84844615
submitted by xia112 to Bitcoin [link] [comments]

How to Use Bitcoin Exchange Rate Charts BITCOIN ROCKET FUEL!! Justin Sun and STEEM Conflict Explained Bitcoins Are Dumb Bitcoin Earned Explained Super Easy & Simple way - YouTube Coinbase Wallet Tutorial Set Up Your Bitcoin Wallet

It will also show you the amount of crypto you will get for a particular sum in fiat currency. If you want to follow the price variations of this extremely volatile entity, Bitcoin price charts come handy. Bitcoin exchange rate chart. Trading pages on many exchanges have charts that show the Bitcoin price changing over a certain period of time. If you are lost and confused when looking at a ... Japan-based Mt Gox is the largest Bitcoin exchange. It was launched in July 2010, and by 2013 was handling 70 per cent of all Bitcoin transactions. People can also send Bitcoins to each other ... This rate will drop sharply in 2020, when the next reward halving occurs. That Bitcoin’s price is rising despite such high inflation (and that it rose in the past when the reward was 50 BTC!) indicates extremely strong demand. Every day, buyers absorb the thousands of coins offered by miners and other sellers. A common way to gauge demand from new entrants to the market is to monitor Google ... Find out more: cryptocurrencies explained; How to stay safe. This scam proceeds along classic psychological principles – appealing to authority (using celebrities and trusted sites), starting out with small demands (£250) before gradually escalating and releasing a nominal sum to trick you into thinking you can get the rest. While the Bitcoin exchange rate cannot be explained by standard economic theories, such as purchasing power parity or uncovered interest rate parity, the last term captures the expected exchange rate change in the Bitcoin market. The “fundamental” ν) is the source of uncertainty and is assumed to follow a stochastic process with a drift μ v which is a function of ν and instantaneous ...

[index] [40258] [13583] [8340] [14996] [45888] [161] [39637] [42658] [51125] [21771]

How to Use Bitcoin Exchange Rate Charts

bitcoin breaking news!!! massive reversal incoming?? here is what's next - must see evidence!! MASSIVE REVERSAL INCOMING?? HERE IS WHAT'S NEXT - MUST SEE EVIDENCE!! In this tutorial, you will learn how to use Bitcoin exchange rate charts. ... HOW TO MAKE MONEY WITH BITCOIN - A Simple Explanation - Duration: 5:15. Wealth Hacks 109,513 views. 5:15. Language ... Bitcoin exchange Tutorial Bitcoin explained 2017 Bitcoin exodus wallet Bitcoin explained in Spanish Bitcoin Explicacion Bitcoin explained in 5 minutes Bitcoin Exchange rate. Category Howto & Style ... http://bitcoinpoet.com Bitcoin is a software-based payment system described by Satoshi Nakamoto in 2008 and introduced as open-source software in 2009. Payme... To read more with regards to Bitcoin wallet card, litecoin wallet card, please visit website the following: http://www.cryptocoinwalletcards.com/ Tags: asic ...

#