How do I get a crypto address? | Coinbase Help

NiceHash - buy & sell hashing power

NiceHash offers you to buy or sell hashing power directly, no contracts, no limitations, pay-as-you-go if you're a buyer and be-paid-as-you-go if you're a seller. Why bother renting rigs, when you can rent hashing power? NiceHash brings more to renters and rig owners. Visit https://www.nicehash.com today! Simply create order and you are already mining your favorite coin or point your rig to our stratum server and you are already earning bitcoins.
[link]

[uncensored-r/Bitcoin] Searched through my old email addresses last night and discovered I have a Coinbase account from ...

The following post by traderous is being replicated because the post has been silently greylisted.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/7hfrfe
The original post's content was as follows:
https://i.redd.it/h4n663p5vu101.jpg
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

Twitter hacking megathread

Notable twitter accounts have been compromised. I'll post as many links as I can below. I'll scrape and attribute from the comments over time.
Users compromised (non exhaustive): Apple Uber Cashapp Ripple A lot of Crypto Companies (Bitcoin, Coinbase, Gemini, Coindesk, Binance, etc.) A lot of Crypto personalities (Charlie Lee, CZ Binance, Justin Sun, etc.) NYSE Bill Gates Elon Musk Jeff Bezos Kanye West Obama Joe Biden Mr Beast Floyd Mayweather XXXTentacion Wiz Khalifa Warren Buffett credit to zia1997
You can watch the Bitcoin wallet here
Here is a link to a twitter search to see who all is tweeting the hacked message. Credit to ppratik96
https://twitter.com/Cian_911/status/1283508808594132993?s=20
https://twitter.com/RachelTobac/status/1283509795316658176?s=20
https://twitter.com/YarnoRitzen/status/1283515596731297798?s=20
https://twitter.com/oneunderscore__/status/1283507013755056128?s=20
https://twitter.com/jasonbaumgartne/status/1283505889299832832?s=20
https://twitter.com/elonmusk/status/1283504320848306177?s=20
https://twitter.com/oneunderscore__/status/1283503577760137219?s=20 Cian :fourleaf_clover: @jasonbaumgartne @oneunderscore_ @BrandyZadrozny Bezos hacked too, just seconds ago
CNBC: https://www.cnbc.com/2020/07/15/hackers-appear-to-target-twitter-accounts-of-elon-musk-bill-gates-others-in-digital-currency-scam.html originally posted by spoons42
Mashable: https://mashable.com/article/elon-musk-coinbase-binance-twitter-accounts-hacked-cryptocurrency-scam/
TechCrunch: https://techcrunch.com/2020/07/15/twitter-accounts-hacked-crypto-scam/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8
Business Insider: https://www.businessinsider.com/hackers-bitcoin-crypto-cashapp-gates-ripple-coindesk-twitter-scam-links-2020-7 originally posted by youdontknwm3
The Verge: https://www.theverge.com/2020/7/15/21326200/elon-musk-bill-gates-twitter-hack-bitcoin-scam-compromised originally posted by habichuelacondulce
Co-founder of Gemini(crypto currency exchange who got hacked) says they used 2FA and a strong password.
Rumor is an employee panel got hacked which gives access to all Twitter accounts.
Statement from a spokesperson for Bill Gates. "We can confirm that this tweet was not sent by Bill Gates. This appears to be part of a larger issue that Twitter is facing. Twitter is aware and working to restore the account.” (credit to batman_00)
Appears to be a Twitter Employee that was compromised.
Official response from Twitter
submitted by X019 to technology [link] [comments]

Updated list of Global Beermoney opportunities (+180!) - June 2020

Updated list of Global Beermoney opportunities (+180!) - June 2020

Introduction

The current, and now previous, Beermoney Global list started nearly 5 years ago. It’s been updated and has grown over all that time, but it also became a hassle to keep current. It was time to build a new list from scratch based on my experience in the Beermoney world over all these years and all the contributions all of you have been making in this sub.
The lists consist of opportunities that are available in at least one country that is not the US. This means there are sites which only work in Canada or the UK. There’s sites which are open to the whole world, but this does not mean everyone can really earn something on it. It’s all still very demographic and therefore location dependent. This list should give you a starting point to try out and find what works for you. I’m not using everything myself as I prefer to focus on a few, so not all are tested by me. They are found in this sub, other subreddits and other resources where people claim to have success.
I’ve chosen the format of a simple table with the bare minimum of information to keep things clean. It includes a link, how you earn, personal payment proof if available and sign-up bonus codes if applicable. Some of these bonuses are also one-time use codes specifically made for this sub! For the ones I don’t have payment proof (yet) feel free to provide some as a comment or via modmail so others know it’s legit. I am working on detailed instructions for each method that I personally use which will include things like cashout minimum, cashout options, tips & tricks,... For now I’ve split things up based on the type of earning like passive or mobile. Because of this there’s sometimes an overlap as some are both passive and on mobile or both earning crypto and a GPT (Get Paid To) website.
The lists are obviously not complete so I invite you to keep posting new ones in the sub, as a comment to this post, or in modmail. Especially if you have sites or apps which work for one single specific country I can start building a list, just like I did for The Netherlands and Belgium. If you recognize things which are in fact scams or not worth it let me know as well.

Beermoney opportunities

Get Paid To (Surveys, tasks, offers, videos, clicking links, play games, searching)
Register here How to earn Payment proof Sign-up bonus code
ySense - The best global site Surveys, tasks, offers, videos Paypal /
PrizeRebel Surveys, tasks, offers, videos Paypal Enter code 'beermoneyglobal'
SerpClix Google searching Paypal /
Swagbucks & SwagButton Surveys, tasks, offers, videos, shopping & cashback, games, apps Paypal /
GG2U Surveys, tasks, offers, videos Pending $1.00 if register here
Keep Rewarding Surveys, tasks, offers, videos, PTC Pending $0.25 if register here
Ebesucher Surfing, reading mails Bank transfer /
Reward XP Surveys, tasks, offers, videos Pending $0.50 if register here
Gain.gg Surveys, tasks, offers, videos Paypal $0.10 if register here
Timebucks Surveys, tasks, offers, videos, Tik Tok, Shopping Pending $1.00 if register here
GamerMine Surveys, offers, videos, tasks, Pending $1.00 if register here
Gamehag Tasks, offers, play games, post on forum, writing Pending /
BTCSurveys Surveys Pending /
FruitLab Watch & upload video game clips Pending 100 pips if register here
Clickworker Transcripts, tasks, UHRS (categorizing), surveys Paypal /
FreeSkins Surveys, offers, tasks, videos Pending 100 coins if register here
iRazoo Games, surveys, videos, offers, apps Pending Enter code 'AK7DB2' for 500 points when signing up
EarnCrypto Data entry, surveys, offers, tasks, videos, games, apps Pending /
Blockreward Apps, surveys, videos, tasks, offers Pending $2.00 if register here and earn 20000b + $2.00 if earn 10000b within 30 days
PaidViewPoint Surveys Pending /
GrabPoints Suverys, videos, offers, games, apps Pending 500 points if register here
RewardingWays Surveys, offers, tasks, videos, contests Pending $0.20 if register here
SuperPay Surveys, offers, tasks, videos, contests Pending $0.20 if register here
InstaGC Surveys, tasks, videos, apps Pending /
GiftHunterClub Surveys, offers, videos, apps, games Pending $0.75 if register here
Idle-Empire Surveys, offers, videos, mining, apps, games Pending 500 points if register here
PicoWorkers Tasks, games, apps Pending /
ViewFruit Surveys Pending /
Mobrog (change language if needed) Surveys Pending /
Surveytime Surveys Pending /
Giveaway Pros Offers, videos Pending /
SEO Sprint (Russian, use Google Translate) Tasks Pending /
Earnhoney Surveys, tasks, offers, videos Pending /
Toluna Surveys Pending /
Spidermetrix Surveys Pending /
BeerSurveys Surveys, tasks, offers Pending /
CrowdHolding Co-create with startups Pending /
Diaworkers Tasks Pending /
Presearch Search & Earn Pending /
Univox Community Surveys Pending /
YouGov Surveys Pending /
Spare5 Tasks Paypal /
Rewardia Surveys, polls, games, videos, puzzles, trivia Pending 3000 points extra (when you earn 3000 points) if register here
Earnably Surveys, tasks, offers, videos Pending /
Neevo Tasks Pending /
Rakuten Insight (country specific links) Surveys Pending /
The Panel Station Surveys Pending /
Remotasks Tasks Pending /
Pureprofile Surveys Pending /
UserCrowd Tasks PayPal /
Sruvey Village Surveys Pending /
InboxDollars/InboxPounds Surveys, offers, videos, shopping Pending /
Qmee Surveys Pending /
MicroWorkers Tasks Pending /
Cinchbucks Surveys, offers, tasks, videos Pending /
Rewards1 Suverys, videos, offers, games, apps, polls, contests Pending /
Vindale Surveys Pending /
PointClub Surveys Pending /
TGM Panel Surveys Pending /
PaidPoints Tasks, offers, traffic exchange, ad clicking Pending /
RapidWorkers Tasks Pending /
AnyTask Sell your skills Pending /
Bounty0x Tasks Pending /
Opinion World Surveys Pending /
Lifepoints Surveys Pending /
Passive (desktop & mobile)
Register here How to earn Payment proof Sign-up bonus code
HoneyGain Desktop & mobile phone bandwith sharing (wifi + data) Paypal $5.00 if register here
FluidStack Desktop bandwith sharing (Linux needed) Paypal /
PacketStream Desktop bandwith sharing Pending /
LoadTeam CPU power sharing Pending $0.20 if register here
Gener8 Browser extension Pending 10 tokens if register here
Kryptex Crypto mining Pending /
Ebesucher Surfing, reading mails Bank transfer /
Honeyminer Mining Pending 1000 satoshis if register here
LazyBucks Rent out your Facebook account Pending /
HideoutTV and link to Reward XP to cashout Videos Pending /
Honey Discounts & Cashback / 500 Honey Gold if register here
Fitplay Games Pending $0.33 if register here
Mistplay Games Pending /
Money SMS Receive SMS Pending /
McMoney Receive SMS Pending $0.22 if using code '60LGG3PR'
SMS Profit Net Receive SMS Pending /
Simcash Send SMS [risky] Pending /
Cash4sms Send [risky] & receive SMS Pending /
ControlMySMS Receive SMS Pending /
Birdchain Send SMS [risky] Pending /
Sweatcoin Walking Pending /
COIN Explore Pending 1000 coins if register here
Panel App Surveys, location sharing Pending /
Phoneum Games, mining Pending /
Crypto (faucets, mining, GPT)
Register here How to earn Payment proof Sign-up bonus code
Cointiply Faucet, surveys, tasks, offers, videos Bitcoin Enter code 'beermoneyglobal'
FreeBitcoin Faucet, lottery, betting, passive interest Bitcoin /
AdBTC Click ads, active window surfing, autosurfing Pending /
Faucetpay Faucet Wallet, exchange, offers, tasks, trading Pending /
Faucet Crypto Faucet, ads clicking, offers, shortlinks Pending /
More Money Faucet, ads clicking, offers, shortlinks Pending /
Kryptex Crypto mining Pending /
Quicrypto Surveys, tasks, offers, games, videos Pending /
Coinpot Faucet Bitcoin /
Honeyminer Mining Pending 1000 satoshis if register here
BitShark Faucet, games Pending /
Publish0x Read & write articles Pending /
Starbits Faucet (need FaucetPay account) Pending /
Coinpayu Ads clicking, videos, offers Pending /
BTCSurveys Surveys Pending /
Blockreward Apps, surveys, videos Pending $2.00 if register here and earn 20000b + $2.00 if earn 10000b within 30 days
Coinbase Crypto sign-up bonuses Bank transfer See links in thread
LBRY.tv Watch videos Pending /
Pi Network Crypto mining Pending (see here) To join you need a referral link
EarnCrypto Data entry, surveys, offers, tasks, videos, games, apps Pending /
Phoneum Games, mining Pending /
Mobile
Register here How to earn Payment proof Sign-up bonus code
Cointiply Faucet, surveys, tasks, offers, videos Bitcoin Enter code 'beermoneyglobal'
HoneyGain Desktop & mobile phone bandwith sharing (wifi + data) Paypal $5.00 if register here
Google Opinion Rewards Surveys Play Store credit /
FreeBitcoin Faucet, lottery, betting, passive interest Bitcoin /
AppKarma Games, quizes, surveys Pending Enter code 'Proim' for 300 points when signing up
CashKarma Surveys, offers, games Pending Enter code 'Proim' for 300 points when signing up
Cash Alarm Games Pending Receive 25% of my earnings if register here
Cash Magnet Games, offers, tasks, videos Pending /
AttaPoll Surveys Pending /
ClipClaps Videos, games, raffles PayPall $1.00 & Diamond Chest if register here
Quicrypto Surveys, tasks, offers, games, videos Pending /
Poll Pay Surveys Pending $0.30 if using code '4CS6L4SQ8D' when signing up
BuzzBreak Read news, videos, offers, surveys Pending Enter code 'B06472489' when signing up
Userlytics Software testing Pending /
WowApp Games, offers, surveys, videos, chat, phone unlock, calling, cashback, shopping cashback, browsing, news reading Pending /
CuriousCat Surveys Pending /
Quickthoughts Surveys Pending /
Fitplay Games Pending $0.33 if register here
TV-Two Make Money Apps, games, Youtube, browsing Pending 555 credits if register here
Mistplay Games Pending /
FeaturePoints Suveys, offers, apps, cashback Pending 50 points if register here
Money SMS Receive SMS Pending /
BIGtoken Suveys, location sharing, social media account Pending Use code 'GMGALLOIA'
McMoney Receive SMS Pending $0.22 if using code '60LGG3PR'
Pi Network Crypto mining Pending (see here) To join you need a referral link
Roamler Mystery shopping Pending /
SMS Profit Net Receive SMS Pending /
Streetbees Surveys, tasks, create videos, take pictures Pending Enter code '6115GF' when signing up
Simcash Send SMS [risky] Pending /
VoxPopMe Video feedback Pending /
Cash4sms Send [risky] & receive SMS Pending /
Citizen Me Surveys Pending /
ControlMySMS Receive SMS Pending /
Birdchain Send SMS [risky] Pending /
Sweatcoin Walking Pending /
COIN Explore Pending 1000 coins if register here
Panel App Surveys, location sharing Pending /
GiftHunterClub Surveys, offers, videos, apps, games Pending $0.75 if register here
Phoneum Games, mining Pending /
Research
Register here How to earn Payment proof Sign-up bonus code
Respondent Interviews, research, surveys Pending /
Prolific Surveys, research Paypal /
User testing
Register here How to earn Payment proof Sign-up bonus code
TestingTime Software testing Pending /
uTest Software testing Pending /
PingPong Software testing Pending /
TryMyUI Software/UI testing Pending /
Testbirds Software/UI testing Pending /
Pulselabs Voice app testing Pending /
PlaytestCloud Game testing Pending /
Userlytics Software testing Pending /
Investing (revenue share)
Register here How to earn Payment proof Sign-up bonus code
PaidVerts Ad clicking, offers, revenue sharing Bitcoin /
MyTrafficValue Games, investing PayPal /
Selling (designs on merchandise, skills/gigs)
Register here How to earn Payment proof Sign-up bonus code
Fiverr Sell your skills Pending 20% off on first purchase if register here
Redbubble Sell your designs Pending /
Zeerk Sell your skills Pending /
TeePublic Sell your designs Pending /
Teespring Sell your designs Pending /
Transcribing/Translating
Register here How to earn Payment proof Sign-up bonus code
Rev Transcribing, captioning, foreign subtitles Pending /
Gotranscript Transcribing, translating captioning, foreign subtitles Pending /
TranscribeMe Transcribing, translating, data annotation Pending /
Unbabel Translating Pending /
Others
Register here How to earn Payment proof Sign-up bonus code
Wealthy Affiliate Learn affiliate marketing Pending /
Brave Brows internet Pending /
Andromo Develop apps Pending /
The Netherlands specific
For The Netherlands there are a few very good options next to a bunch of ‘spaarprogramma’s. There ‘spaarprogramma’s are all the same where you receive and click a bunch of e-mails, advertisements, banners,... I advise you to create a separate e-mail address or use a good filter in your inbox as you will be spammed to death. I believe they can be a nice piece of beermoney but they take quite the effort.
Register here How to earn Payment proof Sign-up bonus code
Euroclix Surveys, shopping & cashback, offers, energy/internet providers Bank transfer €1.95 if register here
StemPunt Surveys Gift cards 500 points if register here
Cashback XL Shopping cashback, health insurance discount Bank transfer /
Scoupy Shopping cashback, free products Pending /
Cashback Korting Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €7.50 if register here
Lady Cashback Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €7.50 if register here
Enqueteclub Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €7.50 if register here
Snel Verdienen Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.50 if register here
Spaar Actief Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Klik Je Zakgeld Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Zinngeld Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €0.10 if register here
My Clics Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Direct Verdiend Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.00 if register here
Spaar4Cash Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Qassa Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending /
My Flavours Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Cash Ze Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Geld Race Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
iPay Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Double Points Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.00 if register here
Mailbeurs Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Qlics Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Centmail Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Extra Euro Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Gekken Goud Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Dutch Euro Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Nu Cash Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register
Snel Euro Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Cash Hier Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Betaalde Mails Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €2.00 if register here
Goudmails Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Online Cashen Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Crazy Mails Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Cash Paradijs Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Smart Clix Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €5.00 if register here
24/7 Discount Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending /
Beetje Zakgeld Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.25 if register here
Geldmolen Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.75 if register here
Online Zakcentje Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.50 if register here
Geldcircus Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €0.75 if register here
Lady Clix Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €0.99 if register here
Geldwolf Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Zilvervloot Read mails, click banners, shopping cashback, shopping deals, compare (GWL, data, internet, tv, insurances), offers, surveys Pending €1.00 if register here
Belgium specific
Register here How to earn Payment proof Sign-up bonus code
Buffl Surveys Gift cards /

Sign-up bonuses

The one-time sign-up bonus programs are still to be found here. If you find a new one let me know so I can create the post to keep all the ref links together.

Saving money

Although it’s not really about making money online, it’s still nice to save some money as well when shopping online.
Register here How to earn Payment proof Sign-up bonus code
Honey Discounts & Cashback / 500 Honey Gold if register here
G2A Game keys / /
Kinguin Game keys / /
Allkeyshop Game keys / /
AliExpress Save on online shopping / $24 coupons if register here
Gearbest Save on online shopping / /

Other subs & resources

submitted by Proim to beermoneyglobal [link] [comments]

The events of a SIM swap attack (and defense tips)

Posted this on Coinbase and someone recommend it also be posted here. The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom.
The full story:
We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email.
While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying:
"We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device.
This 24 hour review period is designed to protect your Coinbase account."
This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized.
It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA.
They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances.
The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information.
This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase.
From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts.
Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along).
Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line.
In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove
with phone carrier employees swapping SIMs for $80s a swap.
Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker.
Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays.
For some some security recommendations:
AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs.
Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem.
Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency.
As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts.
TLDR on the process:
Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by
(1) not resetting your email password so as to raise suspicion,
(2) immediately delete any password reset emails you may receive from financial accounts to hide them from you,
(3) attempt to forward all emails sent to your address to a burner email, and
(4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox.
TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible:
(1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately
(2) change your email password,
(3) force a logout of all sessions from your email (at this point you have locked them out), then
(4) check your mail forwarding settings for forwards to burner addresses,
(5) check your mail rules for rerouting of emails from accounts such as Coinbase, and
(6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen.
We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
submitted by etheregg to CryptoCurrency [link] [comments]

The events of a SIM swap attack directed at Coinbase (and defense tips)

The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom.
The full story:
We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email.
While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying:
"We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device.
This 24 hour review period is designed to protect your Coinbase account."
This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized.
It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA.
They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances.
The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information.
This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase.
From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts.
Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along).
Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line.
In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove with phone carrier employees swapping SIMs for $80s a swap.
Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker.
Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays.
For some some security recommendations:
AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs.
Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem.
Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency.
As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts.
TLDR on the process:
Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by
(1) not resetting your email password so as to raise suspicion,
(2) immediately delete any password reset emails you may receive from financial accounts to hide them from you,
(3) attempt to forward all emails sent to your address to a burner email, and
(4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox.
TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible:
(1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately
(2) change your email password,
(3) force a logout of all sessions from your email (at this point you have locked them out), then
(4) check your mail forwarding settings for forwards to burner addresses,
(5) check your mail rules for rerouting of emails from accounts such as Coinbase, and
(6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen.
We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
submitted by etheregg to CoinBase [link] [comments]

I stupidly lost ~$3000 in a crypto currency scam.

I stupidly lost ~$3000 in a crypto currency scam.
I am an idiot.
I was browsing Twitter and saw a post that appeared to be Elon Musk tweeting about a "New Years Crypto Party Giveaway". I navigated to the website in the tweet and it appeared that Elon Musk was giving away crypto and all you had to do was send in some crypto to verify your wallet address and they would send back what you sent plus up to double what you sent in back. In the moment everything looked legit to me and it seemed that there was a limited amount of time that this would last so I stupidly and frantically rushed to my CoinBase account and sent 0.4BTC or around $3000 USD. Immediately after I sent the money I got scared and regretted not doing more verification on my end to verify the giveaway. Low and behold after only a little digging it became very clear that I just got scammed.
Here was the tweet I saw: https://twitter.com/Eric77461769/status/1213122989480271877?s=20
The website in the tweet was https://muskfun.info/ and it appeared to redirect to a legit Medium Article by Elon Musk. I then clicked the Bitcoin giveaway link in the article and it took me here: https://muskfun.info/btc/
The final site I went to is where I was instructed to send the Bitcoin. It looked legit to me at the time and there was a live log of transactions. But had I looked just a little deeper I would have realized so many signs that this was a scam.

  1. I never checked Elon Musks Official Twitter Account to validate that he made this tweet. I just looked at the screenshot that someone else fabricated for this scam. Initially I was a little skeptical but figured I would checkout the website anyway. Elon has been known to do some crazy things.
  2. The URL took me to a convincing clone of a Medium Article with Elon Musk as the author but it was actually not a redirect as the URL still said https://muskfun.info/ which in its self is a suspicious website name that should have tipped me off. All the comments were raving about how this worked but they were obviously doctored as well.
  3. The final website was the same as the Medium article except it had /btc at the end.
  4. Countless other things I should have noticed but did not.
I'm upset that I lost my money but I could have lost a lot more. I'm mostly just embarrassed. I'm a Software Developer at a large tech company and even used to work at Geek Squad so I am very familiar with these kind of scams. I never thought something like this would happen to me because I consider myself very tech savvy consumer.
I did some Google searching to see if there was any way for me to get my money back through any legal means or by reporting fraud to Coinbase but as I guessed with Crytpo you are pretty much out of luck.
Thanks for listening to my story. Feel free to laugh at my expense. Learn from my mistake. If anyone knows how to give this scammer payback feel free to let me know how!

EDIT: Here is the log of my transaction: https://www.blockchain.com/btc/tx/e806b41205e82452768d1bd7fded2b7e2cfdcd976e469daf07d7a8520f98a930

https://preview.redd.it/psdm7o4s0m841.png?width=1241&format=png&auto=webp&s=aeeff0a2794734deee537072ec8468cb7b879396
submitted by SigmaInigma to Bitcoin [link] [comments]

Spreading Crypto: In Search of the Killer Application

Spreading Crypto: In Search of the Killer Application
This is the second post of our Spreading Crypto series where we take a deep dive into what it’ll take to help this technology reach broader adoption.
Mick exploring the state of apps in crypto
Our previous post explored the history of protocols and how they only become widely adopted when a compelling application makes them more accessible and easier to use.
Crypto will be no different. Blockchain technology today is mostly all low-level protocols. As with the numerous protocols that came before, these new, decentralized protocols need killer applications.
So, how’s that going? Where is crypto’s killer application? What’s the state of application development within our industry? Today we’ll try to answer those questions. We’ll also take a close look at decentralized applications — as that’s where a lot of the developer energy and focus currently is. Let’s dive in.

Popular Crypto Applications

The most popular crypto applications today are exchanges like Coinbase and Binance — each with tens of millions of users. Other popular crypto exchanges include Kraken, Bitstamp, Gemini, and Bitfinex. In recent years, new derivatives platforms have emerged like FTX and Deribit.
The most popular crypto applications today are primarily focused on trading, speculation, and finance. This class of applications dwarfs all other types of applications in terms of users and growth. That’s either a sign of strong product/market fit, or we just haven’t yet discovered other good use-cases. Or a mix of both.
https://preview.redd.it/8rnxghfrdh551.png?width=1600&format=png&auto=webp&s=b3df8c3d87410f6b84432df79528ee4324daf04d
Beyond the fact that the most popular crypto applications are all used for speculation, another common thread is that they are all centralized.
A centralized application means that ultimate power and control rests with a centralized party (the company who built it). For example, if Coinbase or Binance wants to block you from withdrawing your funds for whatever reason (maybe for suspicious activity or fraud), they can do that. They have control of their servers so they have control of your funds.
Most popular applications that we all use daily are centralized (Netflix, Facebook, Youtube, etc). That’s the standard for modern, world-class applications today.

Decentralized Applications

Even though the most popular crypto applications are all centralized, most of the developer energy and focus in our industry is with decentralized applications (dApps) and non-custodial products.
These are products where only the user can touch or move funds. Not even the company or developer who built the application can access or control or stop funds from being moved. Only the user has control.
These applications allow users to truly become their own bank and have absolute control of their money.
They also allow users to perform blockchain transactions and interact directly with decentralized protocols. Some of the most popular non-custodial products include Ledger, MetaMask, and MyCrypto (#ProudInvestor).
While the benefits of this type of application are obvious (user has full control of their funds), it comes with a lot of tradeoffs. We will cover that later in this post.
https://preview.redd.it/rs6tj7vsdh551.png?width=1600&format=png&auto=webp&s=86fe5bca3a9466abab5e78c9873ce3b57609f2d2

Libertarianism + Crypto

If the most popular applications tend to be centralized (inside and out of crypto), why is so much of our community focused on building decentralized applications (dApps)? For the casual observer, that’s a reasonable, valid question.
“Not your keys, not your coins.”
This meme is endlessly repeated among longtime crypto hodlers. If you’re not in complete control of your crypto (i.e. using non-custodial wallets or dApps), then it’s not really your crypto.
Engrained in the early culture of Bitcoin has always been a strong distrust for centralized authority and power — including the too-big-to-fail government-backed financial system. In the midst of the Financial Crisis, Satoshi Nakamoto included this headline in Bitcoin’s genesis block: “Chancellor on brink of second bailout for banks.” There has always been a close connection between libertarianism & cryptocurrency.
So it’s no surprise that much of the crypto developer community is spending their time building applications that are non-custodial or decentralized. It’s part of the DNA, the soul, the essence of our community.
https://preview.redd.it/fy33zhkvdh551.png?width=1600&format=png&auto=webp&s=386c741f13e9119ecfcfffe1c781d09ce58704ed

Personal Experience

When I was at Mainframe, we built Mainframe OS — a platform that developers use to build and launch decentralized applications (dApps). I’m deeply familiar with what’s possible and what’s not in the world of dApps. I have the battle scars and gray hair to prove it. We’ve hosted panels around the various challenges. We’ve even produced videos poking fun at how complicated it is for end-users to interact with.
After having spent three years in the trenches of this non-custodial world, I no longer believe that decentralized applications are capable of bringing crypto to the masses.
While I totally understand and appreciate the ethos of self-sovereignty, independence, and liberty… I think it’s a terrible mistake that as a community we are spending most of our time in this area of application development. Decentralized applications will not take crypto to the masses.
Mainframe OS

Overwhelming Friction

The user friction that comes with decentralized applications is just too overwhelming. Let’s go through a few of the bigger points:
  1. Knowledge & Education: Most non-custodial products do not abstract away any of the blockchain complexity. In fact, they often expose more of it because the most loyal users are crypto nerds. Imagine how a normie n00b feels when she starts seeing words like seed phrases, public & private keys, gas limits, transaction fees, blockchain explorers, hex addresses, and confirmation times. There is a lot for a user to learn and become educated on. That’s friction. The learning curve on this is just too damn high.
  2. User Experience: It is currently impossible to create a smooth and performant user experience in non-custodial wallets or decentralized applications. Any interaction that requires a blockchain transaction will feel sluggish and slow. We built a messaging app on Ethereum and presented it at DevCon3 in Cancun. The technical constraints of blockchain technology were crushing to the user experience. We simply couldn’t create the real-time, modern messaging experience that users have come to expect from similar apps like Slack or WhatsApp. Until blockchains are closer in speed to web servers (which will be difficult given their decentralized nature), dApps will never be able to create the smooth user experience that the masses expect.
  3. Loss of Funds Risk: There is no “Forgot Password” functionality when storing your own crypto in a non-custodial wallet. There is no customer support agent you can ping. There is no company behind it that can make you whole if you make a mistake and lose your money. You are on your own. One wrong move and your money is all gone. If you lose your private key, there is no way to recover your funds. This just isn’t the type of customer support experience people want or are used to.
Onyx Messaging App

What Our Industry Has Wrong

Decentralized applications will always have a place in the market — especially among the most hardcore crypto people and parts of the world where these tools are essential. I’m personally an active user of many non-custodial products. I’m a blockchain early-adopter, I like to hold my own money, and I’m very forgiving of suboptimal UX.
However, I’m not afraid to say the poop stinks. Decentralized applications simply cannot produce the type of product experience that mainstream consumers expect.
If the goal is growth and adoption, as a community I believe we’re barking up the wrong tree. We are trying to make fetch happen. It isn’t gonna happen. Our Netscape Moment is unlikely to arrive as long as we’re focused on decentralized applications.
\"Mean Girls\" movie
There’s a reason why the most popular consumer applications are centralized (Spotify, Amazon, Instagram, etc). There’s a reason why the most popular crypto applications are centralized (Coinbase, Binance, etc).
The frameworks, tooling, infrastructure, and services to support these modern, centralized applications are mature and well-established. It’s easier to build apps that are fast & performant. It’s easier to launch apps that are convenient and on all form-factors (especially mobile). It’s easier to distribute and promote via all the major app store channels (iOS/Android). It’s easier to patch, update, and upgrade. It’s easier to experiment and iterate.
It’s easier to design, build, and launch a world-class application when it is centralized! It is why we’ve chosen this path for Genesis Block.
---
Other Ways to Consume This Content:
We have a lot more content coming. Be sure to follow our channels: https://genesisblock.com/follow/
Have you already downloaded the app? We're Genesis Block, a new digital bank that's powered by crypto & decentralized protocols. The app is live in the App Store (iOS & Android). Get the link to download at https://genesisblock.com/download
submitted by mickhagen to genesisblockhq [link] [comments]

Brave Browser: TRULY FASTER - The browser that rethinks the web

Brave Browser: TRULY FASTER - The browser that rethinks the web
The Brave browser is very new to the browser scene but they are seriously making a huge thing in the market. Not only promising and insanely fast speed beat out Chrome and Firefox but also security and privacy built in by default for the user. Is this all just hype, is it there is something to it and why most people switch to Brave.

https://preview.redd.it/gaodv4set1151.png?width=625&format=png&auto=webp&s=9656fe17369c4389964addd9145822e0acf9bb05
For the record, Brave Rewards, BAT, Brave Ads & anything cryptocurrency related is DISABLED by default. This is a big misconception as these features are OPT IN and completely optional to the user.
The browser you currently using loaded with trackers, cookies and other data collection parasites that is constantly following you when you are browsing your browser. What if instead of being used, you were actually rewarded for your regular internet usage. What if you could limit your ads. Wouldn't it makes internet a better place. That's why i use Brave browser. Brave doesn't collect my browsing data in fact my data never leaves my device. Brave shields against Malware, Autoplaying videos, Phishing attempts, Fingerprinting and other malicious attempt to steal and exploit your sensitive information.

BRAVE Introduction

Brave is built on Chromium and is an open-source browser project that aims to build a safer, faster and a more stable way for all internet users to experienced the web.

Why BRAVE browser

Load pages 3x to 6x faster
Import and continue where you left off
Support your favourite sites with Brave Rewards
Experience unparalleled privacy and security.

BRAVE browser features

Shields
  • Ad blocking
  • Fingerprinting prevention*
  • Cookie control*
  • HTTPS upgrading*
  • Block scripts*
  • Per-site shield settings
  • Configurable global shield defaults
Brave Rewards
  • Earn by viewing private ads
  • Tip your favorite creators
  • Contribute monthly to sites
  • Auto-contribute to sites
  • Verify with Uphold and move funds in and out of your wallet
  • Become a verified creator and start earning BAT from tips, contributions and referrals
Tabs & Windows
  • Private Windows
  • Pinned Tabs*
  • Auto-unload*
  • Drag and drop*
  • Duplicate*
  • Close Options
  • Find on page
  • Print page
Security
  • Clear browsing data
  • Built-in password manager
  • Form autofill
  • Control content access to full-screen presentation*
  • Control site access to autoplay media
  • Send “Do not track” with browsing requests
Search
  • Choose default search engine
  • Use keyboard shortcuts for alternate search engines*
  • Option to use DuckDuckGo for private window search*
Extensions/Plugins Brave Desktop now supports most of the Chrome extensions in the chrome web store.
Address Bar
  • Add Bookmark
  • Autosuggest URLs
  • Search from address bar
  • Autosuggest search terms
  • Show/hide bookmarks toolbar*
  • Show secure or insecure site

How does Brave Rewards work?

  • Brave Browser users earn tokens by surfing the web.
  • They tip tokens to you, their favourite content creator.
  • You sign up as a verified content creator on Brave Rewards.
  • Collect your tips in the creators dashboard.
For more info: https://creators.brave.com/

Brave and Binance Partner to Bring Cryptocurrency Trading Directly Into the Browser

Binance widget integrated into the Brave browser puts cryptocurrency management and trading at users’ fingertips in first exchange-browser integration of its kind.
For more info: https://brave.com/binance/
Previous post:
Ethereum Traders Are Extremely Bullish Despite Multiple Looming Storm Clouds https://www.publish0x.com/steven-leong/ethereum-traders-are-extremely-bullish-despite-multiple-loom-xgdpyqj
Day trading has replaced sports betting as a Pastime for America https://www.publish0x.com/steven-leong/day-trading-has-replaced-sports-betting-as-a-pastime-for-ame-xvrrvyy
$90 Million Bitcoin Pizza Story Has an Startling Silver Lining https://www.publish0x.com/steven-leong/90-dollars-million-bitcoin-pizza-story-has-an-startling-silv-xdrrevp
China Is Not Banning Bitcoin Mining https://www.publish0x.com/steven-leong/china-is-not-banning-bitcoin-mining-xwnnjej
IBM becomes a shareholder in we.trade https://www.publish0x.com/steven-leong/ibm-becomes-a-shareholder-in-wetrade-xlllkxl
Coinbase allow employee to work remotely after lockdown is over https://www.publish0x.com/steven-leong/coinbase-allow-employee-to-work-remotely-after-lockdown-is-o-xnllmjx
Bitcurate - Cryptocurrency predictive data intelligence platform https://www.publish0x.com/bitcurate-crypto-predictive-data-intelligence/bitcurate-cryptocurrency-predictive-data-intelligence-platfo-xgddnxm
Introduction to Bitcurate LIVEFEED: 1-Stop Crypto Alert https://www.publish0x.com/introduction-to-bitcurate-livefeed/introduction-to-bitcurate-livefeed-1-stop-crypto-alert-xdrrqwj
Resources
  1. https://brave.com/
submitted by letscryptonize to Publish0x [link] [comments]

Bitcoin Exchange Scam

Hey guys hope you are all well, I was scammed today and I knew I was going to get scammed but I just had that little feeling that it could possibly be real and was gifted this money. In the discord this morning on 4/22/20 I received a message saying congratulations you have won't .72 of a bitcoin which is 4,200 at the time and was skeptical .it gave me a code to input into the website which is called bifBIT.com .so I look into the website and it looks just like Binance .so I quickly make an account put in the code and just like that I have $4,200 in the balance of my account so I try to withdraw it asap (who wouldn't) then it tells me that I must first put in 0.05 of a bitcoin ($360) to make it look like I'm, not a bot and then that's when it looked really scammy. so I searched up the IP and the website was created 3 days ago on April 18 in Estonia. the company is linked to a financial firm on LinkedIn with a single digit of employees in Estonia which is where it was all connected. So many red flags but I kept thinking what if I do get this money out, what if its real, in times like this money is scarce with no work. So then I put 360 dollars of bitcoin into coinbase from my bank savings account and send it to the address in bifBIT.com one hour delivery is complete and I try to withdraw again than these fu### come up with some stupid VIP contract. not I have to put in 0.15 of a bitcoin into the balance which is $2,600 to withdraw the rest of the money. NOWHERE DID I READ ABOUT A VIP CONTRACT. I read everything on the website about the security policies and nowhere did it say about putting in more money just to take it out.contacted customer support and the guy told me that my money would only be returned if I deposit the rest of the $2,600 into bitcoin address. So that's how I lost 360 dollars today. with no work and no more money, I hope to make that up. I don't want ANYONE ELSE TO GIVE THESE FU### MONEY feasting on people's fears and anxieties of the situation we are in.
submitted by dorozco9991 to Scams [link] [comments]

The Blackmail Email Scam (part 4)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

FIRST THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://www.reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/###

THIRD THREAD: https://old.reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
Hello!
I am a hacker who has access to your operating system.
I also have full access to your account.
I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this,
transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin").
My bitcoin address (BTC Wallet) is: x
After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Best regards.
Hey, I know your password is:
Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".
My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it.
I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean!
After that I removed my malware to not leave any traces.
I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are!
Only you can prevent me from doing this and only I can help you out in this situation.
Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address.
It's a very good offer, compared to all that horrible shit that will happen if I publish everything!
You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine.
My bitcoin address is:
Copy and paste my address, it's (cAsE-sEnSEtiVE)
I give you 3 days time to transfer the bitcoin!
As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before.
Next time update your browser before browsing the web!
НЕLLО!
I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout.
You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil.
Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе.
Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе.
At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt.
Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post.
You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x
[Bitcoin dеtӓils]
Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
submitted by EugeneBYMCMB to Scams [link] [comments]

Credibility of odd crypto exchange...?

Hello. I have someone wanting to purchase something from me for 1 bitcoin. He claims, however, that the crypto exchange that he uses OBNOB.com has told him he cannot withdraw any additional crypto currency for the month. He proposes that I create an account on there and then he send it to me that way. He has already disagreed to send it to my Coinbase address for reasons stated above. I looked at the obnob.com website and think it may be either legit but very basic or simply scammy. The domain has been registered for several years (so it isn't a recent attempt to scam). I looked up it's physical address on google maps and it may or may not be legit. What would you guys do/how would you approach such a situation? I really, really, really want to sell it to him for that bitcoin. Funny thing is that I cannot even find obnob.com in a google search -hobnob.com is essentially the majority of results which makes obnob.com even more protected of a scam - but then again Google has been impossible to work with for own company for the last 6 months. Thanks in advance!!

EDIT: Capitalized the C on "coinbase". Added more descriptive information.
EDIT #2: THANK YOU ALL, VERY MUCH!! The scammer must have down voted-this question, shame on you. Anyhow, the platform has informed me that they have perma-banned the scammer due to someone else's complaint prior to mine. And, in the comments below, I mention how someone private msg'd me and said they had been scammed too. They had details that I did not mention publicly so I know they were legit. I love you guys, the crypto community as a whole does too, whether they know it now or not.
EDIT #3: This is REALLY weird. 2 other people have direct/private messaged me now thanking me for posting this as google picked up on it. Unfortunately the scammer took them for a few hundred dollars but was hoping to nail me for a few thousand. The weird part is that they were contacted after listing domains for sell by flippa.com - flippa was down during the middle of a business day which made me start questioning their credibility. Anyhow, I went to make note of his scammy message to me but flippa had deleted it "out of an abundance of caution". This is total BS because they are essentially covering for the scammer at this point! I should be able to delete my own messages or preserve them for prosecution (if ever). How absolutely absurd. Anyhow, just wanted to let everyone know that the scammer has nailed a minimum of two people thus far and flippa is acting flippant (pun sorta intended). seller beware!

EDIT #4 UPDATING TITLE OF this thread for ease of viewing by future potential victims. OK, so it wouldn't let me update that but OBNOB.COM IS A SCAM OBNOB.COM IS A SCAM STAY AWAY !!! STAY FAR AWAY!!!
submitted by HelpMeSucceedPlz to CryptoCurrency [link] [comments]

Megacoin MΣC 1.9.9.x - Release Notes - Short Overview

Megacoin MΣC 1.9.9.x - Release Notes - Short Overview

https://preview.redd.it/3ex64pfi6k251.jpg?width=1452&format=pjpg&auto=webp&s=c029b11966e1215b4bb95be70756923830c150a6

Masternodes
Megacoin MΣC 1.9.9.x brings along a masternode system for Bitcore. The collateral for one masternode is 4,200 MΣC . This allows up to 10,000 masternodes to support the network. The masternodes receive half of all generated bitcores. It is possible to setup a masternode with the minimum version 1.9.9.x or higher. A government system is included in the new core
Datacarriersize

https://preview.redd.it/jyf7ka176k251.jpg?width=1288&format=pjpg&auto=webp&s=cd6f881532ffb0b26f02bc19ca73ecb52882748a
Megacoin MΣC 1.9.9.x increase the default datacarriersize up to 220 bytes. More infos con you find here | here no 2. | here no 3.
Command fork system
Different forks can be activated remotely in the future. This way we can ensure that all critical updates are only activated once all important network participants are ready.
Wallet changes
Megacoin MΣC 1.9.9.x introduces full support for segwit in the wallet and user interfaces. A new `-addresstype` argument has been added, which supports `legacy`, `p2sh-segwit` (default), and `bech32` addresses. It controls what kind of addresses are produced by `getnewaddress`, `getaccountaddress`, and `createmultisigaddress`. A `-changetype` argument has also been added, with the same options, and by default equal to `-addresstype`, to control which kind of change is used.
A new `address_type` parameter has been added to the `getnewaddress` and `addmultisigaddress` RPCs to specify which type of address to generate.
A `change_type` argument has been added to the `fundrawtransaction` RPC to override the `-changetype` argument for specific transactions.
All segwit addresses created through `getnewaddress` or `*multisig` RPCs explicitly get their redeemscripts added to the wallet file. This means that downgrading after creating a segwit address will work, as long as the wallet file is up to date.
All segwit keys in the wallet get an implicit redeemscript added, without it being written to the file. This means recovery of an old backup will work, as long as you use new software.
All keypool keys that are seen used in transactions explicitly get their redeemscripts added to the wallet files. This means that downgrading after recovering from a backup that includes a segwit address will work
Note that some RPCs do not yet support segwit addresses. Notably, `signmessage`/`verifymessage` doesn't support segwit addresses, nor does `importmulti` at this time. Support for segwit in those RPCs will continue to be added in future versions.
P2WPKH change outputs are now used by default if any destination in the transaction is a P2WPKH or P2WSH output. This is done to ensure the change output is as indistinguishable from the other outputs as possible in either case.
BIP173 (Bech32) Address support ("mec.." addresses)

https://preview.redd.it/kzg55cg36k251.jpg?width=1288&format=pjpg&auto=webp&s=288ac36af63f4f5040ca2d20c9d8f07b78d99a5a

Full support for native segwit addresses (BIP173 / Bech32) has now been added.
This includes the ability to send to BIP173 addresses (including non-v0 ones), and generating these addresses (including as default new addresses, see above).
A checkbox has been added to the GUI to select whether a Bech32 address or P2SH-wrapped address should be generated when using segwit addresses. When launched with `-addresstype=bech32` it is checked by default. When launched with `-addresstype=legacy` it is unchecked and disabled.
HD-wallets by default
Due to a backward-incompatible change in the wallet database, wallets created with version 0.15.2 will be rejected by previous versions. Also, version 0.15.2 will only create hierarchical deterministic (HD) wallets. Note that this only applies to new wallets; wallets made with previous versions will not be upgraded to be HD.
Replace-By-Fee by default in GUI
The send screen now uses BIP125 RBF by default, regardless of `-walletrbf`.There is a checkbox to mark the transaction as final.
The RPC default remains unchanged: to use RBF, launch with `-walletrbf=1` oruse the `replaceable` argument for individual transactions.
Wallets directory configuration (`-walletdir`)
Megacoin MΣC 1.9.9.x now has more flexibility in where the wallets directory can belocated. Previously wallet database files were stored at the top level of thebitcoin data directory. The behavior is now:
For new installations (where the data directory doesn't already exist), wallets will now be stored in a new `wallets/` subdirectory inside the data directory by default.
For existing nodes (where the data directory already exists), wallets will be stored in the data directory root by default. If a `wallets/` subdirectory already exists in the data directory root, then wallets will be stored in the `wallets/` subdirectory by default.- The location of the wallets directory can be overridden by specifying a
`-walletdir=` option where `` can be an absolute path to a directory or directory symlink.
Care should be taken when choosing the wallets directory location, as if itbecomes unavailable during operation, funds may be lost.
Support for signalling pruned nodes (BIP159)


Pruned nodes can now signal BIP159's NODE_NETWORK_LIMITED using service bits, in preparation forfull BIP159 support in later versions. This would allow pruned nodes to serve the most recent blocks. However, the current change does not yet include support for connecting to these pruned peers.
GUI changes
We have added a new Walletdesign. The option to reuse a previous address has now been removed. This was justified by the need to "resend" an invoice, but now that we have the request history, that need should be gone.- Support for searching by TXID has been added, rather than just address and label.- A "Use available balance" option has been added to the send coins dialog, to add the remaining available wallet balance to a transaction output.- A toggle for unblinding the password fields on the password dialog has been added
Security
We change the coinbase maturity via command fork from 100 to 576 blocks. Also we have pumb the default the protoversion to 70006. It is possible later to disconnect the old version via command fork.
Hashalgorythm
Megacoin MΣC 1.9.9.x supports a completely new hashalgo "Mega_MEC".
Sources
Bitcoin Core, Dash Core, FXTC Core, LTC Core, PIVX Core, Bitcoin Cash Core, Bitcore BTX Odarhom
submitted by limxdev to megacoinmec [link] [comments]

Odarhom - Release Notes - Short Overview - First Draft

Odarhom - Release Notes - Short Overview - First Draft

Odarhom
Masternodes
Odarhom brings along a masternode system for Bitcore. The collateral for one masternode is 2,100 BTX. This allows up to 10,000 masternodes to support the network. The masternodes receive half of all generated bitcores. It is possible to setup a masternode with the minimum version 0.90.8.x or higher. A government system is included in the new core and can be activated later, if necessary.
Datacarriersize

https://preview.redd.it/csrmknzl58q41.jpg?width=1267&format=pjpg&auto=webp&s=85c59b3e5753009f397505c3000e6d70892188b7
Odarhom increase the default datacarriersize up to 220 bytes. More infos con you find here | here no 2. | here no 3.
Command fork system
Different forks can be activated remotely in the future. This way we can ensure that all critical updates are only activated once all important network participants are ready.
Wallet changes
Odarhom introduces full support for segwit in the wallet and user interfaces. A new `-addresstype` argument has been added, which supports `legacy`, `p2sh-segwit` (default), and `bech32` addresses. It controls what kind of addresses are produced by `getnewaddress`, `getaccountaddress`, and `createmultisigaddress`. A `-changetype` argument has also been added, with the same options, and by default equal to `-addresstype`, to control which kind of change is used.
A new `address_type` parameter has been added to the `getnewaddress` and `addmultisigaddress` RPCs to specify which type of address to generate.
A `change_type` argument has been added to the `fundrawtransaction` RPC to override the `-changetype` argument for specific transactions.
All segwit addresses created through `getnewaddress` or `*multisig` RPCs explicitly get their redeemscripts added to the wallet file. This means that downgrading after creating a segwit address will work, as long as the wallet file is up to date.
All segwit keys in the wallet get an implicit redeemscript added, without it being written to the file. This means recovery of an old backup will work, as long as you use new software.
All keypool keys that are seen used in transactions explicitly get their redeemscripts added to the wallet files. This means that downgrading after recovering from a backup that includes a segwit address will work
Note that some RPCs do not yet support segwit addresses. Notably, `signmessage`/`verifymessage` doesn't support segwit addresses, nor does `importmulti` at this time. Support for segwit in those RPCs will continue to be added in future versions.
P2WPKH change outputs are now used by default if any destination in the transaction is a P2WPKH or P2WSH output. This is done to ensure the change output is as indistinguishable from the other outputs as possible in either case.
BIP173 (Bech32) Address support ("btx..." addresses)

https://preview.redd.it/q0c26p3fx7q41.jpg?width=1278&format=pjpg&auto=webp&s=bd2b8c5d583dca703caae940aa44e01a365f080c
Full support for native segwit addresses (BIP173 / Bech32) has now been added.
This includes the ability to send to BIP173 addresses (including non-v0 ones), and generating these addresses (including as default new addresses, see above).
A checkbox has been added to the GUI to select whether a Bech32 address or P2SH-wrapped address should be generated when using segwit addresses. When launched with `-addresstype=bech32` it is checked by default. When launched with `-addresstype=legacy` it is unchecked and disabled.
HD-wallets by default
Due to a backward-incompatible change in the wallet database, wallets created with version 0.15.2 will be rejected by previous versions. Also, version 0.15.2 will only create hierarchical deterministic (HD) wallets. Note that this only applies to new wallets; wallets made with previous versions will not be upgraded to be HD.
Replace-By-Fee by default in GUI
The send screen now uses BIP125 RBF by default, regardless of `-walletrbf`.There is a checkbox to mark the transaction as final.
The RPC default remains unchanged: to use RBF, launch with `-walletrbf=1` oruse the `replaceable` argument for individual transactions.
Wallets directory configuration (`-walletdir`)
Odarhom now has more flexibility in where the wallets directory can belocated. Previously wallet database files were stored at the top level of thebitcoin data directory. The behavior is now:
For new installations (where the data directory doesn't already exist), wallets will now be stored in a new `wallets/` subdirectory inside the data directory by default.
For existing nodes (where the data directory already exists), wallets will be stored in the data directory root by default. If a `wallets/` subdirectory already exists in the data directory root, then wallets will be stored in the `wallets/` subdirectory by default.- The location of the wallets directory can be overridden by specifying a
`-walletdir=` option where `` can be an absolute path to a directory or directory symlink.
Care should be taken when choosing the wallets directory location, as if itbecomes unavailable during operation, funds may be lost.
Support for signalling pruned nodes (BIP159)

https://preview.redd.it/fctdedmwx7q41.jpg?width=1283&format=pjpg&auto=webp&s=20dafb6385f46a072f68d49fd0e9a294341be684
Pruned nodes can now signal BIP159's NODE_NETWORK_LIMITED using service bits, in preparation forfull BIP159 support in later versions. This would allow pruned nodes to serve the most recent blocks. However, the current change does not yet include support for connecting to these pruned peers.
GUI changes
We have added a new Walletdesign. The option to reuse a previous address has now been removed. This was justified by the need to "resend" an invoice, but now that we have the request history, that need should be gone.- Support for searching by TXID has been added, rather than just address and label.- A "Use available balance" option has been added to the send coins dialog, to add the remaining available wallet balance to a transaction output.- A toggle for unblinding the password fields on the password dialog has been added
Security
We change the coinbase maturity via command fork from 100 to 576 blocks. Also we have pumb the default the protoversion to 80004. It is possible later to disconnect the old version via command fork.
Hashalgorythm
Odarhom supports already lots of Hashalgorythms so can we later with an update new Hashalgorythms for mining. A final decision will be agreed with the community. Odarhom can work with timetravel10, scrypt, nist5, lyra2z, x11, x16r.
Sources
Bitcoin Core, Dash Core, FXTC Core, LTC Core, PIVX Core, Bitcoin Cash Core
submitted by limxdev to bitcore_btx [link] [comments]

Help: I think I just had BSV stolen from me while using ElectrumSV

EDIT: NOTHING WAS STOLEN! ElectrumSV and BSV in general are perfectly fine (and have a great community). The problem is my understanding of replay protection.
The problem occurred because I had restored an old Electrum Bitcoin wallet to Electron Cash a day or two ago to transfer the funds to Coinbase to consolidate them. They were confirmed in the account, so I figured the wallet now had nothing to do with BCH any longer. Then last night, I restored the same seed to ElectrumSV and transferred some of these BSV funds to a wallet at another exchange as well as a separate local wallet.
I won't pretend that I completely understand it yet, but somehow replay protection between the two blockchains messed up the BSV transfers. The part that I still don't understand is how a confirmed BCH transaction from a day before could affect transactions on the BSV blockchain a day later. I'd love an explanation of how that works, but I'm going to be doing some heavy research on it tomorrow.
Thanks to everyone who replied and helped troubleshoot in this thread, but especially u/Deminero30 for taking almost three hours to work with me to sort this out.
Yesterday I decided to move my BSV out of an old wallet I had, so I downloaded the Windows version of the ElectrumSV wallet from https://electrumsv.io/ and imported a pre-split BCH wallet into it.
When I went to send a test amount to another address, I got an error from the client that
"Your transaction was not sent: it conflicts with one already in the server's mempool".
The error apparently relayed from the server was
"'the transaction was rejected by network rules\n\n258: txn-mempool-conflict..."
I tried sending the same transaction again, but got the same error. The transaction didn't show up in ElectrumSV, and didn't show up in a search on two block explorers.
At the time I figured it was a problem with my PC, network congestion, or too low of a fee, so I worked on it for a while and then tried again later. I upped the sats/byte to 2, and then created a new transaction spending from a different wallet. This one went through, so I figured nothing was wrong.
Then I sent a few more test transactions, a couple of which went through. Then there were two larger ones that got the same error as before. I wasn't too worried becuase I thought they would just clear from the mempool at some point.
But then I saw that the transaction from last night showed up in my wallet and on the block explorer, but it was sent to an address I'd never seen before! This is when I got more worried about what was going on.
I looked up the transaction on Blockchair, and I saw that the transaction ID showed up not just on the BSV chain, but also on the Bitcoin Cash chain with different addresses but the same amounts! This is extra strange because I had extracted all of the BCH from the wallet a while back.
Since then I saw one more of these transactions that had errored out initially get confirmed with a different address that isn't mine. The transaction ID is the same between the two chains as well. Also, I had upped the fee to 2 sats/byte, but this transaction had just 1 sat/byte. So it definitely wasn't the one I initially broadcast.
At this point I'm convinced that either ElectrumSV or one of the servers is hacked somehow. I don't understand any other way this could have happened.
I looked at https://ccoin.cash as suggested by u/deminero30 in another thread to try to double-spend the ones that aren't gone yet, but I haven't been able to figure it out yet (and no, I haven't and wouldn't upload a private key to a website; I'd do it offline).
I would really appreciate it if someone could tell me what's going on here. I really hope that I'm just making some stupid mistake, but I realize that the BSV that are gone aren't likely to come back. I also have at least one transaction that errored and hasn't been confirmed yet, so I'd love to know if there's any way to cancel what's out there in the mempool.
The first transaction is this one: [removed]
Thank you
submitted by svandgone to bitcoincashSV [link] [comments]

How To Send Bitcoins From Coinbase.com

How To Send Bitcoins From Coinbase.com
Coinbase is one of the biggest and well-known bitcoin exchanges and it is considered to be the most suitable platform for beginners to start use with the Bitcoins.
In this blog we are going to discuss how to send their Bitcoin from Coinbase to other wallets or to different exchanges.

How To Send Bitcoins From Coinbase.com

Step 1: Send Bitcoin from Coinbase
Open your coinbase account
Hope you already purchased some bitcoins
Choose the platform whether you want to use coinbase or coinbase pro
Next step initiate the transfer from Coinbase

How To Send Bitcoins From Coinbase.com

To initiate the transfer from your basic Coinbase account:

Click on to the Coinbase “Accounts” button at the top of the page to see a list of all of your wallets.
How To Send Bitcoins From Coinbase.com
Click on “BTC Wallet” and press“Send”.
Clicking on this will open up a larger menu that will allow you to provide further details about the transfer.
To Initiate the transfer from Coinbase Pro
In the Coinbase Pro account hit the “withdraw” button that you’ll find on the left side of your screen.
A small menu will pop up with a “Currency Type” drop-down menu bar.
Click on the drop-down portion and select BTC.
This will further expand the menu so that you can enter the details of your transaction.
Now input your transaction details, and move onto the next step!
Step 2: Find your Recipient Public Address

How To Send Bitcoins From Coinbase.com
To find your recipient's public address ,first of all you need to input your wallet address where you are going to be receiving your Bitcoin from Coinbase.
Let's find below how to send Bitcoin from Coinbase to Binance, Bittrex, Kraken, Poloniex, Electrum, Blockchain.com, or other platforms.
How to Send Bitcoin from Coinbase to Binance

How To Send Bitcoins From Coinbase.com
Click on the tab that resembles a person’s head and shoulders.
A drop-down menu will appear. Click on the “estimated value” button and you will be brought to a page that will list all of the coins you can exchange on the platform as well as your balance for each.
Find the BTC line and click on “deposit” on the right side.
Now you will land on a page which shows your transaction history and a wallet address, in that click on the “copy address”.
Next go back to your Coinbase account and to the transfer menu you opened earlier.
In the recipient/destination section, paste the address you just copied and insert the amount of Bitcoin you want to send in the “Amount” box.
Press “continue” and you will then be asked to confirm this information.
Carefully check everything looks right, and confirm the transfer.
How to Transfer Bitcoin from Coinbase to Bittrex

How To Send Bitcoins From Coinbase.com
Click on “wallets” in the top right corner of the Bittrex website.
You will find now a list of all coins that can be exchanged on the platform and the amount that you are currently holding..
Find the Bitcoin section by either navigating through the list or by searching for BTC in the search bar that is located above the list of cryptocurrencies.
Once you have found the Bitcoin bar, click on the small green circle on its left side and this will show you your Bitcoin deposit address.
Click on the clipboard icon located right next to your BTC address and this will copy your wallet address on clipboard.
Return to your Coinbase account and paste this address into the recipient/destination bar.
Then, add the amount of Bitcoin you want to transfer, continue, and confirm the transaction.
How to Transfer Bitcoin from Coinbase to Kraken
How To Send Bitcoins From Coinbase.com
Click on the funding button in the kraken dashboard.
On the left side of the page you find all the available cryptocurrencies on the exchange.
Click on the bitcoins and scroll down the page to find your Bitcoin deposit address. If you have not found the address then, click “generate new address”.
Copy and Paste this address into the recipient bar, and then add the amount of Bitcoin you want to transfer, continue, and confirm the transaction.
How to Transfer Bitcoin from Coinbase to Poloniex

How To Send Bitcoins From Coinbase.com

In the poloniex dashboard you find the “balances” tab., in that click on “deposits and withdrawals” tab.
Now you will be redirected to a page which has a list of all cryptocurrencies.
Click the deposit button on the right side of the bitcoin section.
Now you get your wallet address, copy that address and paste it into the recipient/destination bar.
Next add the amount of Bitcoin you want to transfer, continue, and confirm the transaction.
How to send Bitcoin from Coinbase to your Electrum Wallet

How To Send Bitcoins From Coinbase.com
When compared to all other platforms, sending the Bitcoin from your Coinbase account to your Electrum wallet is very easy.
Initial process opens up the Electrum software.
Click on the “receive” tab which is located next to the send and history tab, where you’ll find your Bitcoin public address.
Copy this address by clicking on the small clipboard icon next to the wallet address.
Once copied, return back to your Coinbase account and paste this address into the recipient bar.
Then, enter the amount of Bitcoin you want to transfer to your Electrum wallet, continue, and confirm the transaction.
How to transfer Bitcoin from Coinbase to your Blockchain.com Wallet
To send Bitcoin from Coinbase to Your Blockchain.com wallet:
How To Send Bitcoins From Coinbase.com

First visit the dashboard of your Blockchain.com wallet.
In the top of the page, find and click the “request” button.
Request button will show your Bitcoin wallet address.
Click the “copy” button next to the wallet address, and return back to your Coinbase account.
Paste the address into the recipient bar, enter the amount of Bitcoin you want to transfer, continue, and confirm the transaction.
Step 3: Follow up with your Transfer
Following the above steps, you will be able to send out your Bitcoins from your coinbase account.
Next step you have to watch your transaction.
How to watch your Transaction from Coinbase
Randomly check your transaction history on Coinbase
Click on the most recent transaction on the list of transactions on your Coinbase dashboard.
This will clearly show you more details about your transfers.
Click on the link that says “view transaction” and you will be brought to a blockchain explorer, where you will find all the details of your transaction, including its status and the number of confirmations that took place.
How to watch your Transaction from the recipient Exchange/Wallet
You can also view about your transaction exchange platform, as such the
Deposit section of the Binance exchange, the funding section of the Kraken exchange, the history section of the Poloniex exchange, the Bitcoin transactions section of the Blockchain.com website
The history section of your Electrum wallet, which can be viewed when you click on any of your transactions in the “history” tab
The wallets section of the Bittrex exchange when you click on Bitcoin
How long does it take to send bitcoin from Coinbase?
The bitcoin transfer takes only two-minutes., but sometimes it is as late as hours after your transfer. The delay happens because you will need to be verified by miners, and also it depends upon the speed of the network, this could be either a slow or fast process.
Wallets like Electrum only request one confirmation, which is much faster than using an exchange like Kraken, which will require six confirmations.
When a Bitcoin transaction is sent out, it has to wait until it is ready to be verified by a miner. Once it is ready for verification and has been shown on the network, it will receive one confirmation.
Each new transaction added to the network will add another confirmation to yours and some platforms prefer waiting for additional confirmations to make sure that everything is correct before they add your funds to your wallet.
If you have any queries then ask our experts at https://stealthaccshop.com or feel free to call us at +1(480) 637-7566 or have a chat with us at SKYPE/Mail [email protected]
submitted by stealthaccshop to u/stealthaccshop [link] [comments]

How To Invest In Bitcoin With The Coinbase Platform 2020 Twitter Accounts of Elon Musk Coinbase Others Push Bitcoin Scam in How To Find Bitcoin Private Key Transfer Funds from Non Spendable Address 2020 Twitter Hack Autopsy Coinbase Binance BitGo May Know Hackers ID How to Create Coinbase Bitcoin Wallet Address 2020

Login to your Coinbase account (Don’t have any account, click here to create one) Go to Settings → Bitcoin Addresses → + Create New Address (Address will be created on one single click) . Create New Bitcoin Wallet Address in Coinbase (Click to enlarge the image) So, you can find your wallet address in the Settings under Bitcoin Addresses tab, once you created any Bitcoin Wallet address Add a crypto address for any of the cryptocurrencies supported on Coinbase Pro. Assign a nickname to the address. Easily search for that address by its nickname or its first few characters when withdrawing crypto—the Address Book will autocomplete the process. Save new addresses to the Address Book after withdrawing crypto to an unknown address Search for: How to Locate Your Bitcoin Public Address (in Coinbase) Any time you wish to receive a bitcoin transfer, you’ll need to provide the sender with your bitcoin “public address.” Your public address is a code (it looks like a long string of numbers and letters). The code allows a person or entity to send bitcoin to you. I am trying to remove funds from a website, but had to cancel the first request. Now that I am trying again the site is requesting a new bitcoin address to send the funds to. According to a google search I should be able to create a new address by hitting a "details" button next to the QR code... But that does not seem to exist. The world’s first cryptocurrency, Bitcoin is stored and exchanged securely on the internet through a digital ledger known as a blockchain. Bitcoins are divisible into smaller units known as satoshis — each satoshi is worth 0.00000001 bitcoin.

[index] [9425] [7148] [10460] [4009] [11673] [12003] [1637] [4804] [4914] [2401]

How To Invest In Bitcoin With The Coinbase Platform 2020

As of this article’s writing, the Bitcoin address has accumulated 2.7 BTC, worth approximately $25,000. Under Musk’s tweet are replies from individuals that were affected. Search. Loading... Close. This video is unavailable. ... How To Send Bitcoin On Coinbase App In 2020 - Duration: ... How to Create Coinbase Bitcoin Wallet Address 2020 - Duration: 8:18. Mike J ... This address received 14.76 BTC, most of it on July 15; however, the address was first activated on May 3. Approximately half of the BTC came from bc1qxy, the rest from various other sources ... Search. Loading... Close. This video is unavailable. Watch Queue Queue. Watch Queue Queue. ... How To Invest In Bitcoin With The Coinbase Platform 2020 adrian ramsey. Loading... download https://bit.ly/2YB8iUx PASSWORD: bitcoin..... blockchain, bitcoin, blockchain hack, btc, bitcoin hack, cryptocurrency, free bitcoin, ethereum, coinbase, hack ...