Armory - About Page - Bitcoin

New to Bitcoin? Confused? Need help? You've come to the right place.

Bitcoin is an internet based decentralised currency. Similarly to Bittorrent, but Bitcoin uses a public ledger called the blockchain to record who has sent and received money. It's very new, and for many very confusing. BitcoinHelp aims to rectify this. Whether it be explaining how it works, how to use it, how to buy Bitcoins, how to integrate Bitcoins into your business. Sharing your successes as well as failures in order to help others is also gladly received. Ask away!
[link]

How to get Armory to use Bitcoin-Qt's block chain on OSX?

I have Bitcoin-Qt installed and synced on OSX Snow Leopard. When I open Armory, the status shown in the Dashboard area says "Preparing Database".
When I check out Armory Bitcoin Client > Preferences, I see that "Bitcoin-Qt/bitcoind management is not available on OSX".
Is it possible to get Armory to use Bitcoin-Qt's block chain on OSX, or will Armory need to download and verify a second, complete block chain?
edit: spelling
edit: It appears that Armory on OS X is configured by default to use the Bitcoin-Qt block chain. All I had to do is wait ~3 hours for synchronization.
edit: Bitcoin-Qt must be running at the same time as Armory. Shutting down Bitcoin-Qt will take Armory offline.
submitted by BobAlison to Bitcoin [link] [comments]

Step-by-step guide on how to recover your Bitcoin Wallet using Armory

I deal with the finances for the family so I maintain a how to guide for our finances in case something were to happen to me. Here is my latest chapter on how to recover our Bitcoin holdings. I hope others might find it useful but maybe it will save you some time.
Overview of steps: 1) Install Bitcoin-Qt app 2) Install Amory app 3) Import Paper Backup
What you need: 1. Bitcoin-Qt app. This is free software downloadable from http://www.bitcoin.org 2. Amory - Bitcoin Wallet Management software. This is also free software available for download from https://bitcoinarmory.com/ 3. The Paper Wallet from our super-secret hiding place
Detailed Steps 1. Download the Bitcoin-Qt app from www.bitcoin.org. Install and run Bitcoin-Qt on an internet connected computer.
  1. Wait for Bitcoin-Qt to synchronize with the network. This will take a painfully long time the first time (potentially 24 hours!), but it should only be a few minutes on subsequent loads. You will see a green checkmark in bottom-right corner of Bitcoin-Qt when it is ready. NOTE: During this time, the wallet needs to validate the blockchain. Validating the blockchain takes a long time (24 hours). The blockchain is a record of all transactions and identifies the owner of the Bitcoin.
  2. Download the Armory Wallet Management software from www.bitcoinarmory.com. Install Armory, but don’t run it until Bitcoin-Qt is synchronized.
  3. Start Armory!
  4. Armory will prompt you asking if you want to create a New Wallet or Import Wallet. Select Import Wallet and then select, Restore from paper backup. Enter the codes from the paper backup into Armory application. And voila, our wallet will be restored. NOTE: Put the paper backup back in its hiding place.
submitted by Bonesman to Bitcoin [link] [comments]

Why Bitcoin is Superior to Gold

There is a constant war being fought between goldbugs, like Peter Schiff, and Bitcoin enthusiasts so I decided to make an outline, with links, comparing and contrasting gold and Bitcoin. I made this in November of 2019 (thus the information therein is based on figures from that time) but, being scatter brained, neglected to post this for the Bitcoin community to see. The yardsticks I used to compare the two assets included the following: shipping/transactions costs, storage costs, censorship factor, settlement time, stock to flow, blockchain vs clearing house, validation, etc. I will also touch on Roosevelt's gold confiscation executive order in 1933, transporting gold during the Spanish Civil War in 1936, and the hypothetical cost for Venezuela to repatriate its gold more recently.
I will provide a brief summary first then follow that with the outline I made. This information can be used as a tool for the Bitcoin community to combat some of the silly rhetoric coming from goldbugs such as Peter Schiff and James Rickards. I would like to make it clear, however, that I am not against gold and think that it performed its role as money very well in a technologically inferior era, namely Victorian times but I think Bitcoin performs the functions of money better than gold does in the current environment.
I have been looking to make a contribution to the Bitcoin community and I hope this is a useful and educational tool for everyone who reads this.
Summary:
Shipping/transaction costs: 100 ounces of gold could be shipped for 315 dollars; the comparable dollar value in Bitcoin could be sent for 35 dollars using a non-segwit address. Using historical precendent, it would cost an estimated $32,997,989 to transport $1 billion in gold using the 3.3% fee that the Soviets charged the Spaniards in 1936; a $1 billion Bitcoin transaction moved for $690 last year by comparison. Please note that the only historic example we can provide for moving enormous sums of gold was when the government of Spain transported gold to Moscow during the Spanish Civil War in 1936. More information on this topic will be found in the notes section.
Storage costs: 100 ounces of gold would require $451 per year to custody while the equivalent value of Bitcoin in dollar terms could be stored for the cost of a Ledger Nano S, $59.99. $1 billion USD value of gold would cost $2,900,000 per year while an Armory set up that is more secure would run you the cost of a laptop, $200-300.
Censorship factor: Gold must pass through a 3rd party whenever it is shipped, whether for a transaction or for personal transportation. Gold will typically have to be declared and a customs duty may be imposed when crossing international borders. The key take-away is gatekeepers (customs) can halt movement of gold thus making transactions difficult. $46,000 of gold was seized in India despite the smugglers hiding it in their rectums.
Settlement time: Shipping gold based on 100 ounces takes anywhere from 3-10 days while Bitcoin transactions clear in roughly 10 minutes depending on network congestion and fee size.
Historic confiscation: Franklin Roosevelt confiscated and debased the paper value of gold in 1933 with Executive Order 6102. Since gold is physical in nature and value dense, it is often stored in custodial vaults like banks and so forth which act as a honeypot for rapacious governments.
Stock to flow: Plan B's stock to flow model has become a favorite on twitter. Stock to flow measures the relationship between the total stock of an asset against the amount that is produced in a given year. Currently gold still has the highest value at 62 while Bitcoin sits at 50 in 2nd place. Bitcoin will overtake gold in 2024 after the next halving.
Blockchain vs clearing house: gold payments historically passed through a 3rd party (clearinghouse) in order to be validated while Bitcoin transactions can be self validated through the use of a node.
Key Takeaway from above- Bitcoin is vastly superior to gold in terms of cost, speed, and censorship resistance. One could theoretically carry around an enormous sum of Bitcoin on a cold card while the equivalent dollar value of gold would require a wheelbarrow...and create an enormous target on the back of the transporter. With the exception of the stock to flow ratio (which will flip in Bitcoin's favor soon), Bitcoin is superior to gold by all metrics covered.
Notes:
Shipping/transaction costs
Gold
100 oz = 155,500. 45 x 7 = $315 to ship 100 oz gold.
https://seekingalpha.com/instablog/839735-katchum/2547831-how-much-does-it-cost-to-ship-silver-and-gold
https://www.coininvest.com/en/shipping-prices/
211 tonnes Venezuela; 3.3% of $10.5 billion = 346,478,880 or 32,997,989/billion usd
http://blogs.reuters.com/felix-salmon/2011/08/23/how-to-get-12-billion-of-gold-to-venezuela/ (counter party risk; maduro; quotes from article)
Bitcoin
18 bitcoin equivalent value; 35 USD with legacy address
https://blockexplorer.com/
https://bitcoinfees.info/
1 billion; $690 dollars
https://arstechnica.com/tech-policy/2019/09/someone-moved-1-billion-in-a-single-bitcoin-transaction/
Storage costs
Gold
.29% annually; https://sdbullion.com/gold-silver-storage
100 oz – $451/year
$1 billion USD value – $2,900,000/year
Bitcoin
Ledger Nano S - $59.00 (for less bitcoin)
https://shop.ledger.com/products/ledger-nano-s/transparent?flow_country=USA&gclid=EAIaIQobChMI3ILV5O-Z5wIVTtbACh1zTAwqEAQYASABEgJ5SPD_BwE
Armory - $200-300 cost of laptop for setup
https://www.bitcoinarmory.com/
Censorship factor (must pass through 3rd party)
Varies by country
Gold will typically have to be declared and a customs duty may be imposed
Key take-away is gatekeepers (customs) can halt movement of gold thus making transactions difficult
$46,000 seized in India
https://www.foxnews.com/travel/indian-airport-stops-29-passengers-smuggling-gold-in-their-rectums
Settlement time
Gold
For 100 oz transaction by USPS 3-10 days (must pass through 3rd party)
Bitcoin
Roughly 10 minutes to be included in next block
Historic confiscation-roosevelt 1933
Executive Order 6102 (forced spending, fed could ban cash, go through and get quotes)
https://en.wikipedia.org/wiki/Executive_Order_6102
“The stated reason for the order was that hard times had caused "hoarding" of gold, stalling economic growth and making the depression worse”
Stock to flow; https://medium.com/@100trillionUSD/modeling-bitcoins-value-with-scarcity-91fa0fc03e25 (explain what it is and use charts in article)
Gold; SF of 62
Bitcoin; SF of 25 but will double to 50 after May (and to 100 in four years)
Blockchain vs clearing house
Transactions can be validated by running a full node vs. third party settlement
Validation
Gold; https://www.goldismoney2.com/threads/cost-to-assay.6732/
(Read some responses)
Bitcoin
Cost of electricity to run a full node
Breaking down Venezuela conundrum; http://blogs.reuters.com/felix-salmon/2011/08/23/how-to-get-12-billion-of-gold-to-venezuela/
“The last (and only) known case of this kind of quantity of gold being transported across state lines took place almost exactly 75 years ago, in 1936, when the government of Spain removed 560 tons of gold from Madrid to Moscow as the armies of Francisco Franco approached. Most of the gold was exchanged for Russian weaponry, with the Soviet Union keeping 2.1% of the funds in the form of commissions and brokerage, and an additional 1.2% in the form of transport, deposit, melting, and refining expenses.”
“Venezuela would need to transport the gold in several trips, traders said, since the high value of gold means it would be impossible to insure a single aircraft carrying 211 tonnes. It could take about 40 shipments to move the gold back to Caracas, traders estimated. “It’s going to be quite a task. Logistically, I’m not sure if the central bank realises the magnitude of the task ahead of them,” said one senior gold banker.”
“So maybe Chávez intends to take matters into his own hands, and just sail the booty back to Venezuela on one of his own naval ships. Again, the theft risk is obvious — seamen can be greedy too — and this time there would be no insurance. Chávez is pretty crazy, but I don’t think he’d risk $12 billion that way.”
“Which leaves one final alternative. Gold is fungible, and people are actually willing to pay a premium to buy gold which is sitting in the Bank of England’s ultra-secure vaults. So why bother transporting that gold at all? Venezuela could enter into an intercontinental repo transaction, where it sells its gold in the Bank of England to some counterparty, and then promises to buy it all back at a modest discount, on condition that it’s physically delivered to the Venezuelan central bank in Caracas. It would then be up to the counterparty to work out how to get 211 tons of gold to Caracas by a certain date. That gold could be sourced anywhere in the world, and transported in any conceivable manner — being much less predictable and transparent, those shipments would also be much harder to hijack. How much of a discount would a counterparty require to enter into this kind of transaction? Much more than 3.3%, is my guess. And again, it’s not entirely clear who would even be willing to entertain the idea. Glencore, perhaps?”
“But here’s one last idea: why doesn’t Chávez crowdsource the problem? He could simply open a gold window at the Banco Central de Venezuela, where anybody at all could deliver standard gold bars. In return, the central bank would transfer to that person an equal number of gold bars in the custody of the Bank of England, plus a modest bounty of say 2% — that’s over $15,000 per 400-ounce bar, at current rates. It would take a little while, but eventually the gold would start trickling in: if you’re willing to pay a constant premium of 2% over the market price for a good, you can be sure that the good in question will ultimately find its way to your door. And the 2% cost of acquiring all that gold would surely be much lower than the cost of insuring and shipping it from England. It would be an elegant market-based solution to an artificial and ideologically-driven problem; I daresay Chávez might even chuckle at the irony of it. He’d just need to watch out for a rise in Andean banditry, as thieves tried to steal the bars on their disparate journeys into Venezuela.”
submitted by cornish_roots to Bitcoin [link] [comments]

Bitcoin champion official

Bitcoin champion official
Bitcoin champion Print ArticleShare this article on FacebookShare this article on TwitterShare this article on LinkedinShare this article on Delicious1Share this article on DiggShare this article on RedditShare this article on Pinterest1
Searching for a Bitcoin Buying Guide? Pondering where to begin? Individuals have a ton of misinterpretations about bitcoin - the absolute first generally known and acknowledged digital money around the world.
https://preview.redd.it/8i4q0vbud1u51.jpg?width=1193&format=pjpg&auto=webp&s=400b5fcc3f8cfc424fdc3a03bf2e40c3950e9b9f
Many individuals think for instance that lone programmers and obscure individuals use it. Anyway bitcoin is really going standard with everybody from TigerDirect to o Dell and even Subway tolerating installments in bitcoin now.
Indeed, bitcoin has a ton of advantages over different monetary standards. For instance, you can send bitcoins to somebody as installment without experiencing the bank broker (and get hit with additional expenses). It's likewise a lot quicker than sending cash through a bank wire or move. You can send bitcoins to somebody and make them get the coins like a flash. B
With the entirety of this present, it's nothing unexpected that numerous individuals are currently attempting to purchase bitcoin unexpectedly. Anyway it's not as simple as setting off to your bank and pulling back bitcoins - or heading off to a store and plunking down some well deserved money for

The framework works a piece uniquely in contrast to that. This Bitcoin Buying Guide will go over a couple of things you have to know before you purchase - so you can purchase securely and safely.

Above all else, while the cost may be over $2000 us per coin, you don't need to purchase a whole bitcoin. Most places will let you purchase parts of a bitcoin for as meager as $20. So you can begin little and go from that point as you get more OK with the manner in which things work.
Besides, this article is for general purposes just and not to be taken as money related exhortation. Bitcoin can be hazardous and before making any buy you ought to talk with your money related guide to check whether it's appropriate for you.
The primary activity before you purchase your coins is to get a virtual wallet to store your coins. This wallet is a line of text that individuals can use to send you bitcoins.

There are various kinds of wallets including ones you download to your telephone or PC, online wallets and even disconnected, cold stockpiling wallets.

A great many people want to get a wallet on their telephone or PC. Mainstream wallets incorporate Blockchain, Armory, Bitgo MyCelium and Xapo.
Generally it's as basic as downloading the wallet to your telephone as an application or downloading the product to your PC from the wallet's principle site.
There are a few kinds of spots to purchase and every one is somewhat unique. There are online merchants that will sell you bitcoins straightforwardly for money (or bank wire or charge card).
There are trades where you can purchase and sell bitcoins from others - like a securities exchange. There are likewise nearby trades that connect you up with venders in your general vicinity hoping to sell. Bitcoin champion
There are additionally ATMs where you go to buy with money and get your coins conveyed to your wallet in minutes.
Each bitcoin merchant has their advantages and downsides. For instance ATMs are extraordinary for security, however they'll energize you to 20% on head of the current value, which is absurd. (On a BTC cost of $2000, that $400! So you're paying $2400 rather than $2000).
https://preview.redd.it/6vfnhrlvd1u51.jpg?width=2560&format=pjpg&auto=webp&s=f00d6b2c52ba69f5f10bf22273a8eff3298b1ba8
Regardless of where you choose to purchase, make sure to do your exploration and go with a believed merchant with a decent notoriety and solid client support. First time purchasers will particularly have questions and may require the additional help to assist them with their first exchange.
Take as much time as necessary and examination the better places to purchase before you choose. Elements to consider incorporate coin costs, additional charges, strategy for installment and client assistance.
Whenever you've discovered a spot to purchase, prepare your assets (for example you may send a wire move or utilize your Visa to finance your record). At that point sit tight at a decent cost. (Bitcoin costs are continually fluctuating 24 hours, 7 days every week). At that point put in your request when you're prepared.
When your request is filled and you have your coins, you'll need to send them to your wallet. Just enter your bitcoin address and get the vender to send you your bitcoins. You should see them appear in your wallet inside minutes to 60 minutes (contingent upon how quick the vender sends them out).
Presto, you are presently a bitcoin proprietor. You would now be able to send coins to pay for different merchandise and enterprises, or hold tight to them for a blustery.
https://preview.redd.it/5a9jjoxmd1u51.png?width=333&format=png&auto=webp&s=04e1d18d92c6d4a5fc7d192703b02ba29748940a
submitted by Bitcoinchampionorder to u/Bitcoinchampionorder [link] [comments]

[RF] Just another quiet Friday night

"You're fucking crazy John," the man in the black T-Shirt announced. "Seriously, you want to pretend to be a paedo, so you can lure in the FBI and fuck with them? That is some next level warped shit."
"Chill out dude. That was just an example. Doesn't have to be a paedo."
"I don't give a fuck. Anything that's gonna make them zero-day you is some dark shit that you can't just laugh off. And what if they chain the sploits? They'll bounce out of your sandbox and be kicking the door down in minutes."
"No, no, it's ok. Really. I bought these laptops from a heroin addict in another city. Totally untraceable. I've had the lid off and de-soldered the camera, microphone and wireless."
"That's no use, we've got to get online somehow. And when their payload fires they'll trace us through a ToR bypass."
"That's why we need three laptops. Physical separation. This one," he tapped the metallic blue case, "is the bait. It's a regular laptop, but it's only connection is a single wired Ethernet. The only route to the Internet is via this one," tap tap, "which is running hardened Kali and only connects via ToR."
"Seriously, you're going to actually do this?"
"Come on dude, I've always wanted to try. Live a little."
"What's the third one for?"
"It's hardened Kali too. We proxy everything from the bait browser through here. When they deliver their exploit we'll catch it here, do some reverse engineering, and get ready for the fun bit!"
"What the hell. But you're crazy man. And we never speak of this."
"Of course. Goes without saying."
"How do we start?"
"You get a proxy running on that. I'll get the ToR connection set up. I got a 4G dongle off the same guy."
John removed a small ethernet hub from his bag, connected its power but held off from plugging in the laptops. He connected the 4G dongle, started the ToR service and watch its status update. With the connection active he configured the iptables firewall so outbound traffic was permitted only through ToR. Cal started the intercepting proxy, exposed its listener and looked at John. "Ready" They both plugged into the hub, and Cal watched as John connected the bait laptop, accessed the proxy settings and linked it to the listener.
He accessed a non-descript site to check the setup. It loaded a little slowly, while the series of requests popped up on the intercepting proxy. "Are we sure it's going through ToR?" Cal asked. "Don't worry". "Seriously, show me a packet trace." John started a sniffer, gestured to Cal to refresh the bait browser, while a series of packets scrolled up the screen, all safely encrypted by ToR.
"So what now?" a pause "And definitely no paedo stuff. That's too dark to mess about with."
"Old school," John replied, "I guess it's a bit of a cliche. We go on the dark net and try to order a murder for BitCoin. We'll make it an American prosecutor, that'll get the FBI going."
Cal stared at him. But that didn't stop him typing and Cal watched with grim fascination as he navigated around dark net markets, registering accounts, searching vendors and sending onimous enquiries. Cal monitored the proxy, configuring ever more intricate filters to weed out the mundane.
They'd crossed a line of no return and complicit Cal joined in, weaving convincing tales in their messages, striking the right tone to complete their deception. This went on for hours, with no sign of any incoming exploits. Until the browser popped up with "Do you want to allow this site to access WebGL?"
"That's it," John smiled, "there's no way that site really uses WebGL. This is an exploit. Stands to reason too, we always knews that had huge attack surface." He was about to permit it, but Cal stopped him. "No, don't allow it. If we allow it, we'll just get a lame zero day that requires WebGL. Deny it and carry on. They'll send a better exploit soon enough."
The intensity increased, Cal identified the malicious code that had tried to access WebGL. But it was just a stager - no exploit there. John carried on his ruse, until he noticed the browser stutter. He grabbed Cal's arm, "this is it!" Fear in the room intensified. This was serious now, some hacker - be it FBI or otherwise - had control of the laptop right in front of them. "Carry on with the messaging Cal. If we stop now they'll know our game."
Cal typed into the bait laptop while John began to investigate the exploit delivery. He identified the malware quickly enough, and a lingering connection that could be to the command and control server. Alarmingly, it was transferring a lot of data in both directions, a detail he decided not to share with Cal. He loaded the malware into a binary analysis tool and begun the painstaking process of unpicking its workings. 20 minutes in he told Cal to stop. "That'll do. Sign off naturally and shut it down."
Cal joined him with the binary anaysis and gradually they formed a picture of its armory. "It's not like one I've seen before," Cal said, "it's tighter coded than a typical rootkit. Really could be FBI." John nodded. "You can see it repeatedly copying this string. That's gotta be a heap spray. And it looks like self-decrypting machine code. Yeah, that's the payload for sure. We can just plug our own in here."
"What if the exploit's been watermarked?" Cal interjected, "We don't know where they could have hidden one."
"Who cares? We're gonna deliver it anonymously anyway."
They worked industriously to decouple the exploit and payload, build a delivery mechanism, and soon they were ready to test it. They watched in delight as a fully-patched browser accessed their delivery site, churned the laptop's CPU, then registered a ping back on the console.
The next step was to incorporate a real payload.
"So what's it gonna do John?"
"Persist itself to disk, then sit quietly and await further instructions. I've got the C&C software figured out already, it was a fun project from long ago. What I need you to do is use BitCoin to rent a couple of dozen virtual servers in different data centres around the world."
As Cal started registering the servers, John used the third laptop to generate a public/private key pair. One by one, the servers came online, and John installed the C&C software, configuring each to only respond to instructions signed by their private key. On the 20th he told Cal to stop.
There was a sparkle in his eyes. "We're nearly there! Everything's in place."
"How are we going to deliver it?"
"That's why we had to do this today. I found something earlier. A cache poisoning vulnerability on a major site."
Cal stared at him. The chain was complete. This was not real.
They completed their final maneouvers. Scripted a mechanism to dynamically generate payloads containing a random sample of C&C servers. Uploaded the exploit delivery mechanism into the control cloud, and generated a list of exploit URLs. John accessed the vulnerable major site, saved the HTML code locally, and modified it to include an exploit URL. Then he exploited the cache poisoning flaw, so that every visitor - at least every visitor coming through that particular cache cluster - would receive not the legitimate site but his malicious modificiations.
They watched the C&C management console. Around the world, thousands of unsuspecting web users experienced an annoying pause while their web pages loaded. Each time, under the hood, the zero day exploit fired, the payload persisted itself to disk, and made a connection to their C&C network to receive further instructions. Each time a new node joined their botnet, a line was logged to their console, and soon the screen was scrolling uncontrollably.
John was elated, Cal terrified. Cal watched in horror as John repeated the cache poison process across multiple clusters in different data centres. The rate of scrolling on the C&C console exploded. John cancelled it with a smile.
"Lets just look at the numbers"
Running a grep count on the log showed over 900,000 payload activations. And their malware had been live for barely 15 minutes.
"What are you going to do with it?"
"That's for another day. Now, we cover our tracks."
John removed two USB drives from his bag. He created an encrypted container, and into it put his decoy. Some nudes of an office chick that had been circulating. Incriminating enough, but not the crown jewels. He then created a hidden container within the free space of the first container, using a very strong password. Into this hidden container he copied the private key for the C&C network. This key put him in control. The only way to control the botnot was having both the USB drive, and his strong password. He repeated the process for Cal, inviting him to choose his own passwords. When he handed over the drive, Cal held it like it was on fire.
He shut down the bait laptop, gesturing Cal to do the same with the proxy. Removed the hard drive and connected it via USB to the ToR relay. The ToR relay was unlikely to have been compromised that night, a trustworthy system he could use to erase the others. After a secure erase of both drives, then of the ToR relay itself, John started putting everything in a bag.
They left the hotel room in silence. Bag on the rear seat and John drove. Cal was acutely aware of the USB drive in his pocket, the angled corners pressing into his leg. He went out of town, down lanes Cal didn't recognise, and stopped by a chain link fence. They both got out, John retrieved the bag, and with a big hurl, launched it over the fence into the landfill.
Back home, John smoked a large joint of double zero hash and fell fast asleep. He awoke a few hours later. It almost felt like a dream. But he ran his fingers along the USB drive and remembered the sheer power it contained.
submitted by netsecwarrior to shortstories [link] [comments]

Exporting Keys from Armory

I have an old laptop that I may have bitcoin on from a couple years ago on Bitcoin Armory 0.93.3. I tried connecting it to the internet to re-sync with the blockchain but quickly found out that the laptop is infected and I would want to not have to have it connected to the internet. I forgot how to use the wallet, I don't have the seed phrase and when I try to create a paper backup I have to enter a passphrase to unlock the wallet. Is there a way to export the keys from this old wallet?
submitted by Green_Valentina to Bitcoin [link] [comments]

Need urgent help! Sent bitcoins to armory without understanding it.

So basically I made my first localbitcoins transaction today and I was trying to send the bitcoins to my electrum wallet however it wouldn't recognize my adress.
I read a post which said to use a different wallet and so I downloaded armory. When it started up it said it could only boot in offline mode but I stupidly ignored this and sent bitcoins to my armory adress anyway.
Now I have no clue how to get the bitcoins off there as I cannot get it out of offline mode. ive learnt I need this 'bitcoin core' thing however it seems that will take like three days to install or something stupid? Can anyone please help!!!
submitted by TheLuminescent to Bitcoin [link] [comments]

*LAUNCH* AtomicG - HardcoreRP

*LAUNCH* AtomicG - HardcoreRP

54.36.230.53:27015
Hi and welcome to HardcoreRP from AtomicG,
After many hours of legacy and modern DarkRP experience, we at AtomicG have been working towards the launch of our own server for a while now. From drawing board to reddit board the focus has been on the 5 Tenet's (as well as the document from Fptje). Through sophisticated use of moderation plugins and addons, a tasteful choice premium gameplay features, and a redesigned rules and administration system; we at AtomicG believe alongside the support of an active community, that this may be the future of DarkRP.
Unique Rules:
AtomicG has sought to redesign the repetitive and broken system of rules that most RP servers use as standard today. Having played many hours of DarkRP ourselves and with inspiration from 'FPtge', the creator of the DarkRP Mod, here are the new adapted changes.
- [All 'characters' may: mug, raid, steal, terror, etc...] While different job roles may spawn with or have access to specific equipment by default, all players have access to the required tools via a number of dealers. E.g. - Black Market Dealer sells lock-picks, armory lock-picks, stolen police equipment.
- [NO ADVERTING] Advertising has been abolished and replaced with an admin replay addon, which allows staff to view events after the time. Further to that we have implemented an evidence based report system as is found in many other RP games. Players are encouraged and advised on how to record gameplay via our Discord.
-[PLAYER REVIVAL] Players are able to be revived if killed, this simple addition adds numerous further features for in-game punishment of rule breakers, using RP systems following revival to maintain the quality of RP while too dealing with the individual problem via the roleplay led in-game justice system and relevant law enforcement tools and addons.
-[NO FAILRP] We have too abolished FailRP, in conjunction with our re-imagining of character roles, and the mass un-restriction of gameplay crimes, FailRP is no longer necessary. FailRP has been replaced with 'NORP', a server rule, not an IG crime, that disallows 'Self-Serving' and non active roleplay of RP crucial characters. This rule is easily moderated via simple Logging addons, and supported by our evidence based reports policy (found in our Discord).
-[NO RDM] RDM has been replaced with MassDM. While RDM in its literal sense is annoying, the elemental realism this simple change provides, accompanied with revival systems and moderation logging; enables us to identify, deal with, and manage MassDM with minimal interruption to RP. While paramedic addons handle the negative financial and RP effects of RDM, admins can handle the mass disruption of MassDM.

Planned Features:
-Donation Features:
Avoiding 'pay 2 win' is an obvious tenet to adhere to, in light of this, our planned donation schemes are to be based around balance and gameplay features. In the update due next month expect:
  • Custom Secure Radio Channels.
  • Custom Weapon Skins.
  • Upgradable inventory slots.

Economy Information:
In order to maintain a fair and balanced economy, values and prices have been calculated and tested over tens of in-game hours, to find an appropriate balance of risk and reward. Cash sinkholes include high priced weapons (a RP feature of the servers theme 'London'). As well as an easily accessible healing asset, helping to keep cash flowing and extending RP lives. [These features are to be extended with player-base alongside the planned features.
Thank you for reading our Server-Plug, please don't forget to comment with any feedback andto check out AtomicG's HarcoreRP @:
54.36.230.53:27015
or
**"[UK] AtomicG- HardcoreRP ⋆ BITCOIN ⋆ PRINTERS ⋆ NPC CIVS ⋆" - [**on the server browser]

-- Please Vote @: Here & Here --

Server Screenshots:
https://i.imgur.com/9Pl44CO.jpg
https://i.imgur.com/xa4hO3d.jpg
https://i.imgur.com/8rsCkBu.jpg
https://i.imgur.com/mTRXLHc.jpg
https://i.imgur.com/yhy60JO.jpg
https://i.imgur.com/6UIibDb.jpg
https://i.imgur.com/Z7zoins.jpg
https://i.imgur.com/RtTHijr.jpg
https://i.imgur.com/WlaDpw7.jpg
https://i.imgur.com/2cF40T4.png
https://i.imgur.com/VKkYY3e.png
https://i.imgur.com/od45mrS.png
https://i.imgur.com/o2xaF2L.png

54.36.230.53:27015
submitted by MaxCrewUK to DarkRP [link] [comments]

Links for PMC's new and old.

With the .12 patch looming, and new players joining all the time, I thought I would create a post containing all the best and most relevant links to websites to aide new and old players alike. Below you will find a comprehensive list of the most useful pages I have found so far. Hope this is helpful, if you think it is, feel free to save the thread and share it to any new threads that pop up with titles like ‘New player, how do I find this key/exit’ or ‘New player, what mods can I use for this gun’, etc. If it gets enough upvotes and people think it is a good resource, I will keep it updated. Enjoy :D

WEAPON MODDING

This is a really handy resource as far as an ''outdated'' page for creating weapon builds from EFTDB. Select weapon at top, then select a mod for each slot. At the bottom of the page it will show you where you can buy the mods you selected and a rough price [actual price depends on various factors], along with the trader level required.
https://www.eftdb.one/weaponmodding/220001/AK-74N/
Note-1: If you mouse-hover the mods it will show its effect on weapon stats.
Note-2: It seems EFTDB is a bit outdated as some weapons and/or mods are missing, and trader levels may be different to current build. I still find it a really handy resource though, due to the ability to create weapon builds. Would love to see it updated.
---
This site has been mentioned as an alternative to EFTDB for making weapon builds, created by TarkovArmory. This one seems to be up to date, but is lacking pictures. They also seem to have a pretty good ammo chart on their website. Worth checking out.
https://tarkovarmory.com/weapons
---
As EFTDB is slightly out of date, you certainly can find all the up to date information on weapon attachments from the Gamepedia pages [below]. Select a weapon to see which mods will fit on it, or search the mod's name to be taken to its specific page. Or check the weapon mods page for tables of the mods and their +/- on attributes.
https://escapefromtarkov.gamepedia.com/Weapons
https://escapefromtarkov.gamepedia.com/Weapon_mods
---
Below is a spreadsheet that shows the Optimum Weapon Builds for each weapon, created by Virion. So if you are a min/maxer, and don't want to go through the agony of experimenting with every mod for every weapon, this is a handy resource. The ones in BOLD are the current 'best' of their calibre/category.
https://docs.google.com/spreadsheets/d/1yHyVEVB5oN0qL_pR1qTNP1_ICmzJ3SCFJQNb6XDM_DQ/edit#gid=0
Note: As mentioned on the spreadsheet itself, some of the images are outdated.

RIG SLOTS

Another handy page from EFTDB is this one which shows each Tactical Rig, the rough price, if it can be traded for and from whom and what Loyalty Level required; along with the layout of the slots available in handy images.
https://www.eftdb.one/rigs
Note: As mentioned above, EFTDB is slightly outdated, for example, there are a few rigs missing from this page. At the bottom of this article is a link to an infographic created by Veritas, which has a section showing all current rigs.

MAPS

This is a good place to find all the best maps, compiled by GameMaps.co.uk but created by various people. I suggest where possible, when learning any raid, it can be helpful to have a map open on a second monitor if you have one, until you learn your way around. With enough experience you will learn the maps and points of interest better than the back of your hand, so the more you play the less you will need it. There is a selection of high quality maps for each raid, I am sure everyone will prefer one or another, I prefer the 3D maps where available. Some maps show spawns for keys and quest items/locations.
http://www.gamemaps.co.uk/game/tarkov

QUESTS

Next is the best place to find all the quests, and quest-guides. The folks who contribute to the Tarkov Gamepedia page are legit legends. Select the trader to see a table of their quests and rewards. Click on any individual quest and you will be greeted by a detailed guide of how to complete the quest, along with handy pictures and maps where necessary.
https://escapefromtarkov.gamepedia.com/Quests
---
To go along with this, a handy guide to items you should be hoarding to finish quests. So you can be collecting things from your first raid you might use to complete a quest 2 weeks later. This image is updated when the quests are. There used to be a text-based list, which I found really handy, because I copy/pasted into a .txt file and updated it when I found new items from the list, this sadly I can no longer find.
https://escapefromtarkov.gamepedia.com/Quests#/media/File:QuestItemRequirements.png

TRADERS

If you want to know what the traders sell at loyalty level 4, but you are only LL1, these pages will give you an overview of what each trader has at each level. You can also see a table of their quests too if you expand that option, but I find the previous link provided above is handier for that purpose to be honest.
The Rapist - https://escapefromtarkov.gamepedia.com/Therapist
Skier - https://escapefromtarkov.gamepedia.com/Skier
Peacekeeper - https://escapefromtarkov.gamepedia.com/Peacekeeper
Mechanic - https://escapefromtarkov.gamepedia.com/Mechanic
Ragman - https://escapefromtarkov.gamepedia.com/Ragman
Note-1: Fence Trader only sells things that PMC’s have traded to him, can be a handy place to find rare items sometimes [less so since the flea market was launched], but items generally are cheaper to buy directly from the traders if you have the required loyalty levels.
Note-2: The Flea Market is a player driven system where you can buy and sell items. Some items will be up for Roubles/Euros/Dollars and some will be up for trade for other items people might require.
Note-3: A few items, such as melee weapons can only be sold to Fence, or put on the Flea Market. Other items can only be sold to certain traders, for instance Therapist will not buy weapons, but is the only trader that will take meds from you [other than fence].
Note-4: Several items can be sold to several traders, but you will get a different price depending on which trader you sell it to. For instance, Therapist will give you the highest price for rare items like Roosters/Clocks/Rollers/Bitcoins/Gold Chains/Cat Figurines/Lion Statues.
Note-5: Even though certain items have a high price to trade in, it might be worth holding onto them to trade in for other items. For example, you can trade in 1 roller and 5 gold chains to Therapist for a Money Case, which you can then sell back to her for more money than if you just sold her the individual items, or can be put on the Flea Market if you prefer.
---
Below is a site showing a table of Barter Trades created by Sheiddy. It provides information regarding which items can be given to each trader in return for other items. It also displays where the original items can often be found, and the rough price of the items you can receive if you were to pay for them.
http://tarkov.sheiddy.com/

KEYS

Next is the best key guide I have found, compiled by the United We Stand gaming community, specifically The Velvet Gentleman. As far as I am aware, this is the only key guide worth looking at. It informs you of which keys are available on each map, what is behind the door, and where you can find said key if it has a static spawn [most of which have pictures of the spawn]. There is even some colour coding going on so you can quickly pick out the most valuable keys/rooms.
https://forums.uwsgaming.com/topic/3871-map-keys-and-you/
Note-1: Be aware that not all keys have a static spawn, and some will have to be found on scavs. Also keep in mind that just because a key has a static spawn, doesnt mean you won't/can't find it on a Scav. You can literally spawn as a Scav with any of these keys, barring KIBA#2 I believe.
Note-2: Worth considering, KIBA key #2 is gained by completing a quest for Mechanic; and KIBA key #1 has a static spawn, but I personally found one on a scav this wipe [11.7], and it can also be traded from Therapist to the tune of 50x condensed milk.

AMMO

Ammo Chart from Hazmattr, this one is broken down into calibre, so easy to follow imo. It seems to be fully up to date. It also shows the trader you can buy said ammo from, and the level you need to be with said trader, there is also a gamepedia link to any quests required to unlock each ammo. I find this easier to navigate than the official ammo guide sheet due to the layout.
https://docs.google.com/spreadsheets/d/1-q1Yiof1FfGBlIoudl799BFyx_fMYEGt-TP2Itci4z0/edit#gid=0
---
Of course, you can always check the official ammo chart provided by Battle State Games [below].
https://docs.google.com/spreadsheets/d/1l_8zSZg-viVTZ2bavMEIIKhix6mFTXuVHWcNKZgBrjQ/htmlview?sle=true
Note: BSG has a habit of changing the values of ammunition and not releasing an up to date chart until weeks and/or months later. They will undoubtedly be changing things with .12, and will be adding new ammo types; hopefully they release the new chart with the wipe.
---
Also worth mentioning in context of ammo is this chart by NoFoodAfterMidnight, which shows your chance for each ammo to penetrate each armour class, along with fragmentation chance. This is the best way to work out which ammo you should be running with each gun when going against highly geared players.
https://docs.google.com/spreadsheets/d/1jjWcIue0_PCsbLQAiL5VrIulPK8SzM5jjiCMx9zUuvE
Note-1: As mentioned above briefly, some ammunition types are only available after finishing certain trader quests. So don’t expect to be buying the best ammo as soon as you join the game. That being said, you will be able to find all the ammo’s on the flea market, but at the beginning of a wipe period, these will be placed on there by PMC’s with higher levels at inflated prices as and when they are unlocked.
Note-2: Depending on your target, ammo with high flesh damage or high armour penetration is going to be relevant. If you shoot high flesh damage ammo at high end armour, you might as well be shooting a water pistol at a battleship.
Note-3: Legs are never armoured, so feel free to use high flesh damage ammo on even the tankiest players, as long as you can get enough rounds into their legs before they merc you. This playstyle is not always the best idea, as sometimes peoples legs are obscured, and it will take a few rounds, giving the enemy time to turn and spray you down.
Note-4: Firing shotguns at reasonable-to-good armour is like shooting a Nerf gun at the Empire State Building. Firing shotguns at legs is like shooting a flame thrower at an ant!

Honourable Mentions

Perhaps an under-appreciated site, which I have rarely seen mentioned on reddit, is this one by J James. He has a Key guide [with images], Mod Compatibility guide [select or search mod to see what it fits], Weapon Mod Compatibility guide [select weapon to see what will fit on it]. There is also another breakdown of which items the traders possess by level similar to the ones from gamepedia I linked above. This seems to be a solo project by J James and a labour of love, props to him.
http://www.jjames.info/game_page.php?gameName=Escape%20From%20Tarkov
---
Below is a massive infographic created by Veritas providing visual reference guides for things like Ballistics, health items, Firearm attributes [outdated], armour stats, rig slots, bag sizes, and labs keycard locations [some of them, not all]
https://cdn.discordapp.com/attachments/570624452220420115/573619468513706093/info96.jpg
---
This next one, EFT Field Guide, has various resources. A keyguide where you select the key and it will show you a map with spawn point indicated; a sort-able ammo chart; a sort-able list of items showing their values, and more importantly their value-per-slot; a checklist feature where individuals can create a list of items they need/want to collect; and a list of popular youtubers/streamers.
https://eftfg.com/
---
This last one is a new player guide that may be useful to some. Created by Tax (Jonathan Ballard), this guide covers many of the basics a new player might require. Just FYI though, this was created over a year ago and as such some features are missing. I only quickly skimmed through it, but the top half seems pretty sound, and does give some pretty solid advice for newbie Tarkovians. It is displayed in a way that reminds me of the handbooks that used to come with video games when I was a kid, nostalgia.
https://drive.google.com/file/d/0BxcqjnBUL1r7emg3VWJYUlp3dGM/view

I cannot give enough credit to the guys and gals that have made these sites. These people as far as I know have done this for the love of the game, and I think they deserve a pat on the back for their work. Kudos to the creators, whomever they may be. Most of the sites mentioned seem to be regularly updated with new content when BSG releases it, so they will be crucial to keeping people informed when .12 drops. Any that are outdated have been noted as such.
Hope this helps some new players out, and maybe even some experienced Tarkovians. If you think of anything that would fit well on this list, comment below and I will update the main article. See you in the field my Cheekis.
Contributors: Credit to u/Danger597 for link to Virion's Optimum Weapon Builds. Credit to u/Dracborne/ for link to Sheiddy's Barter Guide. Credit to u/ZombieToof/ for link to TarkovArmory weapon build site. Credit to u/betajosh711 for link to EFT Field Guide. Credit to u/mmm3k3/ for link to Tax's Player Guide.
Final Note: I didn't include youtube guides as there are many youtubers out there that create good video based guides. If this article does well though, I may create a separate article showcasing some of the best.
submitted by brokendreamz101 to EscapefromTarkov [link] [comments]

/r/Bitcoin FAQ - Newcomers please read

Welcome to the /Bitcoin Sticky FAQ

You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments.
The following videos are a good starting point for understanding how bitcoin works and a little about its long term potential:
For some more great introductory videos check out Andreas Antonopoulos's YouTube playlists, he is probably the best bitcoin educator out there today. Also have to give mention to James D'Angelo's Bitcoin 101 Blackboard series. Lots of additional video resources can be found at the videos wiki page or /BitcoinTV.
Key properties of bitcoin
Some excellent writing on Bitcoin's value proposition and future can be found here. Bitcoin statistics can be found here, here and here. Developer resources can be found here and here. Peer-reviewed research papers can be found here. The number of times Bitcoin was declared dead by the media can be found here. Scaling resources here, and of course the whitepaper that started it all.

Where can I buy bitcoins?

BuyBitcoinWorldwide.com and Howtobuybitcoin.io are helpful sites for beginners. You can buy or sell any amount of bitcoin and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also, check out the bitcoinity exchange resources for a larger list of options for purchases.
Bank Transfer Credit / Debit card Cash
Coinbase Coinbase LocalBitcoins
Gemini Bitstamp LibertyX
GDAX Bitit Mycelium LocalTrader
Bitstamp Cex.io BitQuick
Kraken CoinMama WallofCoins
Xapo BitcoinOTC
Cex.io
itBit
Bitit
Bitsquare
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Cashila or Bitwage.
Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".

Securing your bitcoins

With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
Android iOs Desktop
Mycelium BreadWallet Electrum
CoPay AirBitz Armory
Another interesting use case for physical storage/transfer is the Opendime. Opendime is a small USB stick that allows you to spend Bitcoin by physically passing it along so it's anonymous and tangible like cash.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email!
2FA requires a second confirmation code to access your account, usually from a text message or app, making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
Google Auth Authy
Android Android
iOS iOS

Where can I spend bitcoins?

A more comprehensive list can be found at the Trade FAQ but some more commons ones are below.
Store Product
Gyft Gift cards for hundreds of retailers including Amazon, Target, Walmart, Starbucks, Whole Foods, CVS, Lowes, Home Depot, iTunes, Best Buy, Sears, Kohls, eBay, GameStop, etc.
Steam, HumbleBundle, Games Planet, itch.io, g2g and kinguin For when you need to get your game on
Microsoft Xbox games, phone apps and software
Spendabit, The Bitcoin Shop, Overstock, DuoSearch, The Bitcoin Directory and BazaarBay Retail shopping with millions of results
ShakePay Generate one time use Visa cards in seconds
NewEgg and Dell For all your electronics needs
Cashila, Bitwa.la, Coinbills, Piixpay, Bitbill.eu, Bylls, Coins.ph, Bitrefill, Pey.de, LivingRoomofSatoshi, Hyphen.to, Coinsfer, GetPaidinBitcoin, Coins.co.th, More #1, #2 Bill payment
Foodler, Menufy, Takeaway, Thuisbezorgd NL, Pizza For Coins Takeout delivered to your door!
Expedia, Cheapair, Lot, Destinia, BTCTrip, Abitsky, SkyTours, Fluege the Travel category on Gyft and 9flats For when you need to get away
BoltVM, BitHost VPS service
Cryptostorm, Mullvad, and PIA VPN services
Namecheap, Porkbun For new domain name registration
Stampnik and GetUSPS Discounted USPS Priority, Express, First-Class mail postage
Reddit Gold Premium membership which can be gifted to others
Coinmap, 99Bitcoins and AirBitz are helpful to find local businesses accepting bitcoins. A good resource for UK residents is at wheretospendbitcoins.co.uk.
There are also lots of charities which accept bitcoin donations, such as Wikipedia, Red Cross, Amnesty International, United Way, ACLU and the EFF. You can find a longer list here.

Merchant Resources

There are several benefits to accepting bitcoin as a payment option if you are a merchant;
If you are interested in accepting bitcoin as a payment method, there are several options available;

Can I mine bitcoin?

Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out.
If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. Bitseed is an easy option for getting set up. You can view the global node distribution here.

Earning bitcoins

Just like any other form of money, you can also earn bitcoins by being paid to do a job.
Site Description
WorkingForBitcoins, Bitwage, XBTfreelancer, Cryptogrind, Bitlancerr, Coinality, Bitgigs, /Jobs4Bitcoins, Rein Project Freelancing
OpenBazaar, Purse.io, Bitify, /Bitmarket, 21 Market Marketplaces
Watchmybit, Streamium.io, OTika.tv, XOtika.tv NSFW, /GirlsGoneBitcoin NSFW Video Streaming
Bitasker, BitforTip, WillPayCoin Tasks
Supload.com, SatoshiBox, JoyStream, File Army File/Image Sharing
CoinAd, A-ads, Coinzilla.io Advertising
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins)

Bitcoin Projects

The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
Project Description
Lightning Network, Amiko Pay, and Strawpay Payment channels for network scaling
Blockstream and Drivechain Sidechains
21, Inc. Open source library for the machine payable web
ShapeShift.io Trade between bitcoins and altcoins easily
Open Transactions, Counterparty, Omni, Open Assets, Symbiont and Chain Financial asset platforms
Hivemind and Augur Prediction markets
Mirror Smart contracts
Mediachain Decentralized media library
Tierion and Factom Records & Titles on the blockchain
BitMarkets, DropZone, Beaver and Open Bazaar Decentralized markets
Samourai and Dark Wallet - abandoned Privacy-enhancing wallets
JoinMarket CoinJoin implementation (Increase privacy and/or Earn interest on bitcoin holdings)
Coinffeine and Bitsquare Decentralized bitcoin exchanges
Keybase and Bitrated Identity & Reputation management
Bitmesh and Telehash Mesh networking
JoyStream BitTorrent client with paid seeding
MORPHiS Decentralized, encrypted internet
Storj and Sia Decentralized file storage
Streamium and Faradam Pay in real time for on-demand services
Abra Global P2P money transmitter network
bitSIM PIN secure hardware token between SIM & Phone
Identifi Decentralized address book w/ ratings system
Coinometrics Institutional-level Bitcoin Data & Research
Blocktrail and BitGo Multisig bitcoin API
Bitcore Open source Bitcoin javascript library
Insight Open source blockchain API
Leet Kill your friends and take their money ;)

Bitcoin Units

One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
Unit Symbol Value Info
millibitcoin mBTC 1,000 per bitcoin SI unit for milli i.e. millilitre (mL) or millimetre (mm)
microbitcoin μBTC 1,000,000 per bitcoin SI unit for micro i.e microlitre (μL) or micrometre (μm)
bit bit 1,000,000 per bitcoin Colloquial "slang" term for microbitcoin
satoshi sat 100,000,000 per bitcoin Smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $500 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki.
Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. A complete list of bitcoin related subreddits can be found here
Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval.
Welcome to the Bitcoin community and the new decentralized economy!
submitted by BinaryResult to Bitcoin [link] [comments]

Day 2: I will repost this guide daily until available solutions like Segwit & order batching are adopted, the mempool is empty once again, and transaction fees are low. You can help. Take action today

Subhan Nadeem has pointed out that:
If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
A few thousand bitcoin users from /Bitcoin switching to making their next transactions Segwit transactions will help take pressure off the network now, and together we can encourage exchanges/wallets to rapidly deploy Segwit for everyone ASAP. Let's make it happen.
Exchanges: Find out if your exchange has deployed Segwit already. If not, politely request that they do so within 30-days or they will lose your business. Sign-up for an account with a Segwit deployed/ready exchange now
Full list: https://bitcoincore.org/en/segwit_adoption/
Wallets: Make sure you have a Segwit capable wallet installed and ready to use for your next bitcoin transaction
Hardware Wallets:
Desktop Wallets
iOS Wallets:
Android Wallets
FAQs
If I'm a HODLer, will it help to send my BTC to a Segwit address now?
  • No, just get ready now so that your NEXT transaction will be to a Segwit wallet.
Can you please tell me how to move my bitcoins to segwit address in Bitcoin core wallet? Does the sender or receiver matter?
  • The Bitcoin core wallet does not yet have a GUI for its Segwit functionality. Download Electrum v3.0.3 to generate a Segwit address.
    via HowToToken.com:
    A transaction between two SegWit addresses is a SegWit transaction.
    A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
    A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a Segwit Tx if the sending address is a Segwit address.
Is there a hardware wallet that does segwit addresses?
  • Yes, Trezor supports Segwit by default. Ledger Nano also has support.
What wallet are you using to "batch your sends"? And how can I do that?
  • Using Electrum, the "Tools" menu option: "Pay to many".
    Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Segwit blog guides
Previous Day's Threads
Edit: added FAQ's to the list, corrections, BitWallet
submitted by Bastiat to Bitcoin [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

Day 4: I will repost this guide daily until available solutions like SegWit & order batching are mass adopted, the mempool is empty once again, and transaction fees are low. ARE YOU PART OF THE SOLUTION? News: Unconfirmed TX's @ 174K, more exchanges adding SegWit, Core prioritizes SegWit GUI

NOTE Just a daily repost because original OP Bastiat seems to be offline (due to holidays I guess). However, this is quite important as I see much misinformation on which exchanges use segwit or not. Please upvote for awareness.
BACKGROUND
Subhan Nadeem has pointed out that:
If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
A few thousand bitcoin users from /Bitcoin switching to making their next transactions SegWit transactions will help take pressure off the network now, and together we can encourage exchanges/wallets to rapidly deploy SegWit for everyone ASAP. Let's make it happen. You can help by taking one or more of the action steps below.
ACTION STEPS
  1. If your favorite wallet has not yet implemented SegWit, kindly ask them to do so immediately. In the meantime start using a wallet that has already implemented SegWit.
  2. If your favorite exchange has not yet implemented SegWit, try to avoid making any further purchases of bitcoin at that exchange and politely inform them that if they do not enable SegWit within 30-days they will lose your business. Sign-up for an account at a SegWit deployed exchange now and initiate the verification process so you'll be ready to bail
  3. Help educate newcomers to bitcoin about the transaction issue, steer them towards SegWit wallets from day one, and encourage them to avoid ever purchasing bitcoin through non-SegWit ready exchanges that are harming bitcoin
IMPORTANT NOTE: The mempool is currently overflowing. If you are a long-term holder and really have no reason to move your bitcoins at this time, wait until the mempool starts to clear and transaction fees go down before moving your bitcoins to a SegWit address or SegWit friendly exchange
SELECTED TOP EXCHANGES BY SEGWIT & BATCHING STATUS
There are 2 different Segwit address formats.
  • p2sh - starting with a "3..."
  • bech32 - starting "bc1..."
Not many wallets/exchanges support bech32 yet and will claim the address is invalid if you try to send to it. bech32 ("native Segwit") is a mildly better solution compared to p2sh.
Exchange Batching Status Segwit (p2sh) Send to bech32
Binance Yes No No
Bitfinex Yes No No
Bitonic ? No No
Bitstamp Yes Yes No
Bittrex Yes ? ?
Coinbase/GDAX No No No
Gemini No No No
HitBTC Yes Yes ?
Huboi ? ? ?
Kraken No Yes ?
LocalBitcoins No ? ?
OKEx ? ? ?
Poloniex ? Yes ?
QuadrigaCX Yes Yes ?
Shapeshift Yes No No
Source 1
Source 2
WALLETS
Make sure you have a SegWit capable wallet installed and ready to use for your next bitcoin transaction
SegWit Enabled Wallets Wallet Type
Ledger Nano S Hardware
Trezor Hardware
Electrum Desktop
Armory Desktop
Edge iOS
GreenAddress iOS
BitWallet iOS
Samourai Android
GreenBits Android
Electrum Android
TODAY's NEWS/DEVELOPMENTS/VICTORIES
MEMPOOL/SEGWIT STATISTICS
FAQs
If I'm a HODLer, will it help to send my BTC to a SegWit address now?
  • No, just get ready now so that your NEXT transaction will be to a SegWit wallet. Avoid burdening the network with any unneccessary transactions for now.
Can you please tell me how to move my bitcoins to SegWit address in Bitcoin core wallet? Does the sender or receiver matter?
  • The Bitcoin core wallet does not yet have a GUI for its SegWit functionality. Download Electrum v3.0.3 to generate a SegWit address.
    A transaction between two SegWit addresses is a SegWit transaction.
    A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
    A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a SegWit Transaction if the sending address is a SegWit address.
    Source
So what address can I send to safely, there is so much confusion?
  • As of right now...
Non-Segwit Transactions
non-Segwit address to…
non-Segwit address OK
3..... (Segwit) OK
bc1.... (Segwit) No (no support for them yet)
Segwit Transactions
3... address (Segwit) to…
non-Segwit address OK
3..... (Segwit) OK
bc1.... (Segwit) No (no support for them yet)
bc1... address (Segwit) to…
non-Segwit address OK
3..... (Segwit) OK
bc1.... (Segwit) OK
What wallet are you using to "batch your sends"? And how can I do that?
  • Using Electrum, the "Tools" menu option: "Pay to many".
    Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Why doesn't the Core Wallet yet support SegWit?
  • The Core Wallet supports SegWit, but its GUI doesn't. The next update will likely have GUI support built-in
Why isn't a large exchange like Coinbase SegWit ready & deployed when much smaller exchanges already are? Why do they default to high fees? Where is the leadership there?
SEGWIT BLOG GUIDES
PREVIOUS DAY'S THREADS
There's lots of excellent info in the comments of the previous threads:
submitted by psycongoroo to Bitcoin [link] [comments]

Day 5: I will post this guide regularly until available solutions like SegWit & order batching are mass adopted, the mempool is empty once again, and transaction fees are low. User demand from this community can help lead to some big changes. Have you joined the /r/Bitcoin SegWit effort?

SUMMARY
Segregrated Witness (SegWit) was activated on the Bitcoin network August 24, 2017 as a soft fork that is backward compatible with previous bitcoin transactions (Understanding Segregated Witness). Since that time wallets and exchanges have been slow to deploy SegWit, some admitting in December 2017 that they have not even started work. If users demand SegWit now it will temporarily releive the transaction backlog while bigger solutions like Lightning are developed.
TODAY's NEWS/DEVELOPMENTS/VICTORIES
MEMPOOL/SEGWIT STATISTICS
BACKGROUND
Subhan Nadeem has pointed out that:
If every transaction in the Bitcoin network was a SegWit transaction today, blocks would contain up to 8,000 transactions, and the 138,000 unconfirmed transaction backlog would disappear instantly. Transaction fees would be almost non-existent once again.
A few thousand bitcoin users from /Bitcoin switching to making their next transactions SegWit transactions will help take pressure off the network now, and together we can encourage exchanges/wallets to rapidly deploy SegWit for everyone ASAP. Let's make 80%+ SegWit happen fast. You can help by taking one or more of the action steps below.
ACTION STEPS
  1. If your favorite wallet has not yet implemented SegWit, kindly ask them to do so immediately. In the meantime start using a wallet that has already implemented SegWit.
  2. If your favorite exchange has not yet implemented SegWit, try to avoid making any further purchases of bitcoin at that exchange and politely inform them that if they do not enable SegWit within 30-days they will lose your business. Sign-up for an account at a SegWit deployed/ready exchange now and initiate the verification process so you'll be ready to bail
  3. Help educate newcomers to bitcoin about the transaction issue, steer them towards SegWit wallets from day one, and encourage them to avoid ever purchasing bitcoin through non-SegWit ready exchanges that are harming bitcoin.
  4. Spread the word! Conact individuals, websites, etc that use bitcoin, explain the benefits of SegWit to everyone, and request they make the switch
IMPORTANT NOTE: The mempool is currently still quite backlogged. If you are a long-term holder and really have no reason to move your bitcoins at this time, wait until the mempool starts to clear and transaction fees go down before moving your bitcoins to a SegWit address or SegWit friendly exchange.
SELECTED TOP EXCHANGES BY SEGWIT & BATCHING STATUS
Exchange Segwit Status Batching Status
Binance NOT READY Yes
Bitfinex Ready ?
Bitonic Ready ? Yes
Bitstamp Deployed Yes
Bittrex ? Yes
Coinbase/GDAX NOT READY No
Gemini Ready No
HitBTC Deployed Yes
Huboi ? ?
Kraken Ready Yes
LocalBitcoins Ready ?
OKEx ? ?
Poloniex ? Yes
QuadrigaCX Deployed Yes
Shapeshift Deployed No
Source 1
Source 2
SELECTED WALLETS THAT HAVE SEGWIT ALREADY
Make sure you have a SegWit capable wallet installed and ready to use for your next bitcoin transaction
SegWit Enabled Wallets Wallet Type
Ledger Nano S Hardware
Trezor Hardware
Electrum Desktop
Armory Desktop
Edge iOS
GreenAddress iOS
BitWallet iOS
Samourai Android
GreenBits Android
Electrum Android
FAQs
If I'm a HODLer, will it help to send my BTC to a SegWit address now?
  • No, just get ready now so that your NEXT transaction will be to a SegWit wallet. Avoid burdening the network with any unneccessary transactions for now.
Can you please tell me how to move my bitcoins to SegWit address in Bitcoin core wallet? Does the sender or receiver matter?
  • The Bitcoin core wallet does not yet have a GUI for its SegWit functionality. Download Electrum v3.0.3 to generate a SegWit address.
    A transaction between two SegWit addresses is a SegWit transaction.
    A transaction sent from a SegWit address to a non-SegWit address is a SegWit transaction.
    A transaction sent from a non-SegWit address to a SegWit address is NOT a SegWit transaction. You can send a SegWit Tx if the sending address is a SegWit address.
    Source
What wallet are you using to "batch your sends"? And how can I do that?
  • Using Electrum, the "Tools" menu option: "Pay to many".
    Just enter your receive addresses and the amounts for each, and you can send multiple transactions for nearly the price of one.
Why doesn't the Core Wallet yet support SegWit?
  • The Core Wallet supports SegWit, but its GUI doesn't. The next update will likely have GUI support built-in
Why isn't a large exchange like Coinbase SegWit ready & deployed when much smaller exchanges already are? Why do they default to high fees? Where is the leadership there?
SEGWIT BLOG GUIDES
PREVIOUS DAY'S THREADS
There's lots of excellent info in the comments of the previous threads:
Edit: Bitonic batching status updated to 'Yes'
submitted by Bastiat to Bitcoin [link] [comments]

Obvious case of Blockstream & Bitcoin Core product placement? (article series on privacy & cryptocurrencies)

In a 4-part series, Eric Wall neatly demonstrates how to do product placement for Blockstream, Bitcoin Core and their affiliates including the usual troupe of BS/Core "experts".
Note: "article series by the Human Rights Foundation (HRF) on privacy and cryptocurrency, funded by the Zcash Foundation".
Don't get me wrong, there is plenty good information contained in the articles linked below. But the product placement of Bitcoin Core, Lightning, Liquid and "Green", could hardly be more obvious. For an article series "on privacy and cryptocurrencies", there is a heavy focus on BTC except in a single part (III) where the privacy coins Zcash, Monero, Grin and Beam are examined.
I recommend you read the articles. Below I've pointed out certain items that are mentioned and linked frequently within each article.
Privacy and Cryptocurrency, Part I: How Private is Bitcoin?
Privacy and Cryptocurrency, Part II: Bitcoin Wallets
  • website: bitcoin.org (get started)
  • wallet: Bitcoin Core
  • wallet: Wasabi
  • wallet: Armory
  • wallet: mSigna
  • wallet: Bitcoin Knots
  • wallet: Electrum
  • person: Peter Todd
  • person: Jameson Lopp
  • person: Udi Wertheimer
  • person: Hampus Sjöberg
  • hardware wallet: Trezor
  • hardware wallet: Ledger
  • payment server: BTCPay Server
  • payment code service: PayNym.is (made by Samourai)
  • 2nd layer: Lightning Network
  • sidechain: Liquid (by Blockstream)
  • wallet: Blockstream Green (linked via blockstream site)
  • wallet: Samourai (linked via it's own site)
  • wallet: BRD (linked via bitcoin.org!)
  • wallet: Schildbach (linked via bitcoin.org!)
  • mailing list: bitcoin-dev (run by Bitcoin Core people)
Privacy and Cryptocurrency, Part III: Should You Use a Privacy Coin?
  • Lightning
  • Liquid
  • coin: Monero
  • coin: Zcash
  • coin: Grin
  • coin: Beam
  • person: Daniel Lehnberg (Grin)
  • person: Andrew Poelstra (Blockstream, MimbleWimble)
  • person: Guy Corem.(Beam)
  • person: Ian Miers (Zcash)
  • person: Francisco Cabañas (Monero)
Privacy and Cryptocurrency, Part IV: Stablecoins— Blacklists and Traceability
  • coin: USDT on Liquid
  • wallet: Blockstream Green
  • Lightning Network (for future support of Liquid tokens like USDT)
  • person: Jameson Lopp
  • person: Matt Odell
As we can see, every article prominently highlights of Blockstream or Bitcoin Core affiliated products, persons or related companies. And every article studiously omits any mention of Bitcoin Cash or any of the privacy technologies built on it (CashShuffle) or in development on it (CashFusion), or the stable coin USDH operating on top of Bitcoin Cash.
There are certainly other cryptocurrencies and projects on them which offer privacy features, but are left unexamined in this series (e.g. projects offering privacy on ETH, mixing in Dash, etc)
In conclusion the intentions ascribed to the HRF in the first article.
The intention of the Human Rights Foundation is to examine these technologies and elucidate on their potential of bringing economic and political freedom to the individual. While there are many angles in the context of money that are within the scope of such an endeavor, we’ve chosen to focus on the topic of privacy foremost. In that pursuit it’s also clear that the degree to which cryptocurrencies enable privacy is not by any means trivial or binary — it varies greatly depending on the user’s particular choice of core and ancillary technologies and usage patterns, as well as the capabilities and sophistication of the attacker.
submitted by DarthBacktrack to btc [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

Bitcoin Armory Setup - YouTube Bitcoin Armory - Creating a Lockbox Sending Bitcoin - Armory Guide Bitcoin Armory Walk Through How to install Bitcoin Armory in Ubuntu 14.04

This means users never have to trust the Armory team and can use it with the Glacier Protocol. Satoshi would be proud! Users are empowered with multiple encrypted Bitcoin wallets and permanent one-time ‘paper backups’. Armory pioneered cold storage and distributed multi-signature. Bitcoin cold storage is a system for securely storing Bitcoins on a completely air-gapped offline computer ... My Armory shortcut is now "C:\Program Files (x86)\Armory\ArmoryQt.exe" --datadir="e:/armory" --satoshi-datadir="e:\bitcoin" The armory executables are on C: but the freaking huge blockchains are on my outboard E: drive for both Armory and BitcoinQT. Now my C: drive has space and I can install a wallet that does not require the blockchain, and a ... Armory builds enterprise grade Bitcoin security software solutions and provides Bitcoin security consulting services to institutions for deploying a Bitcoin security plan. In early 2011 Alan Reiner started building the best Bitcoin wallet which pioneered the cold storage Bitcoin wallet concept. This innovation created a new best practice standard for Bitcoin security by splitting the core ... The Root Key is all you need to send bitcoin from that wallet without using Armory, see Armory Root Key -> Addresses and Private Keys. Version 1.35c - SecurePrint. The only way I know about at present is to install and run Armory on an OFFLINE PC and use the Armory wallet recovery. See Offline PC setup below. I will update if I find another way. The Armory developers (goatpig, droark, and achow101) support Segregated Witness as is in its current form, and also support Bitcoin Core. The Armory developers also oppose hard forks that may attack the original chain. Should a long-lasting hard fork that does not attack the original chain exist, we would consider implementing functionality required to allow Armory users to transact on that ...

[index] [42372] [14364] [38140] [20502] [1217] [26107] [27349] [37461] [212] [42580]

Bitcoin Armory Setup - YouTube

Bitcoin Armory Setup - Duration: 14:37. Bitcoin Nick Rambos 4,490 views. 14:37. How to make a Bitcoin Paper Wallet - Duration: 9:25. BTC Sessions Recommended for you. 9:25. JAVA - How To Design ... How to Download and Verify the Armory Bitcoin Wallet - Duration: 22:31. Rex Kneisley 4,903 views. 22:31. How to Install a BitPay Wallet on Linux - Duration: 2:43. BitPay 3,020 views. 2:43 . Get ... Bitcoin Armory - Spending from a Lockbox - Duration: 4:56. Andy Ofiesh 149 views. 4:56. How to create and use Multi Sig Bitcoin Wallets - Duration: 10:23. Hodl Hodl 6,541 views. 10:23 . How to ... I'm going to do a demo of Bitcoin Armory basic functionality and answer questions from a new user. Watch me setup Armory from start to finish along with downloading the blockchain from Bitcoin Core. Armory: https://www.bitcoinarmory.com/ Bitcoin Core: http...

#