20+ Bitcoin scams and how to spot and avoid them Comparitech
Bitcoin Step by Step Michael Caughey download
How to Encrypt Your Bitcoin Wallet - dummies
Privnotes.com Is Phishing Bitcoin from Users of Private ...
Butter that paid with pedo pesos to download CP got arrested thanks to blokechain analysis
So this subreddit is basically a bunch of pedos discussing weather or not they will eventually be caught for using a bullet proof hosting server that got busted and hosted CP, at least one of them got caught (unfortunately got released with no charges so far) https://old.reddit.com/depfile_discussion/comments/g3s77v/my_experience/ One of the most frequent posters and mods in that sub is named u/lolita_lopez2, definitely not a pedo right? Edit: Still reading around through that sub, wow these guys know a lot about CP, given their tone and the lack of any shame or disgust towards pedophiles, I can only conclude that these guys are pedophiles, they aren't just discussing the case because of an interest in cybercrime, they are there to reassure each other that they won't get caught. Since the sub is now set to private, this is what he said.
I only just found this sub. I'm posting info that might be helpful, and I'll try to answer questions if I can. I was arrested in 2018, released under investigation (this means no restrictions on my freedom and movement), and the investigation was closed recently, with all my property returned. I'm not going to give dates. I used the following security measures: encrypted folders with truecrypt, separate devices, vpn, tor, fake cock.li email, throwaway usernames, bitcoin purchased from the street. I was caught when they connected a transaction to another wallet to another wallet to an old exchange account which had been deleted for years (from when I first started using bitcoin, it was a stupid mistake). Unfortunately the exchange account was verified with my name and address. I probably consolidated my coins into a new wallet at some point, which could be connected in some way to another wallet I used. In retrospect, bitcoin transactions are permanent so it doesn't matter how long ago and how many transactions/wallets ago they were, if it looks like a simple transfer from wallet to wallet, they can calculate a likelihood that the wallet owners are the same person. The transaction was from an account which they linked to a couple of downloads of specific files that they had verified was illegal. Note that they only identified a couple of files, I don't know if that's because they had only identified a small number of files in total, or if they stopped there for me because that's all they needed to proceed. The downloads were made at least a year before, probably much more because I had stopped using depfile for a long time already. They had no hard evidence it was me but that connection was all they needed to raid me and confiscate all devices in my home. I spent a day in jail while they searched every corner of my home, then a recorded interview with lawyer present, then they sent me home. I was not under any restrictions, I left the country on holiday several times without issue and if I wanted to, I probably could have disappeared to another country. They did recover some deleted files (my mistake) and asked about it in follow-up interviews. The files were definitely reviewed by a human because they were described in detail. In the end I wasn't charged (not enough evidence or not serious enough to warrant further resources in court) and the investigation was closed. Almost all property was returned. Some devices were destroyed because they contained questionable material or looked like they did at some point in the past. A couple of points to note: The police were very discreet, probably because they didn't have hard evidence and were wary of making a false accusation. After everything, nobody knows about what happened (I live alone). They told neighbors that I was assisting them with a case. Work/colleagues/family/friends are unaware. I did have to lie about why I had no electronic devices left in my home. The search through my home was very thorough, they really went through every bag/containecorner. All the pockets in all my clothes were checked. A whole team of 4 or 5 people spent 12 hours in my home while I spent the day alone in a cell, waiting for a lawyer to arrive. Despite being so thorough, they missed a few devices (which weren't even hidden), and took some non-electronic objects by accident. No cloud accounts were accessed (or I am simply not aware of it). No questions were asked about my encrypted folders. They did demand passwords for all devices/drives (which I am legally required to give). I think if I had used encrypted drives instead of encrypted folders, I would probably be screwed. Some files were definitely reviewed/watched by humans (they were described in follow-up interviews) but for the most part it was probably automated, and just flagged up some of the more suspicious files. This is probably why the encrypted folders were ignored. If a human had looked at my drives, they would have easily noticed a huge chunk of it was inaccessible. After using the phones that were returned, it looks like they they may have gone through it by hand because every app was open, file browser, download history, chrome history tab was open, etc. Or maybe that's just a side effect of whatever tool they use for android phones. I know that they can search hard drives without leaving a trace (by cloning the drive or blocking writes). They fixed my old broken hard drives and phones. If you haven't heard anything by now, you're probably in the clear. (No promises)
Safety of open source Bitcoin wallet software/apps
Open source software are considered safe/safer because the source code can be audited/reviewed. This thread is not about the source code, but the potential risk caused by the compilation process, or in other words, the possibility that the software/apps aren't complied from the claimed source code. Here is a link about some version of TrueCrypt's Windows executable being suspicious: https://blog.cryptographyengineering.com/2013/10/14/lets-audit-truecrypt/
[T]he Windows version of TrueCrypt 7.0a deviates from the Linux version in that it fills the last 65,024 bytes of the header with random values whereas the Linux version fills this with encrypted zero bytes. From the point of view of a security analysis the behavior of the Windows version is problematic. By an analysis of the decrypted header data it can’t be distinguished whether these are indeed random values or a second encryption of the master and XTR key with a back door password. From the analysis of the source we could preclude that this is a back door… As it can’t be ruled out that the published Windows executable of Truecrypt 7.0a is compiled from a different source code than the code published in “TrueCrypt_7.0a_Source.zip” we however can’t preclude that the binary Windows package uses the header bytes after the key for a back door.
Bitcoin client comparison? Ease of use, functionality, security etc..
Hey everyone, I've recently started using bitcoins, and been trying to figure out the best way to store them.. There are a bunch of desktop clients available, each with it's ups and downs, supporting different features, and using different amount of resources.. I wanted to find a nice overview of them all, but so far I'm not finding anything that I wanted to know.. So I think we should have some kind of wiki page, that describes them in more details. Explains how to start using each of them, and how to ensure it's safe. For example, to try and secure my wallet files, I'm storing them in a TrueCrypt volume, that's archived to the cloud. This way they are backed up to multiple locations, incase my machine dies, and are also encrypted, in case one of the machines is compromised! I'm not sure if that's overkill or not :) I thought I'd start with a short write-up of my opinions on some of the clients and my impressions of them. It's by no means a comprehensive review (that would take a lot more space than a single reddit post). All of this is just a subjective view on each of the clients.. I hope more people will add to it, maybe even compoling a nice and informative comparison of all the popular clients!
Bitcoin-QT: The official client. Somewhat basic in functionality, advanced functions (like backing up the private key) available through the "debug" window., but works well for a lot of people.. You can backup the wallet.dat file in the TrueCrypt volume to secure the coins, but the client will store the main working copy of the wallet file in %APPDATA% in Windows - leaving it potentially compromised, unless you encrypt the wallet file (part of the client's functionality). There's no obvious way to change the storage location. The downside (upside for some?) of the client is that it stores the whole blockchain.. (almost 15GB atm) Initial synchronisation takes a lot of time.. If you don't use it for some time, you'll have to synchronise again, which takes time (and CPU resources btw).. At the end of the day, the wallet is as secure as your machine is. No support for paper wallets / watch-only wallets / offline storage, transactions.. But for basic use - it works perfectly fine.
Bitcoin Armory: A popular powerful client, runs "on top" of Bitcoin-QT, which means the blockchain is also stored on the local drive.. On top of that, the Armory client will also build a local database to manage it, which means it needs more storage on it's own.. (at the moment, that's an extra 16GB on top of the blockchain!). Also, the synchronisation status is not very helpful, just saying the % synchronised.. At least Bitcoin-QT states how many weeks/days you are behind, so you can somewhat estimate how soon the sync will work. The Armory client supports multiple wallets, compared to the official client, which can be stored separately. The wallets use (correct me if I'm wrong?) a deterministic key to generate the private keys, which means if you backup your wallet in cold storage - you can restore it at any point, and restore all the new addresses generated after the backup - a very useful feature. The Armory client has more advanced functionality like paper backups (described above), offline wallets and offline transactions, and a lot more.. Some features are missing, like importing watch-only addresses. You can though create a watch-only backup of a wallet, and import that on a different machine, but if you only have an address - not supported atm. The client seems rather powerful, but also feels a bit clunky and hard to use.. Some functionality is missing, and just strange (not all private key formats are supported.. even if most other clients have no problems with them)
MultiBit: A lite bitcoin client, that doesn't store the whole blockchain locally. This makes it a lot easier to start using, even on a new machine. It will only synchronise a part of the blockchain that is relevant for a specific address, which means you save on both time and storage when using it, but it can be (potentially, but quite unlikely) compromised, if the only nodes it can see are rogue. It also supports multiple wallets, you can select where to store the wallet files, and they can be password protected as well. You can store them on a TrueCrypt volume, to secure it even more. The app is still relatively simple to use, while providing more functionality than just the basics. Compared to Armory and Bitcoin-QT, you can also create a portable installation, which can be stored on a USB key / True Crypt volume along with the key files.
Electrum: This is one of the clients I've hardly used so far.. It has a full and a portable version! With the portable version I can store they keys where I want, and keep them secure as I see fit. As MultiBit, it doesn't store the full chain, but instead will use a server to keep and manage the blockchain. But nothing is stopping you from running your own electrum server and connecting to it, if you're worried. The client seems rather simple, but powerful at the same time. Same as Armory - it will create a seed that will be used to generate addresses. The nice thing is that it will generate multiple receiving addresses, and will also maintain change addresses, which (if I'm right) means that each transaction will not reuse the same address twice, unless you force it to. My only gripe so far with it is that it's the only client so far where you can't send to multiple addresses in one transaction, forcing only a single recipient per transaction.. I hope that'll change in the future :(
I have some Bitcoins that are hosted on a web wallet and I want to get those Bitcoins out of there ASAP. I have never backed up my Bitcoins before so I wanted to outline my plan and allow for any peer review and/or criticism. (Hopefully some newbies can find some of this helpful as well). My ultimate goal is removing my Bitcoins from the web and onto a portable, secure cold storage. These are Bitcoins I don't want to touch for a while. Here is my plan thus far: Layer 1: I have already ordered 2 CORSAIR Survivor Stealth 16GB USB 3.0 Flash Drive Model CMFSS3-16GB from NewEgg. I figured USB 3.0 will be in full swing if I want to access these in the future. The drives themselves are waterproof to 200 meters, vibration and shock resistant. Layer 2: I thought these drives came with a basic password protection option to access the drive but I suppose that was another drive I was looking at. If anyone has a basic solution for this I would appreciate it. In this layer I was planning on putting basic files in case of recovery (or incompatibility in the future) such as TrueCrypt.exe (in case needed for recovery later, see Layer 3), an installer for Bitcoin-qt.exe and the Armory Wallet Backup program too. Layer 3: In Layer 2 I will create a TrueCrypt volume that will be secure and contain all of my sensitive data. When I launch TrueCrypt I can mount a file that is cryptographically secure as a its own volume. In essence, it takes a secure file and unlocks it as if it were another USB or Hard Drive on my computer, allowing me to access all files and then secure it when I dismount it from my hard drive. In this layer I will have my Armory Wallet saved. I have never used Armory before so I will be following any guides on their website. If necessary I will keep my wallet.dat in this layer as well. Layer 4: I understand Armory has the ability to encrypt the wallet too. If I elect to that then I would consider that my final layer of security. In addition to the layers of security I was planning on splitting up my Bitcoin assets (hence 2 USB drives) and securing them in different places (effectively Layer 0). I don't have a fire safe or anything like that but I plan to acquire a secure place to keep my flash drives from being lost or stolen. Also, I am planning to test out these methods beforehand with a minimal amount of Bitcoins (some Satoshis perhaps) to ensure I don't seal my own doom by making some grave errors in the process. This is just my basic plan, any comments or criticisms are welcome.
Next product review is about two Denarium coins. For these of you who dont know what I am talking about, Denarium is a company that makes coins that you can add Bitcoin to. One of my Bitcoin dreams has been to get a physical Bitcoin. This dream has been a tough one to reach but I cannot wait. Stay tuned for the review. Encrypting a bitcoin wallet restricts it to “spectator” mode, in which you can see the balance and incoming transactions, but nothing else in detail. All bitcoin users should encrypt their bitcoin client, and the best code of conduct is to use a very strong and difficult-to-crack password — preferably a password that contains numbers ... Spammers Target BitCoin Wallets. Spammers watch trends. They include popular topics, hot products, and important events in their messages to improve their chances of tricking their victims. A popular open-source encryption program often used to secure desktop bitcoin wallets is compromised, according to its developers. The program, TrueCrypt, was deemed “not secure” due to “unfixed security issues” according to a notice on its SourceForge page that appeared on 28th May. Users who attempted to access the program’s website, truecrypt.org, were redirected to the ... Bitcoin Gold wallet When bitcoin gold was released in October 2017, scammers took advantage of the fact that users would be looking for somewhere to place their tokens of this new cryptocurrency. Through a website called mybtgwallet.com , they prompted users to give up their private keys for this and other coins in order to generate bitcoin ...
Choose your Bitcoin Wallet - An in-depth review of ...
Sign Up and start trading on CoinCasso and get $35 https://bit.ly/3aFsS9M Download iOS 📲: https://apps.apple.com/us/app/ccwallet-your-bitcoin-wallet/id146377... Best Bitcoin Wallet 2020: Safest Cryptocurrency Hardware Wallet? (Better than Ledger & Trezor?) ... 31:00. Wallet review - Ellipal Titan unboxing & first transaction - Duration: 48:56. Josiah ... Bitcoin generator 2020 - 100% working + real review #Bch #Bitcoincash #Bitcoincashhackdirectlytocoinbase #Bitcoincashhachdirectlytocoins #HowcanIhackbitcoinc... Bitcoin wallets are of the utmost importance to me; they’re a part of my daily life and enable me to participate in commerce. I recently got my hands on THE ... #bitcoin #denarium #wallet Denarium Physical Bitcoin Unboxing and Overview ... Bitcoin Silver Wallet Review - YouMeAndBTC.com - Duration: 9:39. Daniel Brown 3,867 views. 9:39.