mining hardware - Device not found. NO GPU output 3 ...

Bored? Looking for something to do? Start with this list of things to do in the Sacramento area.

(Credit for the below list has to be given to u/BurritoFueled, who created the original list in 2014 and updated it a year later. Almost two-thirds of the items below are still from that original list. All I’ve done with the list is revive it a little bit by updating dead links and making little tweaks when necessary. Also, thanks to those that submitted new additions to the list last week. Over a third of the below items are new and a lot of the original items have had newer information added onto them.)
People are always looking for something to do around here. Maybe you’re a transplant, unaware of what this area has to offer, or maybe you’re a lifelong resident, tired of the same old thing. Well friend, if you fall into the latter category, do not despair. There’s actually plenty of things to do in the Sacramento area – things of interest to almost any lifestyle, personality, or budget.
So, whether you’re an athlete, geek, eccentric, hipster, weirdo, sexual deviant or just a normal person looking for a new activity, below is a list of activities for you to try. Please note that it includes only activities that take place at least a few times a year – no one-off events or festivals here.
Enjoy this list. If you have any suggestions of your own to add, comment below in this thread. I'll try to keep this as up to date as possible.
Away we go.
UPDATED 10-6-20
(Note: Due to the current pandemic, some of these activities may be curtailed or not offered at all.)
submitted by PowerWindows85 to Sacramento [link] [comments]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Overwhelmed!

I am not really savvy in coding. So, the sequences of letters and numbers involved are driving me a bit crazy.
Here is what I have done:
Downloaded AwesomeMiner and as a wallet, I used Electrum. Surprisingly, when I check the bitcoin reddit, these two apps are not mentioned. Am I in the wrong track?
Now, in AM app, I used SHA-256 algorithm, BFGMiner(5.4.2), as as a pool, I used bsod mining pool.
BUT, this is what I got:
> [2020-10-16 20:18:53] No devices detected!
> [2020-10-16 20:18:53] Waiting for devices
> [2020-10-16 20:18:53] Probing for an alive pool
> [2020-10-16 20:18:53] Testing pool stratum+tcp://pool.bsod.pw:3333
>
> [2020-10-16 20:18:53] No devices detected!
>
> [2020-10-16 20:18:53] Waiting for devices
>
> [2020-10-16 20:18:53] Probing for an alive pool
Mining Engine Process started, PID: 10480
Even I understand that the mining is not working at all.
Just wondering what should I do now?

However, I check out some video on the bitcoin reddit, so I will start from there.

Any advices are welcome.
submitted by Silberwolfe to BitcoinBeginners [link] [comments]

[OWL WATCH] Waiting for "IOTA TIME" 30;

Disclaimer: This is sort of my own arbitrary editing, so there could be some misunderstandings.
I root for the spread of good spirits and transparency of IF.
📷
Hans Moog [IF]어제 오후 2:45
So why don't we just copy Avalanche? Well that's pretty simple ...
📷
Hans Moog [IF]어제 오후 2:47
1. It doesn't scale very well with the amount of nodes in the network that have no say in the consensus process but are merely consensus consuming nodes (i.e. sensors, edge devices and so on). If you assume that the network will never have more than a few thousand nodes then thats fine but if you want to build a DLT that can cope with millions of devices then it wont work because of the message complexity.
2. If somebody starts spamming conflicts, then the whole network will stop to confirm any transactions and will grind to a halt until the conflict spamming stops. Avalanche thinks that this is not a huge problem because an attacker would have to spend fees for spamming conflicts which means that he couldn't do this forever and would at some point run out of funds.
IOTA tries to build a feeless protocol and a consensus that stops to function if somebody spams conflicts is really not an option for us.
3. If a medium sized validator goes offline due to whatever reason, then the whole network will again stop to confirm any transactions because whenever a query for a nodes opinion can not be answered they reset the counter for consecutive successful voting rounds which will prevent confirmations. Since nodes need to open some ports to be available for queries it is super easy to DDOS validators and again bring the network confirmations to 0.
📷
Hans Moog [IF]어제 오후 3:05
4. Avalanche still processes transactions in "chunks/blocks" by only applying them after they have gone through some consensus process (gathered enough successfull voting rounds), which means that the nodes will waste a significant amount of time where they "wait" for the next chunk to be finished before the transactions are applied to the ledger state. IOTA tries to streamline this process by decoupling consensus and the booking of transactions by using the "parallel reality based ledger state" which means that nodes in IOTA will never waste any time "waiting" for decisions to be made. This will give us much higher throughput numbers.
📷
Hans Moog [IF]어제 오후 3:11
5. Avalanche has some really severe game theoretic problems where nodes are incentivized to attach their transactions to the already decided parts of the DAG because then things like conflict spam won't affect these transactions as badly as the transactions issued by honest nodes. If however every node would follow this "better and selfish" tip selection mechanism then the network will stop to work at all.
Overall the "being able to stop consensus" might not be too bad since you can't really do anything really bad (i.e. double spend) which is why we might not see these kind of attacks in the immediate future but just wait until a few DeFi apps are running on their platform where smart contracts are actually relying on more or less real time execution of the contracts. Then there might be some actual financial gains to be made if the contract halts and we might see alot of these things appear (including selfish tip selection).
Avalanche is barely a top 100 project and nobody attacks these kind of low value networks unless there is something to be gained from such an attack. Saying that the fact that its live on mainnet and hasn't been attacked in 3 weeks is a proof for its security is completely wrong.
Especially considering that 95% of all stake are controlled by avalanche itself
If you control > 50% of the voting power then you essentially control the whole network and attacks can mostly be ignored
I guess there is a reason for avalanche only selling 10% of the token supply to the public because then some of the named problems are less likely to appear
📷
Navin Ramachandran [IF]어제 오후 3:21
I have to say that wtf's suggestion is pretty condescending to all our researchers. It seems heavy on the troll aspect to suggest that we should ditch all our work because iota is only good at industrial adoption. Does wtf actually expect a response to this? Or is this grand standing?
📷
Hans Moog [IF]어제 오후 3:22
The whole argument of "why don't you just use X instead of trying to build a better version" is also a completely idiotic argument. Why did ETH write their own protocol if Bitcoin was already around? Well because they saw problems in Bitcoins approach and tried to improve it.
📷
Hans Moog [IF]어제 오후 3:27
u/Navin Ramachandran [IF] Its like most of his arguments ... remember when he said we should implement colored coins in 2nd layer smart contracts instead of the base layer because they would be more expressive (i.e. turing complete) completely discarding that 2nd layer smart contracts only really work if you have a consensus on data and therefore state for which you need the "traceability" of funds to create these kind of mini blockchains in the tangle?
Colored coins "enable" smart contracts and it wouldnt work the other way round - unless you have a platform that works exactly like ETH where all the nodes validate a single shared execution platform of the smart contracts which is not really scalable and is exactly what we are trying to solve with our approach.
📷
Navin Ramachandran [IF]어제 오후 3:28
Always easier to criticise than build something yourself. But yet he keeps posting these inflammatory posts.
At this point is there any doubt if he is making these comments constructively?
📷
Hans Moog [IF]어제 오후 3:43
If he at least would try to understand IOTAs vision ... then maybe he wouldn't have to ask things like "Why don't you just copy a tech that only works with fees"
📷
Hans Moog [IF]어제 오후 4:35
u/Shaar
I thought this would only be used to 'override' finality, eg if there were network splits. But not in normal consensus
That is not correct. Every single transaction gets booked on arrival using the parallel reality based ledger state. If there are conflicts then we create a "branch" (container in the ledger state) that represents the perception that this particular double spend would be accepted by consensus. After consensus is reached, the container is simply marked as "accepted" and all transactions that are associated with this branch are immediately confirmed as well. This allows us to make the node use all of its computing ressources 24/7 without having to wait for any kind of decision to be made and allows us to scale the throughput to its physical limits. That's the whole idea of the "parallel reality based ledger state" instead of designing a data structure that models the ledger state "after consensus" like everybody else is doing it is tailored to model the ledger state "before consensus" and then you just flip a flag to persist your decision. The "resync mechanism" also uses the branches to measure the amount of approval a certain perception of the ledger state receives. So if my own opinion is not in line with what the rest of the network has accepted (i.e. because I was eclipsed or because there was a network split), then I can use the weight of these branches to detect this "being out of sync" and can do another larger query to re-evaluate my decision.(수정됨)
Also what happens in IOTA if DRNG notes would fall out, does the network continue if no new RNGs appear for a while? Or will new nodes be added sufficiently fast to the DRNG committee that no one notices?
Its a comittee and not just a single DRNG provider. If a few nodes fail then it will still produce random numbers. And even if the whole comittee fails there are fallback RNG's that would be used instead
📷
Hans Moog [IF]어제 오후 4:58
And multiverse doesn't use FPC but only the weight of these branches in the same way as blockchain uses the longest chain wins consensus to choose between conflicts. So nodes simply attach their transactions to the transactions that they have seen first and if there are conflicts then you simply monitor which version received more approval and adjust your opinion accordingly.
📷
Hans Moog [IF]어제 오후 5:07
We started integrating some of the non-controversial concepts (like the approval reset switch) into FPC and are currently refactoring goshimmer to support this
We are also planning to make the big mana holders publish their opinion in the tangle as a public statement, which allows us to measure the rate of approval in a similar way as multiverse would do it
So its starting to converge a bit but we are still using FPC as a metastability breaking mechanism
Once the changes are implemented it should be pretty easy to simulate and test both approaches in parallel
📷
Serguei Popov [IF]어제 오후 5:53
So the ask is that we ditch all our work and fork Avalanche because it has not been attacked in the month or so it has been up?
u/Navin Ramachandran [IF] yeah, that's hilarious. Avalanche consensus (at least their WP version) is clearly scientifically unsound.
📷
Hans Moog [IF]어제 오후 9:43
u/wtf maybe you should research avalanche before proposing such a stupid idea
and you will see that what I wrote is actually true
📷
Hans Moog [IF]어제 오후 9:44
paying fees is what "protects" them atm
and simply the fact that nobody uses the network for anything of value yet
we cant rely on fees making attack vectors "inattractive"
📷
Serguei Popov [IF]어제 오후 10:17
well (1.) very obviously the metastability problems are not a problem in practice,
putting "very obviously" before questionable statements very obviously shows that you are seeking a constructive dialogue 📷 (to make metastability work, the adversary needs to more-or-less know the current opinion vectors of most of the honest participants; I don't see why a sufficiently well-connected adversary cannot query enough honest nodes frequently enough to achieve that)
(2.) .... you'd need an unpredictable number every few tens/hundreds milliseconds, but your DRNG can only produce one every O(seconds).
the above assumption (about "every few tens/hundreds milliseconds") is wrong
We've had this discussion before, where you argued that the assumptions in the FPC-BI paper (incl. "all nodes must be known") are not to be taken 100% strictly, and that the results are to be seen more of an indication of overall performance.
Aham, I see. So, unfortunately, all that time that I invested into explaining that stuff during our last conversation was for nothing. Again, very briefly. The contents of the FPC-BI paper is not "an indication of overall performance". It rather shows (to someone who actually read and understood the paper) why the approach is sound and robust, as it makes one understand what is the mechanism that causes the consensus phenomenon occur.
Yet you don't allow for that same argument to be valid for the "metastability" problem in avalanche,
Incorrect. It's not "that same argument". FPC-BI is a decent academic paper that has precisely formulated results and proofs. The Ava WP (the probabilistic part of it), on the other hand, does not contain proofs of what they call results. More importantly, they don't even show a clear path to those proofs. That's why their system is scientifically unsound.
even when there's a live network that shows that it doesn't matter.
No, it doesn't show that it doesn't matter. It only shows that it works when not properly attacked. Their WP doesn't contain any insight on why those attacks would be difficult/impossible.
📷
Hans Moog [IF]어제 오후 10:56
That proposal was so stupid - Avalanche does several things completely different and we are putting quite a bit og effort into our solution to pretty much fix all of Avalanches shortcomings
If we just wanted to have a working product and dont care about security or performance then we could have just forked a blockchaib
I am pretty confident that once we are done - its going to be extremely close to the besttheoretical thresholds that DLTs will ever be able to achieve for an unsharded baselayer
​-------------------------------------------------------------------------------------------------------------
📷
Bas어제 오전 2:43
Yesterday I was asked how a reasonably big company no one has heard of could best move forward implementing Access for thousands of locations worldwide. (Sorry for the vagueness, it’s all confidential.) They read the article and want to implement it because it seems to fit a problem they’re currently trying to solve. Such moves will vastly increase the utility of protocols like IOTA, and is what the speculation is built on. I do not think you can overestimate what impact Access is going to have. It’s cutting out the middleman for simple things; no server or service needed. That’s huge.
So yes, I think this space will continue to grow u/Coinnave

--------------------------------------------------------------------------------------------------------------
📷
Angelo Capossele [IF]2020.10.02.
In short: we are planning a new v0.3.0 release that should happen very soon. This version will bring fundamental changes to the structure of the entire codebase (but without additional features) so that progressing with the development will be easier and more consistent. We have also obtained outstanding results with the dRNG committee managed by the GoShimmer X-Team, so that will also be integral part of v0.3.0. After that, we will merge the Value Tangle with the Message Tangle, so to have only one Tangle and make the TSA and the orphanage easier to manage. And we are also progressing really well with Mana, that will be the focus after the merge. More or less this is what is going to happen this month.
We will release further details with the upcoming Research Status Update 📷

submitted by btlkhs to Iota [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

[Sextortion] This is pretty surely a mass phishing message, but what's up with the delivery status notification?

See the text of the e-mail below. It seems like a standard mass-phishing scam because there was no data about me anywhere (and it would have been pretty easy to at least add my name, as it was addressed to my work email and a Google search would have returned quite a bit of results).
What I don't understand is that, right after the actual sender's e-mail (which I had not seen, as it went straight to spam), I got a mail in my Primary inbox, with subject "Delivery Status Notification (Failure)", saying "Your message wasn't delivered to [email address] because the address couldn't be found, or is unable to receive mail."
Does this mean the email contained some kind of read receipt that failed to work because it came from a throwaway email?

Hi!
Unfortunately, I have some bad news for you.Several months ago, I got access to the device you are using to browse the internet.Since that time, I have been monitoring your internet activity.
Being a regular visitor of adult websites, I can confirm that it is you who is responsible for this.To keep it simple, the websites you visited provided me with access to your data.
I’ve uploaded a Trojan horse on the driver basis that updates its signature several times per day, to make it impossible for antivirus to detect it. Additionally, it gives me access to your camera and microphone.Moreover, I have backed-up all the data, including photos, social media, chats and contacts.
Just recently, I came up with an awesome idea to create the video where you cum in one part of the screen, while the video was simultaneously playing on another screen. That was fun!
Rest assured that I can easily send this video to all your contacts with a few clicks, and I assume that you would like to prevent this scenario.
With that in mind, here is my proposal:Transfer the amount equivalent to 1500 USD to my Bitcoin wallet, and I will forget about the entire thing. I will also delete all data and videos permanently.
In my opinion, this is a somewhat modest price for my work.You can figure out how to purchase Bitcoins using search engines like Google or Bing, seeing that it’s not very difficult.
My Bitcoin wallet (BTC): [erased]
You have 48 hours to reply and you should also bear the following in mind:
It makes no sense to reply me - the address has been generated automatically.It makes no sense to complain either, since the letter along with my Bitcoin wallet cannot be tracked.Everything has been orchestrated precisely.
If I ever detect that you mentioned anything about this letter to anyone - the video will be immediately shared, and your contacts will be the first to receive it. Following that, the video will be posted on the web!
P.S. The time will start once you open this letter. (This program has a built-in timer).
Good luck and take it easy! It was just bad luck, next time please be careful.

submitted by namesurname80808 to Scams [link] [comments]

Subreddit Stats: programming top posts from 2019-10-22 to 2020-10-21 06:41 PDT

Period: 364.67 days
Submissions Comments
Total 1000 180545
Rate (per day) 2.74 491.84
Unique Redditors 629 34951
Combined Score 1178903 2688497

Top Submitters' Top Submissions

  1. 47468 points, 49 submissions: iamkeyur
    1. One Guy Ruined Hacktoberfest 2020 (3039 points, 584 comments)
    2. AWS forked my project and launched it as its own service (2956 points, 810 comments)
    3. Privacy analysis of Tiktok’s app and website (2858 points, 234 comments)
    4. 98.css – design system for building faithful recreations of Windows 98 UIs (2781 points, 318 comments)
    5. Microsoft demos language model that writes code based on signature and comment (2621 points, 614 comments)
    6. Why does HTML think “chucknorris” is a color? (2565 points, 531 comments)
    7. Windows 95 UI Design (2309 points, 665 comments)
    8. The Linux codebase has over 3k TODO comments, many from over a decade ago (2119 points, 369 comments)
    9. eBay is port scanning visitors to their website (1829 points, 236 comments)
    10. Using const/let instead of var can make JavaScript code run 10× slower in Webkit (1814 points, 525 comments)
  2. 44853 points, 28 submissions: speckz
    1. From August, Chrome will start blocking ads that consume 4MB of network data, 15 seconds of CPU usage in any 30 second period, or 60 seconds of total CPU usage (8434 points, 590 comments)
    2. How To Spot Toxic Software Jobs From Their Descriptions (6246 points, 1281 comments)
    3. A Facebook crawler was making 7M requests per day to my stupid website (2662 points, 426 comments)
    4. Apple, Your Developer Documentation is Garbage (2128 points, 432 comments)
    5. The code I’m still ashamed of (2016) (2105 points, 429 comments)
    6. Slack Is Fumbling Developers And The Rise Of Developer Discords (2095 points, 811 comments)
    7. The Chromium project finds that around 70% of our serious security bugs are memory safety problems. Our next major project is to prevent such bugs at source. (1959 points, 418 comments)
    8. Advice to Myself When Starting Out as a Software Developer (1934 points, 257 comments)
    9. Software patents are another kind of disease (1893 points, 419 comments)
    10. My favourite Git commit (1772 points, 206 comments)
  3. 35237 points, 28 submissions: whackri
    1. It is perfectly OK to only code at work, you can have a life too (6765 points, 756 comments)
    2. Kernighan's Law - Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it. (5171 points, 437 comments)
    3. The entire Apollo 11 computer code that helped get us to the Moon is available on github. (3841 points, 433 comments)
    4. Raytracing - in Excel! (2478 points, 168 comments)
    5. Writing userspace USB drivers for abandoned devices (1689 points, 84 comments)
    6. Drum Machine in Excel (1609 points, 60 comments)
    7. fork() can fail: this is important (1591 points, 264 comments)
    8. Learn how computers add numbers and build a 4 bit adder circuit (1548 points, 66 comments)
    9. Heroes Of Might And Magic III engine written from scratch (open source, playable) (1453 points, 84 comments)
    10. Apollo Guidance Computer: Restoring the computer that put man on the Moon (1277 points, 47 comments)
  4. 14588 points, 11 submissions: pimterry
    1. I'm a software engineer going blind, how should I prepare? (4237 points, 351 comments)
    2. The 2038 problem is already affecting some systems (1988 points, 518 comments)
    3. TLDR pages: Simplified, community-driven man pages (1897 points, 182 comments)
    4. JetBrains Mono: A Typeface for Developers (1728 points, 456 comments)
    5. BlurHash: extremely compact representations of image placeholders (930 points, 159 comments)
    6. Let's Destroy C (855 points, 290 comments)
    7. Shared Cache is Going Away (833 points, 192 comments)
    8. XML is almost always misused (766 points, 538 comments)
    9. Wireshark has a new packet diagram view (688 points, 24 comments)
    10. fork() can fail: this is important (460 points, 299 comments)
  5. 14578 points, 9 submissions: magenta_placenta
    1. Trello handed over user's personal account to user's previous company (2962 points, 489 comments)
    2. Feds: IBM did discriminate against older workers in making layoffs - “Analysis shows it was primarily older workers (85.85%) in the total potential pool of those considered for layoff,” the EEOC wrote (2809 points, 509 comments)
    3. Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10% (2765 points, 989 comments)
    4. US court fully legalized website scraping and technically prohibited it - On September 9, the U.S. 9th circuit court of Appeals ruled that web scraping public sites does not violate the CFAA (Computer Fraud and Abuse Act) (2014 points, 327 comments)
    5. I Suspect many Task Deadlines are Designed to Force Engineers to Work for Free (1999 points, 553 comments)
    6. Intent to Deprecate and Freeze: The User-Agent string (1012 points, 271 comments)
    7. Contractor admits planting logic bombs in his software to ensure he’d get new work (399 points, 182 comments)
    8. AlphaStar: Grandmaster level in StarCraft II using multi-agent reinforcement learning (396 points, 97 comments)
    9. Half of the websites using WebAssembly use it for malicious purposes - WebAssembly not that popular: Only 1,639 sites of the Top 1 Million use WebAssembly (222 points, 133 comments)
  6. 13750 points, 3 submissions: pedrovhb
    1. Bubble sort visualization (7218 points, 276 comments)
    2. Breadth-first search visualization (3874 points, 96 comments)
    3. Selection sort visualization (2658 points, 80 comments)
  7. 11833 points, 1 submission: flaming_bird
    1. 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code (11833 points, 956 comments)
  8. 11208 points, 10 submissions: PowerOfLove1985
    1. No cookie consent walls — and no, scrolling isn’t consent, says EU data protection body (5975 points, 890 comments)
    2. Redesigning uBlock Origin (1184 points, 162 comments)
    3. Playing Around With The Fuchsia Operating System (696 points, 164 comments)
    4. Microsoft's underwater data centre resurfaces after two years (623 points, 199 comments)
    5. Microsoft Paint/Paintbrush in Javascript (490 points, 58 comments)
    6. GitHub shuts off access to Aurelia repository, citing trade sanctions (478 points, 81 comments)
    7. How 3D Game Rendering Works: Texturing (475 points, 22 comments)
    8. Simdjson: Parsing Gigabytes of JSON per Second (441 points, 90 comments)
    9. How 1500 bytes became the MTU of the internet (435 points, 60 comments)
    10. It’s OK for your open source library to be a bit shitty (411 points, 130 comments)
  9. 10635 points, 8 submissions: michalg82
    1. Turning animations to 60fps using AI (3449 points, 234 comments)
    2. Bug #1463112 “Cat sitting on keyboard crashes lightdm” (3150 points, 143 comments)
    3. Heroes Of Might And Magic III engine written from scratch (open source, playable) (1431 points, 172 comments)
    4. Vulkan is coming to Raspberry Pi: first triangle - Raspberry Pi (1318 points, 66 comments)
    5. An EPYC trip to Rome: AMD is Cloudflare's 10th-generation Edge server CPU (431 points, 60 comments)
    6. Microsoft cancels GDC 2020 presence due to coronavirus concerns (Following Sony, Facebook, Kojima Productions, Epic Games, Unity, and more) (371 points, 52 comments)
    7. Moving from reCAPTCHA to hCaptcha - The Cloudflare Blog (278 points, 71 comments)
    8. How much of a genius-level move was using binary space partitioning in Doom? (207 points, 109 comments)
  10. 10106 points, 10 submissions: SerenityOS
    1. Someone suggested I should host my website on my own OS. For that we'll need a web server, so here's me building a basic web server in C++ for SerenityOS! (2269 points, 149 comments)
    2. I've been learning about OS security lately. Here's me making a local root exploit for SerenityOS, and then fixing the kernel bugs that made it possible! (1372 points, 87 comments)
    3. SerenityOS was hacked in a 36c3 CTF! (Exploit and write-up) (1236 points, 40 comments)
    4. One week ago, I started building a JavaScript engine for SerenityOS. Here’s me integrating it with the web browser and adding some simple API’s like alert()! (1169 points, 63 comments)
    5. Implementing macOS-style "purgeable memory" in my kernel. This technique is amazing and helps apps be better memory usage citizens! (1131 points, 113 comments)
    6. SerenityOS: The second year (900 points, 101 comments)
    7. Using my own C++ IDE to make a little program for decorating my webcam frame (571 points, 33 comments)
    8. This morning I ported git to SerenityOS. It took about an hour and some hacks, but it works! :D (547 points, 64 comments)
    9. Smarter C/C++ inlining with attribute((flatten)) (521 points, 118 comments)
    10. Introduction to SerenityOS GUI programming (390 points, 45 comments)

Top Commenters

  1. XANi_ (10753 points, 821 comments)
  2. dnew (7513 points, 641 comments)
  3. drysart (7479 points, 202 comments)
  4. MuonManLaserJab (6666 points, 233 comments)
  5. SanityInAnarchy (6331 points, 350 comments)
  6. AngularBeginner (6215 points, 59 comments)
  7. SerenityOS (5627 points, 128 comments)
  8. chucker23n (5465 points, 370 comments)
  9. IshKebab (4898 points, 393 comments)
  10. L3tum (4857 points, 199 comments)

Top Submissions

  1. 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code by flaming_bird (11833 points, 956 comments)
  2. hentAI: Detecting and removing censors with Deep Learning and Image Segmentation by 7cmStrangler (9621 points, 395 comments)
  3. US Politicians Want to Ban End-to-End Encryption by CarrotRobber (9427 points, 523 comments)
  4. From August, Chrome will start blocking ads that consume 4MB of network data, 15 seconds of CPU usage in any 30 second period, or 60 seconds of total CPU usage by speckz (8434 points, 590 comments)
  5. Mozilla: The Greatest Tech Company Left Behind by matthewpmacdonald (7566 points, 1087 comments)
  6. Bubble sort visualization by pedrovhb (7218 points, 276 comments)
  7. During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others. by silitbang6000 (7193 points, 855 comments)
  8. It is perfectly OK to only code at work, you can have a life too by whackri (6765 points, 756 comments)
  9. Blockchain, the amazing solution for almost nothing by imogenchampagne (6725 points, 1561 comments)
  10. Blockchain, the amazing solution for almost nothing by jessefrederik (6524 points, 1572 comments)

Top Comments

  1. 2975 points: deleted's comment in hentAI: Detecting and removing censors with Deep Learning and Image Segmentation
  2. 2772 points: I_DONT_LIE_MUCH's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
  3. 2485 points: api's comment in Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10%
  4. 2484 points: a_false_vacuum's comment in Stack Overflow lays off 15%
  5. 2464 points: iloveparagon's comment in Google engineer breaks down the problems he uses when doing technical interviews. Lots of advice on algorithms and programming.
  6. 2384 points: why_not_both_bot's comment in During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others.
  7. 2293 points: ThatInternetGuy's comment in Iranian Maintainer refuses to merge code from Israeli Developer. Cites Iranian regulations.
  8. 2268 points: xequae's comment in I'm a software engineer going blind, how should I prepare?
  9. 2228 points: turniphat's comment in AWS forked my project and launched it as its own service
  10. 2149 points: Rami-Slicer's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
Generated with BBoe's Subreddit Stats
submitted by flpezet to subreddit_stats [link] [comments]

Account hacked and asking for bitcoin

Hi! I'm not sure if I am in the right sub but I'll give it a try here.
Recently I have recieved an email that goes to my spam which means an unsafe mail. The email subject title was my password in facebook account so I was surprised and opened the mail. It indicated that he hacked my account as well as my email. Also, he mentioned that I opened a website and from that site he was able to put malware and from that the browser started out operating as RDP having key logger to access my display and device camera. He pointed out that he has videos of me and will send it to all of my fb and email contacts. The person was asking for bitcoin in exchange of not sending the videos and reply to him if I want proof.
In this case I knew that when I reply to him he could access my email so I ignored the mail.
I've checked my facebook account and changed the password then delete the account. Then changed all my passwords to all of my accounts, checked for software updates, scanned my device but no virus was detected.
Question: 1.Can this really happen? That someone could access my camera and record my screen if I access website with malware? 2. What action should I do to this? What else should I check? 3. Also I've receieved other scam messages that I won a huge amount of money or they are giving away money, how do I avoid this?
Thank you in advance.
submitted by mar0808 to hacker [link] [comments]

Work Email Scam asking for Bitcoins

So I just got a funny email at work from an old work email which we haven't even used for years and boy, papago had a fun time translating this. When I first read it, I gotta admit, my heart did skip a beat lol the English translation was so ominous lol but then it gave specific details which I knew were never true since I've never visited any adult sites at my work computer and after about 2 seconds, logic and reason kicked in and I knew for sure it was a bulk email sent out to everyone lol. I have no idea how they got into the system, this is a pretty funny and clever hack. they should have gone one step further and actually wrote our names in.

Can any bitcoin enthusiasts out there check to see if this wallet or whatever actually received any money???
안녕! 내가 지금 네 계정으로 너한테 이메일 보낸거 보여? 그래, 뭐 간단히 말하면 내가 네 기기에 마음껏 접속할 수 있다는 소리지.
지난 몇 달 동안 널 계속 지켜보고 있었어. 어떻게 지켜봤냐고? 그게 말이지, 넌 네가 접속했던 성인 사이트에 있던 악성 소프트웨어에 감염됐거든.
아마 무슨 소린지 잘 몰겠지만 내가 한 번 설명해볼게. 난 트로이 목마 바이러스를 통해서 네 컴퓨터와 다른 모든 기기에도 접속할 수 있었던거야. 이 말인 즉슨, 내가 원하면 언제라도 네 카메라와 마이크를 통해서 널 볼 수 있다는 뜻이지. 그것도 너 몰래 말이야. 네 폰에 있는 연락처 뿐만 아니라 네가 남들과 주고 받은 메세지도 볼 수 있지.
아마 이런 의문이 들지도 몰라. “내 컴퓨터엔 백신 프로그램이 돌아가고 있는데, 어떻게 그게 가능하단 말이야?” 뭐, 답은 간단해. 내 악성 소프트웨어 프로그램은 드라이버를 사용하기 때문이지. 게다가 4시간마다 그 드라이버의 시그니처를 업데이트해서 탐지를 막기 때문에 네 악성 소프트웨어 탐지 프로그램에 잡히지 않는다고.
난 네가 자위하는 영상을 가지고 있어. 왼쪽 화면엔 네가 딸치는 영상이 나오고 오른쪽엔 네가 자위하는 동안 봤던 영상이 나오지. 이보다 어떻게 더 나빠질 수 있을지 궁금하지? 내가 마우스를 한 번만 클릭하면 이 영상은 네 모든 SNS와 이메일 연락망으로 보내질거야. 네가 주고 받은 이메일이나 네가 사용하는 메신저에 접속해서 포스팅할 수도 있지.
이런 일이 일어나는걸 막고 싶다면, 방법은 간단해. 1500달러 상당의 비트코인을 내 비트코인 주소로 보내. (어떻게 하는지 모른다면 컴퓨터에서 “비트코인 구입”을 검색하도록).
내 비트코인 주소(BTC Wallet)는 : 1LoEmRkVxLWhKepbkK6xNb7Ts6hb3Cv5CE
네가 돈을 보낸게 확인되는 그 즉시 영상을 지워줄게. 그게 끝이야. 앞으로 날 볼 일도 없을거고. 이 거래의 기한은 단 이틀(48시간)이야. 네가 이 메일을 여는 순간 나에게 알람이 오고, 타이머가 작동되겠지.
신고를 하려고 시도해봐도 이 이메일과 내 비트코인 아이디는 추적할 수 없으니 헛수고일거라고. 난 이 일에 아주 오랜 시간을 투자해왔고, 실수는 절대 하지 않으니 말이야.
만약 네가 이 메세지를 다른 사람과 공유하려고 시도했다는 걸 내가 알게 된다면, 앞서 말했던 것처럼 네 영상을 널리 퍼뜨리겠어.
PAPAGO's Translation:
Hello!
Do you see that I just emailed you to your account?
Yeah, in short, it means I can access your device as much as I want.


I've been watching you for the last few months.
How did you watch? You know, you're infected with the malicious software on the adult site you accessed.


I'm sure you're not sure what I'm talking about, but let me explain.
I was able to access your computer and all the other devices through the Trojan horse virus.
Which means I can see you through your camera and microphone whenever I want. That's also behind your back. I can see not only the contact information on your phone but also the messages you exchanged with others.

Maybe you have this question. "There's a vaccine program running on my computer. How is that possible?" Well, the answer is simple.
Because my malware uses drivers. Plus, you update the driver's signature every four hours to prevent detection, so you don't get caught in your malware.

I have a video of you masturbating. On the left, there's a video of you tipping, and on the right, there's a video of you masturbating.
You wonder how it could get worse than this? Once I click on the mouse, this video will be sent to all of your SNS and email contacts.
You can also log on to the email you send and receive or the messenger you use and post it.

If you want to stop this from happening, the way is simple. Send $1500 worth of bitcoins to my bitcoin address. (If you don't know how, search your computer for "buy bitcoins.")

My Bitcoin address (BTC Wallet) is: 1LoEmRkVxLWhKepbkK6xNb7Ts6hb3Cv5CE

I'll delete the video as soon as I check that you sent me the money. That's it. You'll never see me again.
The deadline for this deal is only two days (48 hours).
As soon as you open this mail, the alarm will come to me and the timer will turn on.

If I try to report it, I can't track this email and my Bitcoin ID, so it's going to be a waste of time.
I've been spending a very long time on this, and I never make mistakes.

If I find out that you've tried to share this message with someone else, I'll spread your video like I said before.
submitted by ATMSPIDERTAO to korea [link] [comments]

Why I stopped using the dark web

My story begins a few years ago I decided to use my computer skills to run a small darknet forum mainly just to share information without censorship.
At first I was extremely paranoid about my site getting hacked and having my anonymity being compromised so I went online and began to research everything that I would need to ensure my own safety.
After countless days of scouring blogs, forums and other material I decided I was ready now I didn't have any money so I couldn't just buy a VPS and host the site off shore or whatever, so I decided to use my old laptop after all I wasn't planning on running a major website.
So after setting the server up and what I thought was literally every single thing I could to do harden it against attack I put the site online, everything went great for a couple of months, donations rolled in as the the user base grew larger and larger.
After around 5 months the user base had gotten so big I had to upgrade and migrate everything to a new PC which I built just to host the forum and from there everything seemed perfect, the site was running smoothly and there were no issues with the migration until one day when I came home and noticed the PC had frozen I didn't think much to it maybe just a software bug caused it so I rebooted and that's when it was clear to me something was wrong the PC lit up and beeped a few times then shut off so I thought to myself ok so it's a hardware issue, after a few hours trying to diagnose the issue I figured it out and it turned out the ram had been corrupted I took it back to the store since it was still under warranty, the customer rep just told me it might have just been a faulty stick.
When I got home I replaced the stick of ram and had the site back up and running within a few hours, everything seemed to be perfect again I apologized to the users for the down time and everyone seemed to be happy enough.
Fast forward a few more months, the forums been up and running for a around a year and a half now this is when things started to get really weird. I finished work on a Friday, it was a gorgeous day in the middle of summer I came home had something to eat and sat down in front my PC and noticed I had a message, upon opening the message I realised that somewhere I'd messed up now don't get me wrong I'm not like Assange or anything so I don't really know why anybody would actually target me but the world is a crazy place so whatever.
The message had my details from my name, address, bank details, passwords, private emails, private messages everything from nearly every single device I owned I freaked out and immediately took the PC offline, turned my internet off but little did I know that this guy had done his research after a couple of hours pacing my room I received a text message.
"I know everything about you"
The message was sent via some type of SMS service so there was no way to trace it and then my phone rang.
"Don't talk just listen, I know everything there is to know about you all I want is 2 Bitcoin or things get worse, I'll send you a text with the wallet details"
The phone call ended just as quickly as it started, I opened my laptop up and checked my Bitcoin wallet there was enough left over from the donations just to pay this guy off and hope that would be the end of it, so I entered the guys details and sent the payment, my phone rang again.
"Thank you for complying, unfortunately someone I know really likes you."
He hung up, panicking I tried calling the number back an automated message began to play "the number you have dialled has not been recognised"
A few hours pass and I began to think to myself well maybe the last call was just him having fun and decided after a long day I'd just go to bed.
Sometime around 2am I was woken up by the sound of banging at my front door, I jumped out of bed and turned on all the lights grabbing a knife from the kitchen I walked slowly towards the window and looked out I could see someone standing by a car when they spotted me they got in and drove off I rushed to the door in hopes I might be able to get a license plate but by the time I'd opened it they'd already turned the corner as I turned I noticed an envelope on the floor I picked it up, went back inside and locked the door, closed the curtains and sat in the kitchen I placed the envelope on the counter and stared at it for around half an hour trying to muster up the courage to open it, did these guys really come to my home I thought to myself.
After the half hour was up I decided enough was enough I opened the envelope and pictures fell out onto the counter they were of me sleeping, these guys had not only been outside my house they'd been inside whilst I was sleeping the images had been edited and strange love hearts had been added next to me so now I was sufficiently freaked out, I didn't go back to sleep and when the sun broke the darkness I decided to head to the police station and tell them everything I hadn't broken any laws so I hoped they would just help me at least after hours of explaining everything to them they told me there was nothing they could do.
At this point I had never felt so alone in the world, I was scared of what this guy was planning for me, I didn't have the foggiest idea what I was supposed to do or expect so I decided to wipe everything my laptop, PC and phone I picked up everything I needed stuffed it all into a bag and decided to leave I had a couple of friends that I knew I could rely on so I called up my old buddy Marcus and we met had a few beers and I explained everything to him, he offered me a place to stay and I hoped that would be the end of it how wrong I was.
A few days later it happened again there was a knock at the door first thing in the morning, me and Marcus both went out to find another envelope on the floor, same thing pictures of me sleeping but these were in Marcus's house I started freaking out again and Marcus just said
"Ok well we need to do something maybe set a trap or something"
So we went over numerous ideas everything you could think of from cameras to baiting him and we settled on the idea of staying up during the night and locking him in the room, we filled the bed up with pillows, setup cameras and even barred the windows in the room we hid in the room next door after a few hours had passed we heard the lock rattling on the front door and we knew it was game time, we'd left the door just slightly ajar so we could see outside as he went past and the moment he went into the room we both sprung to action quickly as we could we closed the door and locked it from outside using a chair and a metal bar there was only one way he was getting out and he'd have to destroy the door we could see the silhouette of him as he paced the room quietly it was creepy as fuck, we called the police as we kept an eye on him.
At last I thought I can finish this and move on with my life just as the police arrived we noticed the guy take a gun out and place it to his head, he held a sign up which read "I love you" and he pulled the trigger, the police barged in guns drawn told us both to get the floor, we complied and shouted "he's in there" pointing at the door.
The police removed the makeshift lock and entered the room, called for an ambulance and put me and Marcus in the back of a police car.
I'd been sat in the interview room for a good couple of hours I guess whilst they carried out the investigation when a detective came in and say down in front of me opening a folder and placing pictures on the table "Do you know her" "Her?" I said looking at the pictures "no" I replied confused , he looked at me and said "this is the person who's been stalking you" and he then began to tell me they had visited her home and found a shrine with photos of me all over the place from restaurants to the gym even shopping.
He went onto tell me that she'd been the one that sent the messages, made the phone calls etc and they'd also found a diary which had some kind of future plans for me and her, she wanted me to be her husband and we'd been chatting for around a year and half from the moment I started the forum after I explained everything the detective said I was lucky to be alive, she had actually planned to drug me and kidnap me, she had even made some makeshift lock bed so I wouldn't be able to escape.
To this day I feel lucky and I haven't been on the darkweb since.
submitted by GoobleGayTennis to scarystories [link] [comments]

[WRITEUP] Criticism of r/privacy and r/privacytoolsio moderation censorship and how Apple/Brave/Chrome/GrapheneOS cult armies are destroying privacy communities

Hello! I wanted to discuss this on the soon-to-come occasion of 400 subscribers (398 as I write this), but I guess I will do it now, since the time is just right. This is a long post, so embrace yourself. This is an untalked topic, and you will rarely, if ever, find a record or post about the same.
Censorship in privacy communities is ironic, especially when the communities stand as the biggest ones on reddit. A lot of voices either go silent by account deletion and reappearing as new usernames, or they never speak up since they have been effectively "banned" so have no representation. A lot of this can be easily credited to folks breaking rules, which moderation would claim is certainly a need to manage large public forums. However, there is a section of people who criticise the Apple/Brave/Chrome/GrapheneOS cult armies, and this is where the problem starts to rise.

THE FOUR CULT ANTI-PRIVACY ARMIES

APPLE

Apple cult armies are in denial of Apple devices being privacy nightmares due to being closed source blackboxes. These are good for no more than protecting your data from your nosy girlfriend or the neighbour computer whiz kid.
There is plenty of evidence that goes to prove why Apple devices are nightmares for privacy. This is a comprehensive list of links, images and articles for read:
https://gist.github.com/iosecure/357e724811fe04167332ef54e736670d
https://i.imgur.com/n8Bk0bA.jpg
Siri still recording conversations 9 months later despite Apple's promise to not do it: https://www.theregister.co.uk/2020/05/20/apple_siri_transcriptions/
Apple Mail vulnerability, and Apple's denial of acceptance of the flaw: https://9to5mac.com/2020/04/27/iphone-mail-vulnerabilities-2/
Apple sells certificates to third-party developers that allow them to track users: https://www.theatlantic.com/technology/archive/2019/01/apples-hypocritical-defense-data-privacy/581680/
Apple themselves were one of the main partners buying data from Facebook: https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html
The San Ferdandino shooter thing was completely fraudulent: https://www.aclu.org/blog/privacy-technology/internet-privacy/one-fbis-major-claims-iphone-case-fraudulent
Louis Rossmann dismantles Apple's PR stunt "repair program": https://invidio.us/watch?v=rwgpTDluufY

Brave

Brave Browser is funded by DoD: https://np.reddit.com/privatelife/comments/fe34ls/exclusive_brave_browser_funded_by_dod_contracto
Brave traffic detected with Cryptocompare despite BAT rewards disabled: https://removeddit.com/privacytoolsIO/comments/gr8nue/
Brave also has a known history of whitelisting Facebook and Twitter trackers, and has a crippled adblocker that does not work on Brave's "acceptable" advertisements.
NEW EVIDENCE (June 6, 2020): Brave Browser hardcoded their crypto partner Binance referral links (https://twitter.com/cryptonator1337/status/1269201480105578496) alongwith Ledger and soon-to-be-compromised Coinbase (https://decrypt.co/31461/coinbase-wants-to-identify-bitcoin-users-for-dea-irs)

Chrome

These people are partly joint with the GrapheneOS cult, primarily due to its lead developer orchestrating all these things in hindsight and his followers purposely sharing his opinion garbage as "facts".
Most of this was debunked by u/saintjohnny (no longer on reddit) here: https://removeddit.com/firefox/comments/gokcis/
Ridiculous things like lead developer accusing firefox of being a "deployed" army against him and 4chan being used to harm his image: https://i.postimg.cc/3RwLT8Nj/Screenshot-from-2020-05-26-23-10-20.png

GrapheneOS

The moderator u trai_dep has taken his time to censor me off completely, so that none of my criticisms can be ever read about his dictatorial moderation and the GrapheneOS discussion I had with its lead developer, who at the end gave me plenty evidence about his rudeness, ironically which was against the rules of the subreddit.
https://removeddit.com/privacytoolsIO/comments/gs4uv7/_/fs2ysdm/
Criticism of GrapheneOS lies on one of his comments about OnePlus and Xiaomi apparently not making good enough devices: https://np.reddit.com/privacytoolsIO/comments/gs4uv7/i_dont_fully_trust_grapheneos/fs82fdv/
There is also the issue that he always claims Google Pixel 3/3a is a must with Titan M chip running non verifiable code that one has to rely on for Google's claim of being same as open sourced code, and that it does not have spyware. And he maintains his stand about developing the ROM exclusively for the Pixel devices, which also house Pixel Visual Core, a proprietary Google-only CPU+GPU unit independent of the Snapdragon SoC and with negligible documentation claimed "only" to be used for HDR+ camera algorithm processing. Google has had a history of lying with things like the Location History toggle, or their known data collection business and known relationship with NSA.

EVIDENCE RECORD

I have managed to collect and create what is an evidence record establishing the fact that select moderators either have some kind of agenda or are destroying the privacy community as a whole on the internet itself.
The below large part is a direct copy of the "Criticism of..." section in my Threat Model writeup in the sidebar.

OTHER ISSUES, CRITICISM OF MODERATION OF R_PRIVACY

Telling me that I am a burden to the subreddit is outright super offensive, in my most humble opinion. Moreover, they have a strong opinionated bias towards Apple (here too), however no reason to complain for their opinions if they talk outside /privacy and /privacytoolsIO where they moderate. Take the mod hat off if you want. To their credit, one of them did confirm they have a light threat model and primary goal is to thwart mass surveillance, around Level 3 in my book.
You will always be criticised for complaining about US and rationally judging Chinese technology, and effectively repeatedly banned by American moderators and muted from modmail everytime you complain about people personally name calling you "Chinese intelligence proponent" or "Chinese/Huawei plant" or "idiot".
I cannot make text posts anymore in that subreddit as of 11/02/2020.
Lots of evidence events happened followed after my smartphone guide linked above: https://imgur.com/a/TqOkQk6
In atomicratsen image, you can see proof of them allowing Sinophobic propaganda in the name of arguments, followed by the last image. So that is another thing allowed here.
Below comment is the admission of being lazy, incompetent and calling actual gilded contributor users "burden": https://np.reddit.com/privacy/comments/enoui9/5_reasons_not_to_use_whatsapp/fe6qgd7/ Just in case comment goes poof, screenshot.
Moreover, one of them made it clear in modmail that Sinophobic propaganda are "arguments" and will go uncriticised, likely patriotism owing to a global subreddit's moderation which seems unfair and caters not to all but to favouritism to a larger US/West EU audience on reddit, as said earlier:
The thing is, making an argument that China is shady is that: an argument. I mean, geez: Hong Kong. Enough said. So long as they're being civil about it, it's actually what this Sub is for.
Do you mention anything related to China or their products in your post? If so, it's fair game, and we expect everyone to conduct themselves like rational adults.
I'll check out the reports, but if they're conducting themselves along the lines of our sidebar rules, I (obviously) won't be taking any action. But I also hope that you don't get drawn into arguments that might end up earning yourself a time-out. We're somewhat patient, but at the same time, we can't spend too many man-hours tending a particular subscriber too much. Our time is volunteered and there are 600K+ subscribers. It's not fair to them.
Is this all fair to me, a cooperating member? If moderation and volunteering time is such a great issue, it would be a good step to take a backseat and discuss this in a rational non-prejudiced and less authoritarian manner. Why not allow others to take part and aid in moderating that subreddit?
They have repeatedly banned me for nonsensical reasons, standing on last warning, and will likely do so after this post (once for claiming this comment means I called the user asshat instead of their comment, when it never violated /privacy 's rule 5, and another comment where I said to use Win 7/8.1 instead of Win 10, mods claimed it as gatekeeping and banned me for 14 days because I am criticising some things they truly love).
New evidence as of few days ago (Feb 11, 2020): https://i.imgur.com/vOyaidS.png

NEW EVIDENCE

(May 31, 2020)

https://np.reddit.com/privacytoolsIO/comments/gtd3pl/fsb0m7f/ Use removeddit or snew.github.io in case the moderator deletes my comments. The modmail message thread (https://i.imgur.com/JwYaGJU.jpg) and my now shadowbanned comment (https://i.imgur.com/uUrMqyk.png).

NEW EVIDENCE

(June 10, 2020)

The moderator trai_dep now wants a sitewide ban on me for what is informing a reddit user of legitimate logical criticism of GrapheneOS. He calls this harassment, as he has done this multiple times with me in the past (unfortunately for which comments are deleted and evidence not being able to be recorded). However, this is taking it too far. https://i.imgur.com/dX73ZNX.png

NEW EVIDENCE

(June 15, 2020)

trai_dep revengefully deletes my famous gilded smartphone hardening no root guide with 1400+ votes. Modmail proofs post with timestamps: https://old.reddit.com/privatelife/comments/h8hsdh/exclusive_rprivacy_moderator_deleted_smartphone/

SELF TAKE ON THE MATTER

This happened with me on privacy, which is a major why I started this community. There must exist a place free of prejudiced bias and free of any forms of bigotry for privacy, truth and freedom loving folks. The fact that the moderators can get away with it by saying nice words after the ban reeks of a dictator that loves to give speech about care of its citizens, yet will slice anyone up. trai_dep and his friends continue to support the bigotry and these cult armies, which is likely because they do not understand nearly any higher order of technical aspect of privacy threat modelling, and have got no education on the same.

CONCLUSION

Privacy communities on reddit are a huge problem when it comes to dealing with the cult brigading, and instead critics are targeted by the cult armies which are let loose in these very communities. privacy and /privacytoolsIO are not true representatives of communities giving good advice for higher privacy and security, unfortunately ruined both by the moderators (many of whom are iPhone users themselves just like trai_dep) and the cult brigade armies.
submitted by TheAnonymouseJoker to privatelife [link] [comments]

No Devices Detected! Hack DroidCam to work via USB cable ... Hack BITCOIN ⚡️ EARN FREE 10 BTC REAL AND PROOF No Bootable Device is detected  System will enter the ... Free Bitcoin Generator 1000% working method No Devices Detected Error On DroidCam PC Application - YouTube

No output. No GPU found on the devices. All three computes have same look on the screen no devices found. I have used catalyst drivers from V12.8-V13.11 and same with the SDKs I have used different versions of CGminer (V2.11.4 just crashes on startup). I would like to blow out the CPU's as well but that's another issue all together. My command lines along with my startup screens are below. Like any other malicious software, Bitcoin mining virus removal gets into users’ computers when those don’t take adequate safety measures. Pay attention to the files you download, websites you visit, and the devices you use. If you notice a serious computer performance slowdown, this is a reason to check it for Bitcoin viruses. I successfully completed my first attempt to configure my Raspberry Pi for Bitcoin mining with a GekkoScience USB Antstick and Minera; however, after installing additional Antsticks, my env somehow became corrupted which ultimately lead me to wipe my Raspberry Pi and install a fresh copy of Raspian and reinstalling Minera- my question is this: should I have re-compiled Minera after installing ... Bitcoin is a distributed, worldwide, decentralized digital money. Bitcoins are issued and managed without any central authority whatsoever: there is no government, company, or bank in charge of Bitcoin. You might be interested in Bitcoin if you like cryptography, distributed peer-to-peer systems, or economics. A large percentage of Bitcoin ... r/Electrum: The best, cutting edge thin Bitcoin wallet. Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts. log in sign up. User account menu . 1. Coldcard Electrum Setup - No hardware device detected. Close. 1. Crossposted by 1 day ago. Coldcard Electrum Setup - No hardware device detected. • Posted by 1 day ago. Coldcard Electrum Setup - No ...

[index] [10864] [6292] [33680] [547] [28225] [10636] [48291] [28379] [24666] [4362]

No Devices Detected! Hack DroidCam to work via USB cable ...

No Bootable Device is detected System will enter the BIOS Setup utility Solve Bootable Device Welcome to "Tips Store" channel. Here you can find a lot of... miner, how to earn free bitcoin 2019, how do i invest in bitcoins, earn money online, free bitcoins, earn free btc, bitcoin miner no fee, crypto, bitcoin mining on android, bitcoins, how to mine ... For more information, check out this guide: https://www.techy.how/lgs-no-devices-detected A short tutorial on how to fix the "No Devices Detected" error for ... This video will show you how to remove no devices detected error while using usb from Droidcam PC Application Universal ADB Drivers - https://adb.clockworkmo... No Devices Detected! Hack DroidCam to work via USB cable connection. The Work Around get The Installer: https://haviafotokopi.blogspot.com/p/0.html?id=aHR0cD...

#