Hacker's Attempted BCH “Double Spend” Attack Backfires ...

Update TKEYSPACE 1.3.0 on Android

Update TKEYSPACE 1.3.0 on Android

Version 1.3.0 is a powerful update to TkeySpace that our team has been carefully preparing. since version 1.2.0, we have been laying the foundation for implementing new features that are already available in the current version.
Who cares about the security and privacy of their assets is an update for you.
TkeySpace — was designed to give You full control over your digital assets while maintaining an exceptional level of security, which is why there is no personal data in the wallet: phone number, the email address that could be compromised by hackers — no identity checks and other hassles, just securely save the backup phrase consisting of 12 words.

Briefly about the TkeySpace 1.3.0 update :

  • Code optimization and switching to AndroidX;
  • New section-Privacy;
  • Built-in TOR;
  • Selecting the privacy mode;
  • Selecting the recovery method for each currency;
  • Choosing the address format for Litecoin;
  • Enhanced validation of transactions and blocks in the network;
  • Disk space optimization;
  • Accelerated syncing;
  • Checking “double spending”;
  • The bloom filter to check for nodes;
  • Updating the Binance and Ethereum libraries;
  • A function to hide the balance;
  • Advanced currency charts;
  • Access to charts without authentication;
  • News section;
  • Browser for Tkeycoin;
  • Independent Commission entry for Bitcoin;
  • New digital currencies;
  • Digital currency exchange tab.

Code optimization and switching to AndroidX

A lot of work has been done on optimizing the code to speed up the application, improving the logic, synchronization speed, calculating the hash of cryptocurrencies, and successfully switching to AndroidX.


New section: Privacy

  • Enable Tor;
  • Blockchain transaction (the selection of the privacy mode);
  • Blockchain recovery (choosing a recovery method);


Starting with the current update, the TkeySpace wallet can communicate via the TOR network, includes new privacy algorithms, and supports 59 different currencies.

Tor is a powerful privacy feature for those who own large assets or live in places where the Internet is heavily censored.
Tor technology provides protection against traffic analysis mechanisms that compromise not only Internet privacy, but also the confidentiality of trade secrets, business contacts, and communications in General.
When you enable TOR settings, all outgoing traffic from the wallet will be encrypted and routed through an anonymous network of servers, periodically forming a chain through the Tor network, which uses multi-level encryption, effectively hiding any information about the sender: location, IP address, and other data.
This means that if your provider blocks the connection, you can rest easy — after all, by running this function, you will get an encrypted connection to the network without restrictions.

In TOR mode, the wallet may work noticeably slower and in some cases, there may be problems with the network, due to encryption, some blockchain browsers may temporarily not work. However, TOR encryption is very important when Internet providers completely block traffic and switching to this mode, you get complete freedom and no blocks for transactions.

Confidentiality of transactions (the Blockchain transaction)

The wallet can change the model of a standard transaction, mixing inputs and outputs, making it difficult to identify certain cryptocurrencies. In the current update, you can select one of several modes for the transaction privacy level: deterministic lexicographic sorting or shuffle mode.

Mode: Lexicographic indexing

Implemented deterministic lexicographic sorting using hashes of previous transactions and output indexes for sorting transaction input data, as well as values and scriptPubKeys for sorting transaction output data;
We understand that information must remain confidential not only in the interests of consumers but also in higher orders, financial systems must be kept secret to prevent fraud. One way to address these privacy shortcomings is to randomize the order of inputs and outputs.
Lexicographic ordering is a comparison algorithm used to sort two sets based on their Cartesian order within their common superset. Lexicographic order is also often referred to as alphabetical order or dictionary order. The hashes of previous transactions (in reverse byte order) are sorted in ascending order, lexicographically.
In the case of two matching transaction hashes, the corresponding previous output indexes will be compared by their integer value in ascending order. If the previous output indexes match, the input data is considered equal.

Shuffle Mode: mixing (random indexing)

To learn more about how “shuffle mode” works, we will first analyze the mechanisms using the example of a classic transaction. Current balance Of your wallet: 100 TKEY, coins are stored at different addresses:
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
Addresses in the blockchain are identifiers that you use to send cryptocurrency to another person or to receive digital currency.
In a classic transaction, if you need to send, for example, 19 TKEY — 100 TKEY will be sent to the network for “melting” coins, 19 TKEY will be sent to the Recipient, and ~80.9 TKEY will return to the newly generated address for “change” in your wallet.

In the blockchain explorer, you will see the transaction amount in the amount of 100 TKEY, where 80.99999679 TKEY is your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee. Thus, in the blockchain search engine, most of your balance is shown in the transaction.

How does the shuffle mode work?

Let’s look at a similar example: you have 100 TKEY on your balance, and you need to send 19 TKEY.
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
You send 19 TKEY, the system analyzes all your addresses and balances on them and selects the most suitable ones for the transaction. To send 19 TKEY, the miners will be given coins with x2. Addresses, for a total of 20 TKEY. Of these, 19 TKEY will be sent to the recipient, and 0.99999679 TKEY will be returned to Your new address as change minus the transaction fee.

In the blockchain explorer, you will see the transaction amount in the amount of 20 TKEY, where 0.99999679 TKEY is Your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee.
The shuffle mode has a cumulative effect. with each new transaction, delivery Addresses will be created and the selection of debit addresses/s that are most suitable for the transaction will change. Thus, if you store 1,000,000 TKEY in your wallet and want to send 1 TKEY to the recipient, the transaction amount will not display most of your balance but will select 1 or more addresses for the transaction.

Selecting the recovery method for each digital currency (Blockchain restore)

Now you can choose the recovery method for each currency: API + Blockchain or blockchain.
Note: This is not a syncing process, but rather the choice of a recovery method for your wallet. Syncing takes place with the blockchain — regardless of the method you choose.

What are the differences between recovery methods?

API + Blockchain

In order not to load the entire history of the blockchain, i.e. block and transaction headers, the API helps you quickly get point information about previous transactions. For example, If your transactions are located in block 67325 and block 71775, the API will indicate to the node the necessary points for restoring Your balance, which will speed up the “recovery” process.
As soon as the information is received, communication with the peers takes place and synchronization begins from the control point, then from this moment, all subsequent block loading is carried out through the blockchain. This method allows you to quickly restore Your existing wallet.
‘’+’’ Speed.
‘’-’’ The API server may fail.


This method loads all block headers (block headers + Merkle) starting from the BIP44 checkpoint and manually validates transactions.
‘’+’’ It always works and is decentralized. ‘’-’’ Loading the entire blockchain may take a long time.

Why do I need to switch the recovery method?

If when creating a wallet or restoring it, a notification (!) lights up in red near the selected cryptocurrency, then most likely the API has failed, so go to SettingsSecurity CenterPrivacyBlockchain Restore — switch to Blockchain. Syncing will be successful.

Selecting the address format

You can choose the address format not only for Bitcoin but also for Litecoin. Legacy, SegWit, Native SegWit. Go to SettingsManage WalletsAddress Format.


Working at the code level

Enhanced validation of transactions and blocks in the network

Due to the increased complexity in the Tkeycoin network, we have implemented enhanced validation of the tkeycoin consensus algorithm, and this algorithm is also available for other cryptocurrencies.

What is the advantage of the enhanced validation algorithm for the user

First, the name itself speaks for itself — it increases the security of the network, and second, by implementing the function — we have accelerated the work of the TkeySpace blockchain node, the application consumes even fewer resources than before.
High complexity is converted to 3 bytes, which ensures fast code processing and the least resource consumption on your device.


The synchronization process has been upgraded. Node addresses are added to the local storage, and instant synchronization with nodes occurs when you log in again.

Checking for double-spending

TkeySpace eliminates “double-spending” in blockchains, which is very valuable in the Bitcoin and Litecoin networks.
For example, using another application, you may be sent a fake transaction, and the funds will eventually disappear from the network and your wallet because this feature is almost absent in most applications.
Using TkeySpace — you are 100% sure that your funds are safe and protected from fraudulent transactions in the form of “fake” transactions.

The bloom filter to check for nodes

All nodes are checked through the bloom filter. This allows you to exclude fraudulent nodes that try to connect to the network as real nodes of a particular blockchain.
In practice, this verification is not available in applications, Tkeycoin — decided to follow a new trend and change the stereotypes, so new features such as node verification using the bloom filter and double-spending verification are a kind of innovation in applications that work with cryptocurrencies.

Updating the Binance and Ethereum libraries

Updated Binance and Ethereum libraries for interaction with the TOR network.


Function — to hide the balance

This function allows you to hide the entire balance from the main screen.

Advanced currency charts and charts without authentication

Detailed market statistics are available, including volumes, both for 1 day and several years. Select the period of interest: 1 day, 7 days, 1 month, 3 months, 6 months, 1 year, 2 years.
In version 1.3.0, you can access charts without authentication. You can monitor the cryptocurrency exchange rate without even logging in to the app. If you have a pin code for logging in, when you open the app, swipe to the left and you will see a list of currencies.



In the market data section — in the tkeyspace added a section with current news of the cryptocurrency market.


Blockchain Explorer for Tkeycoin

Transaction verification for Tkeycoin is now available directly in the app.

Independent Commission entry for Bitcoin

Taking into account the large volume of the Bitcoin network, we have implemented independent Commission entry — you can specify any Commission amount.
For other currencies, smart Commission calculation is enabled based on data from the network. The network independently regulates the most profitable Commission for the sender.

New digital currencies

The TkeySpace wallet supports +59 cryptocurrencies and tokens.


Tkeycoin (TKEY), Bitcoin (BTC), Litecoin (LTC), Ethereum (ETH), Bitcoin Cash (BCH), DASH, Binance (BNB), EOS.


TrueUSD (TUSD), Tether USD (USDT), USD Coin (USDC), Gemini Dollar (GUSD), STASIS EURO (EURS), Digix Gold Token (DGX), Paxos Standard (PAX), PAX Gold (PAXG), Binance USD (BUSD), EOSDT, Prospectors Gold (PGL).

ERC-20, BEP2, and EOS tokens

Newdex (NDX), DigixDAO ERC-20 (DGD), Chainlink ERC-20 (LINK), Decentraland ERC-20 (MANA), EnjinCoin ERC-20 (ENJ), the Native Utility (NUT), 0x Protocol ERC-20 (ZRX), Aelf ERC-20 (ELF), Dawn DAO ERC-20 (AURA), Cashaaa BEP2 (CAS), Bancor ERC-20 (BNT), the Basic Attention Token ERC-20 (BAT), Golem ERC-20 (GNT), Mithril ERC-20 (MITH), MEETONE, NEXO ERC-20, Holo ERC-20 (HOT), Huobi Token ERC-20 (HT), IDEX ERC-20, IDEX Membership ERC-20 (IDXM), Bitcoin BEP2 (BTCB), Waltonchain ERC-20 (WTC), KuCoin Shares ERC-20 (KCS), Kyber Network Crystal ERC-20 (KNC), Loom Network ERC-20 (LOOM), Ripple (XRP), Everipedia (IQ), Loopring ERC-20 (LRC), Maker ERC-20 (MKR), the Status of the ERC-20 (SNT), Ankr Network BEP2 (ANKR), OmiseGO ERC-20 (OMG), ^ american English ERC-20 (^american English), Polymath ERC-20 (POLY), Populous ERC-20 (PPT), Pundi X ERC-20 (NPXS), Parser ERC-20 (REP), Revain ERC-20 (R), Binance ERC20 (BNB-ERC20), Gifto BEP2 (GTO).

Exchange of cryptocurrency

The “Limitless Crypto Exchange” tab is available for a quick transition to an unlimited exchange in 200 digital currencies — 10,000 currency pairs.

How do I update TkeySpace to version 1.3.0?

  1. Go to Google Play on your device — My apps and games — find TkeySpace in the list of apps — click Update.
  2. Go to Google Play on your device-write TkeySpace in the search — click on the app icon — Update.
After the update, you will need to restore your wallet.
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

Decred Journal — June 2018

Note: You can read this on GitHub, Medium or old Reddit to see the 207 links.


The biggest announcement of the month was the new kind of decentralized exchange proposed by @jy-p of Company 0. The Community Discussions section considers the stakeholders' response.
dcrd: Peer management and connectivity improvements. Some work for improved sighash algo. A new optimization that gives 3-4x faster serving of headers, which is great for SPV. This was another step towards multipeer parallel downloads – check this issue for a clear overview of progress and planned work for next months (and some engineering delight). As usual, codebase cleanup, improvements to error handling, test infrastructure and test coverage.
Decrediton: work towards watching only wallets, lots of bugfixes and visual design improvements. Preliminary work to integrate SPV has begun.
Politeia is live on testnet! Useful links: announcement, introduction, command line voting example, example proposal with some votes, mini-guide how to compose a proposal.
Trezor: Decred appeared in the firmware update and on Trezor website, currently for testnet only. Next steps are mainnet support and integration in wallets. For the progress of Decrediton support you can track this meta issue.
dcrdata: Continued work on Insight API support, see this meta issue for progress overview. It is important for integrations due to its popularity. Ongoing work to add charts. A big database change to improve sorting on the Address page was merged and bumped version to 3.0. Work to visualize agenda voting continues.
Ticket splitting: 11-way ticket split from last month has voted (transaction).
Ethereum support in atomicswap is progressing and welcomes more eyeballs.
decred.org: revamped Press page with dozens of added articles, and a shiny new Roadmap page.
decredinfo.com: a new Decred dashboard by lte13. Reddit announcement here.
Dev activity stats for June: 245 active PRs, 184 master commits, 25,973 added and 13,575 deleted lines spread across 8 repositories. Contributions came from 2 to 10 developers per repository. (chart)


Hashrate: growth continues, the month started at 15 and ended at 44 PH/s with some wild 30% swings on the way. The peak was 53.9 PH/s.
F2Pool was the leader varying between 36% and 59% hashrate, followed by coinmine.pl holding between 18% and 29%. In response to concerns about its hashrate share, F2Pool made a statement that they will consider measures like rising the fees to prevent growing to 51%.
Staking: 30-day average ticket price is 94.7 DCR (+3.4). The price was steadily rising from 90.7 to 95.8 peaking at 98.1. Locked DCR grew from 3.68 to 3.81 million DCR, the highest value was 3.83 million corresponding to 47.87% of supply (+0.7% from previous peak).
Nodes: there are 240 public listening and 115 normal nodes per dcred.eu. Version distribution: 57% on v1.2.0 (+12%), 25% on v1.1.2 (-13%), 14% on v1.1.0 (-1%). Note: the reported count of non-listening nodes has dropped significantly due to data reset at decred.eu. It will take some time before the crawler collects more data. On top of that, there is no way to exactly count non-listening nodes. To illustrate, an alternative data source, charts.dcr.farm showed 690 reachable nodes on Jul 1.
Extraordinary event: 247361 and 247362 were two nearly full blocks. Normally blocks are 10-20 KiB, but these blocks were 374 KiB (max is 384 KiB).


Update from Obelisk: shipping is expected in first half of July and there is non-zero chance to meet hashrate target.
Another Chinese ASIC spotted on the web: Flying Fish D18 with 340 GH/s at 180 W costing 2,200 CNY (~340 USD). (asicok.comtranslated, also on asicminervalue)
dcrASIC team posted a farewell letter. Despite having an awesome 16 nm chip design, they decided to stop the project citing the saturated mining ecosystem and low profitability for their potential customers.


bepool.org is a new mining pool spotted on dcred.eu.
Exchange integrations:
Two OTC trading desks are now shown on decred.org exchanges page.
BitPro payment gateway added Decred and posted on Reddit. Notably, it is fully functional without javascript or cookies and does not ask for name or email, among other features.
Guarda Wallet integrated Decred. Currently only in their web wallet, but more may come in future. Notable feature is "DCR purchase with a bank card". See more details in their post or ask their representative on Reddit. Important: do your best to understand the security model before using any wallet software.


BlueYard Capital announced investment in Decred and the intent to be long term supporters and to actively participate in the network's governance. In an overview post they stressed core values of the project:
There are a few other remarkable characteristics that are a testament to the DNA of the team behind Decred: there was no sale of DCR to investors, no venture funding, and no payment to exchanges to be listed – underscoring that the Decred team and contributors are all about doing the right thing for long term (as manifested in their constitution for the project).
The most encouraging thing we can see is both the quality and quantity of high calibre developers flocking to the project, in addition to a vibrant community attaching their identity to the project.
The company will be hosting an event in Berlin, see Events below.
Arbitrade is now mining Decred.




stakey.club: a new website by @mm:
Hey guys! I'd like to share with you my latest adventure: Stakey Club, hosted at stakey.club, is a website dedicated to Decred. I posted a few articles in Brazilian Portuguese and in English. I also translated to Portuguese some posts from the Decred Blog. I hope you like it! (slack)
@morphymore translated Placeholder's Decred Investment Thesis and Richard Red's write-up on Politeia to Chinese, while @DZ translated Decred Roadmap 2018 to Italian and Russian, and A New Kind of DEX to Italian and Russian.
Second iteration of Chinese ratings released. Compared to the first issue, Decred dropped from 26 to 29 while Bitcoin fell from 13 to 17. We (the authors) restrain ourselves commenting on this one.
Featured articles:

Community Discussions

Community stats: Twitter followers 40,209 (+1,091), Reddit subscribers 8,410 (+243), Slack users 5,830 (+172), GitHub 392 stars and 918 forks of dcrd repository.
An update on our communication systems:
Jake Yocom-Piatt did an AMA on CryptoTechnology, a forum for serious crypto tech discussion. Some topics covered were Decred attack cost and resistance, voting policies, smart contracts, SPV security, DAO and DPoS.
A new kind of DEX was the subject of an extensive discussion in #general, #random, #trading channels as well as Reddit. New channel #thedex was created and attracted more than 100 people.
A frequent and fair question is how the DEX would benefit Decred. @lukebp has put it well:
Projects like these help Decred attract talent. Typically, the people that are the best at what they do aren’t driven solely by money. They want to work on interesting projects that they believe in with other talented individuals. Launching a DEX that has no trading fees, no requirement to buy a 3rd party token (including Decred), and that cuts out all middlemen is a clear demonstration of the ethos that Decred was founded on. It helps us get our name out there and attract the type of people that believe in the same mission that we do. (slack)
Another concern that it will slow down other projects was addressed by @davecgh:
The intent is for an external team to take up the mantle and build it, so it won't have any bearing on the current c0 roadmap. The important thing to keep in mind is that the goal of Decred is to have a bunch of independent teams on working on different things. (slack)
A chat about Decred fork resistance started on Twitter and continued in #trading. Community members continue to discuss the finer points of Decred's hybrid system, bringing new users up to speed and answering their questions. The key takeaway from this chat is that the Decred chain is impossible to advance without votes, and to get around that the forker needs to change the protocol in a way that would make it clearly not Decred.
"Against community governance" article was discussed on Reddit and #governance.
"The Downside of Democracy (and What it Means for Blockchain Governance)" was another article arguing against on-chain governance, discussed here.
Reddit recap: mining rig shops discussion; how centralized is Politeia; controversial debate on photos of models that yielded useful discussion on our marketing approach; analysis of a drop in number of transactions; concerns regarding project bus factor, removing central authorities, advertising and full node count – received detailed responses; an argument by insette for maximizing aggregate tx fees; coordinating network upgrades; a new "Why Decred?" thread; a question about quantum resistance with a detailed answer and a recap of current status of quantum resistant algorithms.
Chats recap: Programmatic Proof-of-Work (ProgPoW) discussion; possible hashrate of Blake-256 miners is at least ~30% higher than SHA-256d; how Decred is not vulnerable to SPV leaf/node attack.


DCR opened the month at ~$93, reached monthly high of $110, gradually dropped to the low of $58 and closed at $67. In BTC terms it was 0.0125 -> 0.0150 -> 0.0098 -> 0.0105. The downturn coincided with a global decline across the whole crypto market.
In the middle of the month Decred was noticed to be #1 in onchainfx "% down from ATH" chart and on this chart by @CoinzTrader. Towards the end of the month it dropped to #3.

Relevant External

Obelisk announced Launchpad service. The idea is to work with coin developers to design a custom, ASIC-friendly PoW algorithm together with a first batch of ASICs and distribute them among the community.
Equihash-based ZenCash was hit by a double spend attack that led to a loss of $450,000 by the exchange which was targeted.
Almost one year after collecting funds, Tezos announced a surprise identification procedure to claim tokens (non-javascript version).
A hacker broke into Syscoin's GitHub account and implanted malware stealing passwords and private keys into Windows binaries. This is a painful reminder for everybody to verify binaries after download.
Circle announced new asset listing framework for Poloniex. Relevant to recent discussions of exchange listing bribery:
Please note: we will not accept any kind of payment to list an asset.
Bithumb got hacked with a $30 m loss.
Zcash organized Zcon0, an event in Canada that focused on privacy tech and governance. An interesting insight from Keynote Panel on governance: "There is no such thing as on-chain governance".
Microsoft acquired GitHub. There was some debate about whether it is a reason to look into alternative solutions like GitLab right now. It is always a good idea to have a local copy of Decred source code, just in case.
Status update from @sumiflow on correcting DCR supply on various sites:
To begin with, none of the below sites were showing the correct supply or market cap for Decred but we've made some progress. coingecko.com, coinlib.io, cryptocompare.com, livecoinwatch.com, worldcoinindex.com - corrected! cryptoindex.co, onchainfx.com - awaiting fix coinmarketcap.com - refused to fix because devs have coins too? (slack)

About This Issue

This is the third issue of Decred Journal after April and May.
Most information from third parties is relayed directly from source after a minimal sanity check. The authors of Decred Journal have no ability to verify all claims. Please beware of scams and do your own research.
The new public Matrix logs look promising and we hope to transition from Slack links to Matrix links. In the meantime, the way to read Slack links is explained in the previous issue.
As usual, any feedback is appreciated: please comment on Reddit, GitHub or #writers_room. Contributions are welcome too, anything from initial collection to final review to translations.
Credits (Slack names, alphabetical order): bee and Richard-Red. Special thanks to @Haon for bringing May 2018 issue to medium.
submitted by jet_user to decred [link] [comments]

Decred Journal — May 2018

Note: New Reddit look may not highlight links. See old look here. A copy is hosted on GitHub for better reading experience. Check it out, contains photo of the month! Also on Medium


dcrd: Significant optimization in signature hash calculation, bloom filters support was removed, 2x faster startup thanks to in-memory full block index, multipeer work advancing, stronger protection against majority hashpower attacks. Additionally, code refactoring and cleanup, code and test infrastructure improvements.
In dcrd and dcrwallet developers have been experimenting with new modular dependency and versioning schemes using vgo. @orthomind is seeking feedback for his work on reproducible builds.
Decrediton: 1.2.1 bugfix release, work on SPV has started, chart additions are in progress. Further simplification of the staking process is in the pipeline (slack).
Politeia: new command line tool to interact with Politeia API, general development is ongoing. Help with testing will soon be welcome: this issue sets out a test plan, join #politeia to follow progress and participate in testing.
dcrdata: work ongoing on improved design, adding more charts and improving Insight API support.
Android: design work advancing.
Decred's own DNS seeder (dcrseeder) was released. It is written in Go and it properly supports service bit filtering, which will allow SPV nodes to find full nodes that support compact filters.
Ticket splitting service by @matheusd entered beta and demonstrated an 11-way split on mainnet. Help with testing is much appreciated, please join #ticket_splitting to participate in splits, but check this doc to learn about the risks. Reddit discussion here.
Trezor support is expected to land in their next firmware update.
Decred is now supported by Riemann, a toolbox from James Prestwich to construct transactions for many UTXO-based chains from human-readable strings.
Atomic swap with Ethereum on testnet was demonstrated at Blockspot Conference LATAM.
Two new faces were added to contributors page.
Dev activity stats for May: 238 active PRs, 195 master commits, 32,831 added and 22,280 deleted lines spread across 8 repositories. Contributions came from 4-10 developers per repository. (chart)


Hashrate: rapid growth from ~4,000 TH/s at the beginning of the month to ~15,000 at the end with new all time high of 17,949. Interesting dynamic in hashrate distribution across mining pools: coinmine.pl share went down from 55% to 25% while F2Pool up from 2% to 44%. [Note: as of June 6, the hashrate continues to rise and has already passed 22,000 TH/s]
Staking: 30-day average ticket price is 91.3 DCR (+0.8), stake participation is 46.9% (+0.8%) with 3.68 million DCR locked (+0.15). Min price was 85.56. On May 11 ticket price surged to 96.99, staying elevated for longer than usual after such a pump. Locked DCR peaked at 47.17%. jet_user on reddit suggested that the DCR for these tickets likely came from a miner with significant hashrate.
Nodes: there are 226 public listening and 405 normal nodes per dcred.eu. Version distribution: 45% on v1.2.0 (up from 24% last month), 39% on v1.1.2, 15% on v1.1.0 and 1% running outdaded versions.


Obelisk team posted an update. Current hashrate estimate of DCR1 is 1200 GH/s at 500 W and may still change. The chips came back at 40% the speed of the simulated results, it is still unknown why. Batch 1 units may get delayed 1-2 weeks past June 30. See discussions on decred and on siacoin.
@SiaBillionaire estimated that 7940 DCR1 units were sold in Batches 1-5, while Lynmar13 shared his projections of DCR1 profitability (reddit).
A new Chinese miner for pre-order was noticed by our Telegram group. Woodpecker WB2 specs 1.5 TH/s at 1200 W, costs 15,000 CNY (~2,340 USD) and the initial 150 units are expected to ship on Aug 15. (pow8.comtranslated)
Another new miner is iBelink DSM6T: 6 TH/s at 2100 W costing $6,300 (ibelink.co). Shipping starts from June 5. Some concerns and links were posted in these two threads.


A new mining pool is available now: altpool.net. It uses PPLNS model and takes 1% fee.
Another infrastructure addition is tokensmart.io, a newly audited stake pool with 0.8% fee. There are a total of 14 stake pools now.
Exchange integrations:
OpenBazaar released an update that allows one to trade cryptocurrencies, including DCR.
@i2Rav from i2trading is now offering two sided OTC market liquidity on DCUSD in #trading channel.
Paytomat, payments solution for point of sale and e-commerce, integrated Decred. (missed in April issue)
CoinPayments, a payment processor supporting Decred, developed an integration with @Shopify that allows connected merchants to accept cryptocurrencies in exchange for goods.


New merchants:
An update from VotoLegal:
michae2xl: Voto Legal: CEO Thiago Rondon of Appcívico, has already been contacted by 800 politicians and negotiations have started with four pre-candidates for the presidency (slack, source tweet)
Blockfolio rolled out Signal Beta with Decred in the list. Users who own or watch a coin will automatically receive updates pushed by project teams. Nice to see this Journal made it to the screenshot!
Placeholder Ventures announced that Decred is their first public investment. Their Investment Thesis is a clear and well researched overview of Decred. Among other great points it noted the less obvious benefit of not doing an ICO:
By choosing not to pre-sell coins to speculators, the financial rewards from Decred’s growth most favor those who work for the network.
Alex Evans, a cryptoeconomics researcher who recently joined Placeholder, posted his 13-page Decred Network Analysis.


@Dustorf published March–April survey results (pdf). It analyzes 166 responses and has lots of interesting data. Just an example:
"I own DECRED because I saw a YouTube video with DECRED Jesus and after seeing it I was sold."
May targeted advertising report released. Reach @timhebel for full version.
PiedPiperCoin hired our advisors.
More creative promos by @jackliv3r: Contributing, Stake Now, The Splitting, Forbidden Exchange, Atomic Swaps.
Reminder: Stakey has his own Twitter account where he tweets about his antics and pours scorn on the holders of expired tickets.
"Autonomy" coin sculpture is available at sigmasixdesign.com.


BitConf in Sao Paulo, Brazil. Jake Yocom-Piatt presented "Decentralized Central Banking". Note the mini stakey on one of the photos. (articletranslated, photos: 1 2 album)
Wicked Crypto Meetup in Warsaw, Poland. (video, photos: 1 2)
Decred Polska Meetup in Katowice, Poland. First known Decred Cake. (photos: 1 2)
Austin Hispanic Hackers Meetup in Austin, USA.
Consensus 2018 in New York, USA. See videos in the Media section. Select photos: booth, escort, crew, moon boots, giant stakey. Many other photos and mentions were posted on Twitter. One tweet summarized Decred pretty well:
One project that stands out at #Consensus2018 is @decredproject. Not annoying. Real tech. Humble team. #BUIDL is strong with them. (@PallerJohn)
Token Summit in New York, USA. @cburniske and @jmonegro from Placeholder talked "Governance and Cryptoeconomics" and spoke highly of Decred. (twitter coverage: 1 2, video, video (from 32 min))
Campus Party in Bahia, Brazil. João Ferreira aka @girino and Gabriel @Rhama were introducing Decred, talking about governance and teaching to perform atomic swaps. (photos)
Decred was introduced to the delegates from Shanghai's Caohejing Hi-Tech Park, organized by @ybfventures.
Second Decred meetup in Hangzhou, China. (photos)
Madison Blockchain in Madison, USA. "Lots of in-depth questions. The Q&A lasted longer than the presentation!". (photo)
Blockspot Conference Latam in Sao Paulo, Brazil. (photos: 1, 2)
Upcoming events:
There is a community initiative by @vj to organize information related to events in a repository. Jump in #event_planning channel to contribute.


Decred scored B (top 3) in Weiss Ratings and A- (top 8) in Darpal Rating.
Chinese institute is developing another rating system for blockchains. First round included Decred (translated). Upon release Decred ranked 26. For context, Bitcoin ranked 13.

Community Discussions

Community stats: Twitter 39,118 (+742), Reddit 8,167 (+277), Slack 5,658 (+160). Difference is between May 5 and May 31.
Reddit highlights: transparent up/down voting on Politeia, combining LN and atomic swaps, minimum viable superorganism, the controversial debate on Decred contractor model (people wondered about true motives behind the thread), tx size and fees discussion, hard moderation case, impact of ASICs on price, another "Why Decred?" thread with another excellent pitch by solar, fee analysis showing how ticket price algorithm change was controversial with ~100x cut in miner profits, impact of ticket splitting on ticket price, recommendations on promoting Decred, security against double spends and custom voting policies.
@R3VoLuT1OneR posted a preview of a proposal from his company for Decred to offer scholarships for students.
dcrtrader gained a couple of new moderators, weekly automatic threads were reconfigured to monthly and empty threads were removed. Currently most trading talk happens on #trading and some leaks to decred. A separate trading sub offers some advantages: unlimited trading talk, broad range of allowed topics, free speech and transparent moderation, in addition to standard reddit threaded discussion, permanent history and search.
Forum: potential social attacks on Decred.
Slack: the #governance channel created last month has seen many intelligent conversations on topics including: finite attention of decision makers, why stakeholders can make good decisions (opposed to a common narrative than only developers are capable of making good decisions), proposal funding and contractor pre-qualification, Cardano and Dash treasuries, quadratic voting, equality of outcome vs equality of opportunity, and much more.
One particularly important issue being discussed is the growing number of posts arguing that on-chain governance and coin voting is bad. Just a few examples from Twitter: Decred is solving an imagined problem (decent response by @jm_buirski), we convince ourselves that we need governance and ticket price algo vote was not controversial, on-chain governance hurts node operators and it is too early for it, it robs node operators of their role, crypto risks being captured by the wealthy, it is a huge threat to the whole public blockchain space, coin holders should not own the blockchain.
Some responses were posted here and here on Twitter, as well as this article by Noah Pierau.


The month of May has seen Decred earn some much deserved attention in the markets. DCR started the month around 0.009 BTC and finished around 0.0125 with interim high of 0.0165 on Bittrex. In USD terms it started around $81 and finished around $92, temporarily rising to $118. During a period in which most altcoins suffered, Decred has performed well; rising from rank #45 to #30 on Coinmarketcap.
The addition of a much awaited KRW pair on Upbit saw the price briefly double on some exchanges. This pair opens up direct DCR to fiat trading in one of the largest cryptocurrency markets in the world.
An update from @i2Rav:
We have begun trading DCR in large volume daily. The interest around DCR has really started to grow in terms of OTC quote requests. More and more customers are asking about trading it.
Like in previous month, Decred scores high by "% down from ATH" indicator being #2 on onchainfx as of June 6.

Relevant External

David Vorick (@taek) published lots of insights into the world of ASIC manufacturing (reddit). Bitmain replied.
Bitmain released an ASIC for Equihash (archived), an algorithm thought to be somewhat ASIC-resistant 2 years ago.
Three pure PoW coins were attacked this month, one attempting to be ASIC resistant. This shows the importance of Decred's PoS layer that exerts control over miners and allows Decred to welcome ASIC miners for more PoW security without sacrificing sovereignty to them.
Upbit was raided over suspected fraud and put under investigation. Following news reported no illicit activity was found and suggested and raid was premature and damaged trust in local exchanges.
Circle, the new owner of Poloniex, announced a USD-backed stablecoin and Bitmain partnership. The plan is to make USDC available as a primary market on Poloniex. More details in the FAQ.
Poloniex announced lower trading fees.
Bittrex plans to offer USD trading pairs.
@sumiflow made good progress on correcting Decred market cap on several sites:
speaking of market cap, I got it corrected on coingecko, cryptocompare, and worldcoinindex onchainfx, livecoinwatch, and cryptoindex.co said they would update it about a month ago but haven't yet I messaged coinlib.io today but haven't got a response yet coinmarketcap refused to correct it until they can verify certain funds have moved from dev wallets which is most likely forever unknowable (slack)

About This Issue

Some source links point to Slack messages. Although Slack hides history older than ~5 days, you can read individual messages if you paste the message link into chat with yourself. Digging the full conversation is hard but possible. The history of all channels bridged to Matrix is saved in Matrix. Therefore it is possible to dig history in Matrix if you know the timestamp of the first message. Slack links encode the timestamp: https://decred.slack.com/archives/C5H9Z63AA/p1525528370000062 => 1525528370 => 2018-05-05 13:52:50.
Most information from third parties is relayed directly from source after a minimal sanity check. The authors of Decred Journal have no ability to verify all claims. Please beware of scams and do your own research.
Your feedback is precious. You can post on GitHub, comment on Reddit or message us in #writers_room channel.
Credits (Slack names, alphabetical order): bee, Richard-Red, snr01 and solar.
submitted by jet_user to decred [link] [comments]

A Non-technical Bitcoin Primer (Part 1)

TL;DR: This non-technical intro covers what Bitcoin is, its benefits over current payment technologies, and the threats to its success. The goal is to get a beginner quickly up to speed and making sense of the headlines. The primer is divided into two parts, and the second part is linked to at the bottom. Suggestions for additional resources are provided at the end of Part 2.
There was a recent post asking "I've been hearing a lot of talk about Bitcoin the past few months, and I want to get started, but I want to know what it is, and the benefits of using Bitcoin over other forms of currencies."
While it's relatively easy to find resources on the technical underpinnings of Bitcoin, or on how to purchase your first bitcoins, it's difficult to find summaries of the many issues it faces as a technology. Media stories can be confusing to navigate, with some heralding Bitcoin as the next great revolution, and others deriding it as a tool for criminals.
I thought this would be a good opportunity to post an early draft of my primer covering the important non-technical aspects of Bitcoin. It should be enough to get a beginner off to a good start.
Part 1 is below, and Part 2 is linked to at the bottom.
Comments are appreciated!
WHAT'S THE BIG DEAL? We can now communicate in a truly global way, thanks to the World Wide Web. Instead of sending letters, we send e-mail. Instead of expensive long-distance phone calls, we have Skype and Google Hangouts. Instead of looking up information with a card catalog, we search Google or go to Wikipedia.
Unlike our communications systems, our traditional payment systems are not global, despite the fact that we live in an increasingly global economy. Bitcoin is the first web-native payment protocol and consensus network that supports global, decentralized peer-to-peer payments (I'll explain more about what that means in a bit). At first, you can think of it as a global form of cash for the internet, but it's actually more than that. It has the potential to do for the world economy what the World Wide Web did for communications.
At present, we largely rely on payment systems that were designed before the web even existed. Our methods of payment depend on a patchwork of local currencies and banking systems. Traditional payment systems, such as credit cards as we currently know them, were introduced in the U.S. in the late 1950s!
People have recognized the need for a new payment network for a long time and have been trying to invent a form of e-cash for decades. The main problem is that digital money, like anything that's digital, is easy to copy. We can't have people copying their money and fabricating billions of e-dollars for themselves, because those e-dollars would become worthless.
Bitcoin is a major breakthrough in computer science that has solved the problem of copying money (called "double spending").
HOW COULD MONEY WITH NO CENTRAL ISSUING AUTHORITY EXIST? When we say Bitcoin is decentralized, we mean that it's run by the users. How? Here's a brief, non-technical overview.
The users include people who use bitcoins for transactions (consumers and merchants), developers who create new ways to use Bitcoin, and miners.
Miners run specialized computers all over the world that verify transactions (checking that no double spending has occurred); they are rewarded with newly "mined" bitcoins (this is how new bitcoins are created, instead of them being issued by a government).
All the transactions are recorded on a public ledger called the blockchain (since the blockchain puts everyone in agreement with the transaction history, it's the consensus mechanism alluded to earlier).
Bitcoin with a capital "B" refers to both the protocol (the technical specification of how this system works and the code that implements it) and the whole payment network of users. When written with a lowercase b, bitcoin usually refers to the currency that is transacted across this system.
(It turns out that Bitcoin, as a protocol, supports many other applications in addition to the bitcoin currency. In a way, it's similar to how the internet is used for more than sending e-mail, but I won't get into additional applications here.)
So, what are some advantages of Bitcoin?
SECURITY You buy something online at Target by typing in your credit card number. Target gets hacked (as we saw early this year), and hackers now have your account number, which is basically the key or password to your credit line.
Now consider e-mail. When you send someone e-mail, do you need to give them your password in order for them to read the e-mail? No. You have a public e-mail address that you can share with them, if they need to reply to you.
Bitcoin is like that. You have a public key (like your e-mail address) and a private key (like your password). You can send and receive payments without giving away the keys to your funds.
So, things like the Target debacle could not happen.
Yes, people's coins do get stolen, and there are still security issues, but often these have to do with people who are not knowledgeable about Bitcoin and who try to store the coins themselves (as opposed to storing them with a reputable third party), and they end up not securing their private keys properly.
Or, they'll print what's called a paper wallet with unencrypted private keys and send it through the USPS (you wouldn't send a lot of cash in an envelope through USPS, would you? I'm hoping you answered no!). Please do not do this!
So, people need to learn that Bitcoin is like cash in some ways; if you lose it, you're not getting it back (although some efforts at insuring bitcoins are starting to crop up).
As the industry grows, storing coins securely will become easier for the non-techie. Remember, it used to require lots of technical knowledge just to get on the World Wide Web.
LOW FEES It's difficult to overstate the importance of this. Low fees will help workers sending money abroad to family, they'll help small business owners and larger merchants, and they'll enable new business models.
Currently, people can pay around 10% to send international remittances (e.g. if they're sending $200 to family abroad, they might pay $20 in fees), and the international remittance market is huge. For example, in 2010, India received 55 billion U.S. dollars in remittances; perhaps half of this was for family maintenance. Remittance fees are therefore a big burden on lots of families worldwide.
Merchants pay around 2-2.5% on all the money they bring in through credit cards. Small businesses accepting payments through PayPal pay 2.9% +.30. An individual bringing in about $3000 monthly could pay around $90 per month to be able to accept payments.
Typical Bitcoin transactions range from free to .0001 BTC, or about $.06 per transaction, regardless of the number of Bitcoins sent. (Fellow redditors, please chime in on this if you have helpful sources).
Low fees also enable microtransactions, which are very small payments, and these can support entirely new business models. For example, consider an online newspaper that charges a large monthly fee. Many users just want to read one article. With microtransactions, it's conceivable that users could instead just pay a few cents per article. This was previously impossible, because the fees paid by the newspaper to collect the payment would be larger than the payment itself.
Why are the payments so cheap? What's the catch? Bitcoin payments are peer-to-peer, so there aren't third parties charging fees. Most of the fees charged by credit card companies, as I understand it, go toward fraud prevention, but Bitcoin does not suffer from the same security flaws.
GLOBAL SOLUTION Bitcoin is built for a web-connected world. It's not issued by any particular government and can be sent between two parties anywhere in the world without going through intermediate banks and exchanges, which reduces cost.
ACCESS FOR THE UNBANKED Roughly half of the world's adult population is unbanked, i.e. does not have access to a bank account. Not having access to a bank account makes it difficult and expensive to send payments, to store funds securely, and so on. In short, it's a major hardship.
It's not that the unbanked have no money. Often, there is just no access to a reliable banking infrastructure where they live.
In the developed world, it’s possible to be denied access to a banking account because of having overdrawn an account many years ago. "Mistakes like a bounced check or a small overdraft have effectively blacklisted more than a million low-income Americans from the mainstream financial system for as long as seven years" according to the New York Times. A million people is a small number compared to half the world's adult population, but this shows that access to banking can be difficult for a lot of people in developed nations as well.
As the Bitcoin industry grows, it will become easier for individuals to securely store their money (people in developing nations often do have access to cell phones, and payment applications for such cell phones are already being developed). In this way, developing countries can leapfrog traditional banking infrastructure as they did with telecommunications networks by going straight from having no land lines to having cell phones.
PREVENTION OF RAMPANT INFLATION In many countries, such as Venezuela, Argentina, and Iran, the local currency can be highly inflationary. People's hard-earned assets become less and less valuable. This can happen when a country prints too much money.
With Bitcoin, the rate at which new bitcoins enter the economy is strictly controlled by the protocol. Eventually, there will be a maximum of 21 million bitcoins in circulation. After that, no more bitcoins will be produced.
Right now, the price of Bitcoin is very volatile, but much of this volatility is the result of Bitcoin being new. If it succeeds in becoming more widely adopted by merchants and consumers, and if more institutional investors start getting into Bitcoin, and if regulatory clarity increases from governments, this volatility will diminish. (All of these things are starting to happen.)
A related aspect of Bitcoin that is novel is that if it becomes widely adopted, then in the medium term, its value will increase fairly dramatically, instead of decreasing as with inflationary currencies. Basically, the bitcoin supply won't increase too much, but the goods and services paid for with that supply will increase. So, the value of the bitcoins will need to go up to accommodate that change. (In the short-term, the price is determined more by speculation, but it's this speculation that makes bitcoins valuable enough to actually be useful).
Bitcoins constitute a new kind of asset class. People can use them as a currency, but they can also use them as an investment (especially now, while it's still early). These two aspects of the currency will pull in opposite directions for now (if it'll grow in value, should I really spend it?). People here on bitcoin might tend to hope that this tension will be resolved, as Bitcoin will be made popular by its many advantages. No one knows how it will play out.
PERMISSIONLESS APPLICATIONS LAYER Early on in Bitcoin's history, a famous economist (who I won't name, so as not to make personal attacks) who vastly underestimated the potential of the World Wide Web as a transformative economic force, made a similar estimate of Bitcoin's potential.
In this terrific article, a research fellow at George Mason University explains that this economist was making the same mistake in both cases.
In the early days of the internet, it wasn't clear to everyone why it was better than the existing telecommunications networks. It turns out that the primary feature that set it apart is its permissionless applications layer. In other words, the internet is built on a protocol for data transfer, but developers can do whatever they want with the data at the ends of the network, without having to modify the network itself or get permission from internet service providers.
For example, AT&T experimented with video calls as far back as the 1960s. It wasn't until the World Wide Web that cheap video calls were made possible by the likes of Skype and Google.
In a similar way, Bitcoin is a protocol for transferring data and recording it on a public ledger, and developers can create new features on top of the protocol. This is why Bitcoin has been called "the internet of money."
A helpful analogy to keep in mind is that internet:communication::Bitcoin:finance. This is fleshed out in the "terrific article" I linked to.
NO CHARGEBACKS Let's say someone steals your credit card information and fraudulently uses it to purchase goods. You dispute the charge, and you get your money back (hence the term chargeback).
Since the money goes back to you, it's taken away from the merchant, despite the fact that the merchant has already given away the goods. Chargebacks can also happen if the consumer is unsatisfied with the goods, and for other reasons as well. This can be very costly for merchants.
Bitcoin payments are irreversible, so chargebacks do not happen. This is very helpful to merchants, but it means that when you purchase faulty goods as a consumer, you might not have a formal process in place to get your money back.
A trustworthy merchant could voluntarily send your money back, but there is no third party bank that can reverse the payment.
ACCEPTING BITCOIN IS EASY All you have to do is post your public key (like an e-mail address), and people can send you payments.
TO BE CONTINUED I've run out of room. In Part 2 of this primer, pseudonymity is discussed, along with threats to Bitcoin's success.
Edits: Wording under "SECURITY," per BitCamel; typos; linked to remittance data.
submitted by 11251442132 to Bitcoin [link] [comments]

Deep Web Diver [Continuation]

Just like centuries ago explorers ventured to distant lands to satisfy their curiosity, prove something to the world or get fame, I’ve decided that a deep web was my “Terra Incognita” from which I would return with glory. For those of you who don’t know, the deep web is a part of the internet that cannot be accessed through ordinary search engines. The usual comparison of the Internet to an iceberg is pretty on the spot: you can only see the tip of it, which accounts for all of the websites you can see, and the rest of it is buried under the water. However, I think that comparing it to the ocean, with its many layers, where you can’t see the bottom and the light eventually fades away as you go deeper, would be more suitable.
Most of the websites and pages there are nothing special: if the search engine can’t see them it doesn’t immediately make them shady. No, this first layer is just beneath the waterline of search engines’ digital ships, containing things like databases, unlinked pages, online dropboxes, scripts and private data.
A large chunk of this layer is a virtual analog of the Dead Sea - hundreds of millions of websites that weren’t finished or indexed properly, and thus remained dead and aborted by their creators; carcasses of someone’s ambitions, silently floating around the world.
In oceanology, this place is known as the Epipelagic Zone or The Sunlight Zone as I like to call it. You can “swim” safely here, taking some occasional dives, with the greatest risk being getting a virus or leaving your e-mail for some spambot to find.
Just below it lies “the Twilight Zone” of the web: still accessible to the common public, but not without some hardships. It is comprised of everything we, people, find embarrassing and shameful enough to hide from unwanted eyes: online casinos, porn sites that balance on the edge of being legal, specific forums and encrypted transmissions. Many of us have been there, although we hate to admit that fact for obvious reasons. If you’re willing to find more, to go deeper, you’ll need special equipment: entering the true infamous Deep Web – or the Dark Web, as it is also called, - is impossible without required software, due to its encrypted nature. If popular search engines are ships, then this software is your personal submarine, and only by using it you can get to The Midnight Zone of the Internet, the legendary Bagdad of the web, where you can find anything, and beyond which I’ve found an evil genie that still haunts me to this day.
Just like on the streets of the aforementioned city, you can meet all kinds of people here, but this shadowy digital alternative has its reasons to be hidden so well. There are merchants, selling mostly illegal things like drugs, unregistered firearms, intel that should not be shared and, of course, illegal pornography, which is a disgustingly popular product here. All of that with a simple and comfortable design of an online shop located near you and ready to serve you around the clock. All it takes is a click of a button.
You can also find shady figures that can provide you with services you can’t find on higher levels of accessibility: if you want to spend a night at your place with a naughty guest for a moderate price but don’t know who to call, you can just search here and surely you’ll find an online brothel nearby ready to take your request and bring service to you.
Hackers are also very common here, and from what I’ve heard for a fair price their skills will become yours for some time. Most of them communicate on secluded websites which are nearly impossible to enter if you’re not wanted there: there are dozens of encryptions and surveys to stop anyone who’d like to try. For a fair price, their skills will become yours, although you better pay up at the end of your deal: these guys can ruin your life from the other side of the world.
The deep web even has its own money, bitcoins: the untraceable digital currency, very popular for its former quality. Anything on the deep web can be bought for them, even more, money, as weird as that sounds: fake or stolen credit cards are just another type of goods here.
Sometimes, the services offered seem almost absurd: for a reasonably large monthly fee, you can subscribe to a database of hacked credit cards, which is renewed on a daily basis. The digital robbery has evolved and entered the whole new level: hackers don’t go for one pocket, but instead they rob them by the gross and leaving it up to you to actually empty them. The development of the economy made them successfully re-qualified from thiefs to entrepreneurs.
It may seem that the Dark Web was “a wretched hive of scum and villainy”, but, believe it or not, I’ve found this kingdom of mischief to be relatively innocent. Mostly because I knew that people there were small fry. They were doing wrong things every minute, every second all around the world at once, constantly busy with stealing, selling and distributing things, but they weren’t the final instance of evil on the web. No, there was also a place known as the Dark Web, hidden beyond what was hidden. An ocean beneath an ocean. The place that I’ve only heard about, largely because it was completely inaccessible, but also because even my curiosity wouldn’t lead me there.
I know that I’ve already used this term, but let me clarify: over the course of time these two terms got confused and people started calling the Dark Web with a more generic Deep Web term. Most IT specialists attribute this confusion to public ignorance that was only spread through mass media. However, I believe that there had never been any confusion: the term “Dark Web” was coined to forever differentiate the most nefarious part of the Internet from the rest of it. Remember the analogy with the layers of an ocean? Welcome to the Abyss Zone.
I’m not saying it lightly: The Dark Web is really the deepest pit of hell, only it has been built by sinners themselves. It is the most restricted part of the Internet, and its creators had a good reason to make it such since it is used for the most despicable purposes in the world. The gift of freedom and anonymity here is perverted into a tool of terror and crime and serves the murkiest corners of humanity’s collective consciousness.
If someone was kidnapped for the purpose of later being sold into slavery, he would most likely turn up here as another item for sale. Unfortunately, in the 21st century slavery was still a thriving, and the existence of global encrypted communication and transactions only served its cause. Most of those poor souls would go under the hammer to the highest bidder. Others were, for the lack of better word, expendable: their fate was to be abused and killed during the filming of snuff videos and other disturbing content. Ending up in a private clinic where their organs would be harvested was also a possibility for them.
Organized groups of hackers also operated from there: while their activity was a stuff of speculations, the level of encryption that they used meant that they were up to nothing good. My only guess was that they were the organizers of all the activity on the Dark Web, administrators of their own tidy hell that, just like the original one, existed underground, only in a different meaning of the word.
The Dark Web was also a place where you could hire a killer, and their services had a much greater demand and supply that one could assume. They operated all around the world, in every large city, and anonymity and untraceable nature of bitcoins provided them with perfect alibis, as well as drew in new candidates for the job. From what I’ve heard, they weren’t even always professionals, just some usual people, office clerks who after a long day of work wanted to provide themselves with an additional income. Their fees were disgustingly low: apparently, the cost of human life was no higher than a table in IKEA.
I stayed away from that place and never tried to gain entry, instead only going as deep as the Deep Web. And it may seem like a very strange and maybe even bizarre thing to say, but despite the criminal nature of the deep web, there was something that I found very appealing to me. I didn’t realize it at first, but the deep web was so attractive not because of the incriminating nature of its content, but because it had a spirit of adventure surrounding it. It was the last hub of that true, anarchic freedom in our regulated world, where we could set our inner child free and do whatever we want. I didn’t engage in any unlawful activities, but even without that, the sheer presence of opportunities intoxicated me. Among all the mischief, gambling and illegal trading I, ironically, felt like one of Peter Pan’s lost boys.
So, even though my mission of impressing my peers was over, I returned to the depths of the Deep Web afterward. My journey was only beginning.
Everything I’ve told you so far was information that I’ve prepared for a presentation, and, lucky for me, I still have it with me after two years, so I didn’t have to think twice of what to tell you. But everything from this point on is linked to my experiences with the DW afterward.
I’ve started to spend a lot of time on the deep web. With university, homework and a part-time job I didn’t have any other time to browse the net other than late at night. I barely slept, and my eyes always had characteristic dark circles under them, but I didn’t regret that. In my eyes, I was becoming a part of something secretive, some mystery that was bigger than me. I became a net-stalker, only my obsession was not someone’s social network profile, but the Internet and its dark corners itself.
Aside from its illegal uses, the deep web could also be used for other, less incriminating purposes. Since it was not regulated and essentially existed under the radar of “the Big Brother”, people all around the world used it to communicate and share information without restraints – which was very useful for those who lived in countries under dictatorship’s rule. North Koreans were common guests on local forums, but the most welcome ones were whistleblowers.
There were a lot of people on local encrypted forums who were willing to share some insight on politics, economics, social studies and just some insider information that they wouldn’t be able to share on common open forums. Their stories and statements they made to their anonymous addressees were sometimes absolutely crazy and seemed made up, but they never failed to gather listeners, and I was one of them.
Naturally, the credibility of their statements was up to you to decide. However, in some rare cases, people went to great lengths to provide their audience with proofs of their words. In their cases, you could tell that they were very eager to spread the word and to make it believable, and from the nature of said information, it was obvious that, if it was true, they risked a lot doing so.
There were a few “stories” that stood out to me both in terms of impossibility and credibility. One of such “speakers” was a guy who worked at Moscow’s underground as an accountant. From him, I learned everything about it, including what a massive structure it is. It consists of one circular line in the center which is crossed by numerous other ones that stretch in all directions, gaining the resemblance of squid’s tentacles that try to seize their prey. Constantly being expanded, the network has already outgrown the city, and some of its lines go even beyond it.
The network lies very deep under the capital, as it also doubles as the largest in the world bunker. It was built with this intention even before the Cold War, and over the years it only expanded and got deeper and bigger, connecting to a vast network of other bunkers for civilians, military personnel and “privileged” of the country.
There was also a system of the tunnels that the poster referred to as “Metro-2” – a restricted area only for the government figures. If the metro was a circulatory system of the city, then Metro-2 was its lymphatic system, connecting Kremlin, the Russian parliament, government bunkers, airports and even military structures that were located far outside of Moscow, into one single organism.
All of the above facts only added to the shock when the man provided a very interesting and grim piece of statistics: every day, the number of people who entered the metro network exceeded by the tiniest margin the number of people who left it. According to him, there couldn’t be any mistake: not a fly would go in or out unnoticed, as such an important part of infrastructure was heavily surveyed. The statistics also included suicides and gatecrashers, so they weren’t the cause of the mismatch. People were going down, under their city, and just disappeared without a trace in a vast network of underground tunnels without any obvious reason, never to be seen again.
Every year, 100,000 people disappear in Russia without a trace – a truly horrendous number. Yet to know that some of them vanish not just in the middle of Russian capital, but on its public transport, was both distressing and horrifying. Its size comes back to haunt me, as looking for gone people there seemed like an impossible task. Pinpointing the exact place and time where they were disappearing was not possible, too.
But the most disturbing thing about the whole report was not the fact of disappearances. No, it was the photocopy of top-secret “eyes only” document that restricted the personnel of the metro from speaking about them. Repercussions for the disclosure of said information mentioned there were severe, and being pleaded guilty for treason was among them. But, according to the man, it was the fact that his higher-ups knew about what was happening and hid that fact from the public that pushed him to share this information with the world in the first place. He only wondered if they knew what was really behind it, and if they even were somehow involved in that.
It wasn’t the only case when something shocking was shared there: remember, only the place like deep web could welcome people like these to open up and speak. Yet sometimes, finally feeling safe under the protection of anonymizers, they would speak about things they would speak about things that were not meant to be mentioned beyond heavily secured doors.
One of the craziest, yet most backed up statements I’ve seen there was that for the last 50 years, humanity was involved in the one-sided war against aliens. To make that ludicrous proclamation even more bizarre, the author of the report stated that it was the aliens who had been on the receiving end.
Reports of alien activity were quite popular on the Internet in general, not just on the deep web, where the posters hoped to look more convincing by pretending that they were covering their tracks. So naturally, another statement like that didn’t surprise anyone. What was really unexpected was the number of documents that followed after that. Protocols of presidential meetings and secret G7 assemblies, numerous non-disclosure agreements, cash flows of money going seemingly nowhere, research reports, sky surveillances reports – all of it was there. Even if someone went so far as to fabricate all that, which would be a colossal amount of work, they would probably not post it for such a limited number of people after that.
That particular whistleblower stated that he was a high-ranking official of a secret governmental body in one of G7’s country members, and that the official reason for that organization’s existence was just a cover up for its true purpose – to coordinate the actions of the world’s strongest economic powers in the “defense”, as they called it, against extraterrestrial visitors. All other activity, while also essential, was ultimately just a ruse to conceal their main goal.
It sure sounded impossible to wage a war against extraterrestrials, and secretive at that. Our space program, while ambitious, was not at the interstellar level, and there were no reports from battlefields, not to mention the general difference in technology between humanity and the species that mastered interstellar travel. If such a war were to occur, it would be similar to pest extermination.
But that confusion was just a product of our ignorance. In pop-culture and, by extension, in the minds of the general population aliens usually carried out the role of invaders. In reality, they were no more than visitors, ambassadors of peace that were not welcomed. When they first arrived, they offered their help and cooperation to the world leaders, promising them, that, if they agreed to cooperation, then humanity would soon be among other prosperous races that fared among the stars. They asked for nothing in return, doing everything just out of desire to help other intelligent life – or to be less lonely in space.
But such a treaty would mean changes, and among them were the ones that governments couldn’t agree to. The ideas that aliens offered were progressive, phenomenal – but also too ahead of time, and if the rulers of Earth agreed to them, they would cease to exist due to not being necessary anymore. When everyone is their own ruler, there’s no place for laws and taxes.
So instead of doing what was for the best for humankind, they decided to do what was best for their power. They’d secretly put aside their differences and united in the face of a common enemy, the one who threatened to take away their privilege, their sovereignty. It was always speculated that common adversaries would unite people, but whoever said that probably didn’t imagine such self-destructive results.
And so, the secret war had begun. It was wrong to say that it was a war of humanity against aliens. No, in reality, it was aliens versus the 1%.
In a way, they turned the whole Earth into North Korea. And the irony is rich: we take pride in our technological advancements, we think that we are the only ones who have the privilege of intelligence, but at the same time our brothers shoot the messengers of peace and knowledge out of the sky without us even knowing about that.
I guess the aliens could just use the brute force, but that would undermine everything they’ve been working on. The governments wouldn’t lose that chance to prove their point and to tighten their grip on masses. No, violence wasn’t their way, and it wasn’t even a possibility.
And now, whenever you hear of alien sightings, whenever you see unexplained lights in the sky, you will know that those may well be starmen, trying to reach out to people like you, to show you the truth. But if for 50 years we’ve been told by the Big Brother that there’s nothing to see there, why would we think otherwise now?
There were many other stories that I would want to share with you. The stories about "killer files" that supposedly roam the internet - songs and videos that on at first glance seem harmless, but in reality contain frequencies deadly to humans. The stories about ancient websites that existed since the dawn of the internet and were rumored to be the gates of Hell. The tales and gossips of a wholly independent country of hackers in the Pacific situated off-coast on one of the abandoned oil platforms. Yes, there were different stories. But the one that I'm about to tell you is the one that got me into the mess I'm in. The information so dangerous that it is forbidden to even share. The true curse of our days.
That's it for now, expect to see the full and polished version in a few months. Thank you guys for sticking with me!
submitted by TheScandalist to Scandalist [link] [comments]

Tales of IT converted to plain text for the sake of legibility

I got hired by my Dad to do IT. I know very little about IT besides games. These are my IT stories. be first day
 > woman asks me if I can install the latest version of adobe reader > fuck ya I got this DL like a boss > "Wow you're like a computer expert" > "Well you know..." > Asked to input admin credentials > forget admin credentials > try admin:password > nope.jpg > "uhhhh... uhhhh... oh crap somethings going on with the server.. be right back" > 3 months later she still doesn't have adobe reader 
be day 2
 > angry guy is on the phone asking me about some weird in house program > have no idea what the fuck he's saying > there's a pause > he's waiting for an answer > think back to the IT crowd > "Have you tried turning it on and off again" > "Like restarting" > "Give me a sec..." > it fucking worked 
day 3
 > hot sales rep comes in with laptop issues > she's 9/10 cougar > all flirty with me > tells me she needs something updated > can only hear her boobs > her laptop smells like strawberrys > download adobe reader for her and hand it back 
day 4
 > figure out how to turn off the servers > when people start asking for help > go into server room > turn off servers > come out oblivious and start downloading adobe reader > eventually people start screaming > THE SITES DOWN! THE SITES DOWN! > "I'm on it!" > run back to the server room > play hotline miami in the back for few hours > turn server back on near end of day > come out of server room > wipe brow from face > "I did it..." > people are singing my praises saying i saved the day > really just saved the girlfriend in HM 
day 5
 > run into cougar at coffee machine > ask her how things are going, just a general statement > instantly thinks im talking shop > starts telling me all the shit wrong with her computer > she doesn't see me as a human > she sees me as an it > tell her to drop off her laptop > she does > I upgrade her ie > download adobe reader > restart the machine > everythings fucking working > run it back to her > fix my hair > check my breath > act like I saved the day > she's in her office on the phone > she motions to put on her desk >1 do...kind of linger > "Is that everything hun?" > leave > hear her say "oh it was just IT" > just IT > that is all I am now 
day 6
 > really bored > decide to download a gameboy emulator and play some pokemon > the webfilters blocking it so I turn it off the whole thing I dont just whitelist it, I turn it all off > get to emulator site but now I need to turn off the antivirus > use the admin which I now know to do it... > end up turning off the whole antivirus settings on the server > download my emulator and rom > play my game > guy comes into my office > "I think I caught I virus" > me "gotta catch em all" > by the time I'm facing Misty 4 people have viruses 
day 7
 > same guy that was yelling at me day 2 is yelling at me > he cant remotely log in just as I am about to leave to go home > "Try turning it off then on again then call me back" > go home 
day 8
 > guy call from day 7 calls back > he's pissed > tells me he lost a client because of my stupidity > "shit happens man. I lost to team rocket like 10 minute ago" > "what the fuck are you talking about?" > click 
day 9
 > one of the printers is out of toner > some fat guy tells me to change it > "it's a toner man... can't you change it? I'm working on this huge issue with the server" > was really downloading steam > "it'll take a second... god I have much more important stuff to do... that's why you're here" > sigh and go do it > cant figure out how to fucking open the fucking cartridge door > start hitting it like they do in zoolander > tell the poor mentally challenged guy in the mail room I have a special job for him > he has to hide the magic egg in the chest of Hewlet Packard > go back to my server business > half an hour later the fat guy comes into my office > "What the fuck did you do to the printer?" > "Changed the toner" > He just starts shaking his head and muttering shit > we walk over to it > the mailroom guy jammed the cartridge in the wrong way and actually lodged it in there so half of it is sticking out > the door cant even close > there's black hand prints all over the printer too > Can feel the guy judging me so I just spew bullshit > "Looks to be a probably with the network." > the printer was down for over a month before I figured out we have a printer guy on call 
day 10
 > have to set up projector in the boardroom > cant find a thunderbolt to hdmi cable to hook it up to lazy to go to the store > dont even have a corporate card either > tell the people needing the projector that there's a compatibility issue with macbooks > they use some guys dellbook > the files from the mac end up not running on the dellbook > call me in mid meeting > all these business people staring at me as I am randomly clicking folders as fast as possible to look like I am pro > download adobe reader > double click files > works > "Thanks Anon, you saved me" 
day 11
 > there's a new hire > no one fucking told me anything > get screamed at that theres no computer for this new person > go in back to see if we have any spares > there's a few > but there's also some really old pcs from like the early 90's > boot it up > works > set up new person > everything lags > you open adobe reader? massive fucking lag > send out the computer > "it's the best we've got on short notice" > get like 40 sharepoint tickets the first day from that person > he's a real stickler for help > he ends up quitting the very next week saying he can't work under these conditions 
day 12
 > someones computer crashed > fuuuuuuuuck > set up computer > remember something about profiles being saved on the network > go back to the server room > look at the server rack like a total idiot as I try and figure out in my head how this works > tell the guy all his data is lost and there's nothing I can do > "b-b-bbut my project... i have to present that to the board on friday..." > "gone, man. It's gone" > play sim theme park the rest of the day 
day 13
 > roll up to work an hour late > whole office is in chaos > fallofrome.jpg > "HE'S HERE!" > Go in to my office open up mail > dozens of emails like: > "Hey is there something wrong with the server I can't log in to..." > "Any idea why the site is down I..." > the server is actually down > adobe reader can't save me now > "Just go back there and do what you did last time!" > everyone thinks its an easy solve > literally shaking in the server room because I don't know what to do > nap in server room for entire day > people are pissed can hear them banging on server door > we've missed deadlines > leave at 6:30 pm > the CFO sees me in the parking lot > hes been in a meeting all day doesn't know about my struggles > "You're still here?! That's the kind of can-do attitude I like to see" 
day 14
 > server is still down > my dads asking questions > everyone is pissed > take an early lunch > over hear some guys at the restaurant talking about buying a new modem for the office > hailmary.jpg > "Hey sorry to bother you during your lunch...but would either of you happen to be IT?" > before either of them could read me the riot act and tell me something like how the fuck dare I > I'm IT too > I show them my hand that I scratched up crawling wire on the floor > they nod > "What would you try doing if your server is completely fucked?" > "Have you tried restarting it?" > I go back and restart the physical machine > it fucking works 
day 15
 > hot cougar walks by office looking distressed > "Everything okay?" > "Oh good... I can't log into my email... can you please help me... PLEASE" > "I got you." > get her laptop > re-install microsoft office > outlook works again > poke through her emails to make sure things are working > send a test file > read the titles of her latest emails > "Divorce" > hand back her laptop > "Looks like its working now" > "Thanks..." > "Everything okay?" > "Well..." > this is fucking it, tell me your sob stories cougar woman and then its or > "My mouse is acting a bit funny, can I get a new one" 
day 16
 > one of the mailroom guy's monitors isn't working > it's coming up all green > backstory: there's been a huge misappropriation of funds because I gave him dual monitors just because he's a mentally challenged and I figured if anyone needs 2 screens its him > all he does is look at msn slideshows > and use the fedex webapp or something > he's a nice guy so I actually try and fix it for him > nothings working > think its a driver issue > think its a setting issue > think its an actual hardware issue > whole time people are coming to me with real problems but I keep saying "I'll be there in a minute" > after 2 hours the mailroom guy goes > "maybe da pug ish boken" > I swapped out the hdmi cable with a brand new one > it worked > I officially am less adept at my job then a poor mentally challenged guy 
day 17
 > nice old woman who talks to me about sports tells me her keyboard is shit > she's oldest person in the office by far > old as dirt > tell her I have just the thing > go in the back and unbox a brand new keyboard meant for the programmers > bring it to the old woman > "You're such a helpful young man" > reach down awkwardly to plug in the new keyboard > get back up and dust pants off > old lady looks like she's having a heart attack > look at the screen > it's fucking blank > on my way back up to my feet I hit the power button > she lost 3 hours of work > 3 hours that old woman will never ever see again 
day 18
 > company meeting > we're over budget > there has been ridiculous spending > "we've lost money for almost a month > day 18 > almost a month > they are going to out me > IT budget comes up in discussion > we're one of 2 departments that are coming under budget > "Great job Anon. I heard about the server issues here... you're the man" > at the end of the meeting a 45 year old events planner asks me if I fix computers on the side > "Not really..." > "Oh... I have this one blasted thing that needs fixing. You couldn't just come over and fix it?" > bullshit > for a laugh I say, "yeah it's cool, just give me your address and I'll be over after work" > not sure if I'm getting sex > buy condoms > she's not that hot like a 6/10 tops > not even going to lie > last call kind of hot > arrive at her house > ring the door bell while standing all suave leaned up against the door > her husband answers the door > shows me to the computer > install the latest version of adobe reader > get $20 > go home 
day 19
 > some guy crashes a program so I have to reinput the settings > go onto his cubicle mates computer > check settings > 2 hours later > "You wrecked my computer... I want my fucking computer back exactly how it was I don't know what you did but somethings off my usb drive is buzzing..." > wtf > I didnt do shit to your computer. I checked a program you open 20 times a day > super pissed so I go back into the server room and play Thomas Was None > hear knock on server room door > its the cubtclemate > "Hey, Thanks for fixing it. > "Fixing what?" > "The my usb drive" > I didn't do shit lol > "Oh yeah don't mention it" 
day 20
 > spend entire day cleaning the server room up > getting it all nice > just unplugging network cables wily nifty so I can colour coordinate them > people are losing their shit > they are randomly getting kicked off > tell people there are some issues with our isp > I make sure to say I-S-P as I have now learned by spelling in abbreviations no matter how common makes you sound techy > by the end of the day the server rack is all classy looking > unfortunately I never mapped anything and a handful of people can't connect because their ports aren't connected to anything > tell them the I-S-P will have it done ASAP and go home 
day 21
 > now that the server room is all clean I set up all the test boxes in the back > 8 machines in total all connected to the network > try joining monitors all together like you see on cool threads, you know like the racing ones? > realize these are shit old monitors and you can't do that > come up with the great idea of bitcoin mining with these boxes > set it up for the first half of the day > after lunch I'm mining > terribly but I am mining > people start complaining about server lag > blame the lag on the olympics > suggest that the whole office must be streaming it > ban the olympics on the web filter > office is divided; can see the divide in my email > people who are pissed about not being able to watch the olympics > and the keeners who think its all work and no play at work > I've officially gained power though, people respect me for making this mandate > "He's a real company guy" 
day 22
 > its birthday day > office celebrates all the months birthdays > take cake > set up n64 in the boardroom > challenge people in the office to goldeneye > keep saying "Hey I'm just taking a 5 minute break for some cake want a quick game?" > own the shit out of all of them > realize I did absolutely nothing all day but eat cake and game > no one ever noticed 
day 23
 > cougar calls in from the road > she's having trouble accessing a key app for a client on her ipad > she tells me its name > have no idea what it is > but make sure to sound astute > ask her if she's using WIFI or 3G > "How do I check" > "Nevermind let me check from my maincore system" > google the app but nothing comes up > ask one of the other sales people > "oh it's just an infographic on our main site" > tell the hot cougar to come into the office because it's going to require me to hardcode the changes in > she drives 2 hours to come to the office so I can open up Safari and bookmark it to her ipad homepage 
I'll continue this tomorrow, believe it or not there's an ending to this but I can't get to it today.
day 24
 > people heard from the 45 year old events planner I do house calls > bunch of idiots are bringing in their home computers, mobile devices, anything technical for me to fix > tell people I can only do it after hours and I charge $20 for small stuff and $50 for large. > most of it is simple fixes > windows updates or adobe reader installs fix it > but then I get it > the laptop from hell > this fat indian guy hands me his laptop in a plastic bag, not a laptop bag, a plastic one > "What's wrong with it?" > "You tell me genius" > Load it up and it's asking for some system restore or something. > just hit next and okay > fixes it but it says I need to load chkdisk? > figure that has something to do with the cd drive > open it up > there's a thick fucking layer of bread crumbs in the tray > tilted the machine to its side > motherfucking bread crumbs just pouring out of the laptop > restart the machine > it loads perfectly > turns out the guy was using it as a tray for his morning bagel > fucking toaster laptops 
Hi AV its the IT guy from yesterday
day 25
 > even though I'm shit at IT > one guy thinks because I am IT I am super techy > he asks me what my favourite browser is > "Google.... Ultron" > "it like chrome?" > shit thats what I meant > "yeah...but better...it's what nasa uses" > "cool could you dl that for me?" > gulp > "yeah no worries" > literally start shaking the mouse back and forth so fast you can see the cursor > then ctrl alt deleted into task manager > "there....you go. All done. It looks like google chrome. but its really ultron. no one else can tell." > to this day he still thinks he runs google ultron 
day 26
 > some woman calls me over > "it'll just take a sec, it's super simple" > shit > asks me to hook her up to a new printer > she hops out of her chair and lets me sit down > forget how to add network printers > her and her friend are talking right over my shoulder staring at the screen > "Is this going to take long?" > I fake deep thought as I stare at the screen with one hand on my temple > "Anon? I have a deadline is this going to..." > "What the fuck..." > both of the women are startled > "THERE'S A VIRUS ON THIS MACHINE" > and I just storm off like I'm pissed 
day 27
 > learn about a remote access tool that the whole office uses > decide to haunt the old nice old lady from before > i randomly move the mouse for a few hours > she struggles to do basic tasks > she comes and asks me for a new mouse > oblige her > hook it up and leave > look back at remote tool > mouse is moving again, she opens up word > I begin to type > "Hi" > no response > "Hi > "Hello? Who is this?" > "It's death :(" 
day 28
 > a guy asks me to burn him a copy of a dvd for a presentation > holy fuck I know how to do that > burn it for him > march back down to his office, proudly holding the dvd high in the air > Woman tries to stop me "Hey can you..." > "Not now... I've got IT business to attend to" > hand the guy his burned dvd > this might be one of the first things IVe done right here > tear in my eye > so proud of how far I have come > I am true IT > 5 minutes later I get a call "Hey...yeah there's nothing on the dvd..." 
day 29
 > give new hire her new laptop > nothing is fucking setup right > forgot to hook up her outlook to exchange > no worries she did it herself > cool > she asks me if I can type in the admin credentials so she can dl some social media tool > "Sure" > fuck up the login credentials like 3 times and get locked out > have to unlock it from my machine > can't figure it out but go back because I left my gameboy in her office > she starts making small talk > "So where'd you go to school to become an IT person?" > she's fucking on to me > try logging in once more to admin account > locked out still > "Yeah... you know what? I think this Hootsuite extension is a virus. I don't want that shit on my network" 
day 30
 > here's where shit starts to really hit the fan > as you know i had setup a bitcoin mining rig in the server room > it was just eating up all the bandwidth > the whole network was barely operational > and now because of my ineptitude and blaming things on viruses people started a rumour > that the whole network was being attacked by a rogue hacker group > after lunch I get pulled into a meeting by with all the execs > the jig is up > "As you know we've been experiencing a multitude of issues with our network..." > I'm fucked > "from the lag to the viruses" > so fucked > "We want you to head up the investigation and find out who's doing this and why" > ROFL > I am the fucking dirty cop on the force who's tasked with finding the dirty cop > I am the fucking law 
day 31
 > tell people I'm running server calibrations > "it's like dusting for finger prints" > no one's the wiser > show this one middle aged guy with a beard how to use a webapp > go to favourite it for him and put it on the toolbar > notice all of his favourites > Big titty housewife > Pajama Butt Slut > Mexican girl on bus > mouse over them as I mouth read them > he starts freaking out > begs me not to tell > "Why shouldn't I?" > "Ill buy you lunch" > got 10 chicken nuggets 
day 32
 > for some reason the entire office is having to fill in a captcha every time they google anything > have no idea why this happening > Google ultron guy asks me if this has to do with the virus and if he should be backing up his data > "First. Always back up your data." > he nods to my tech savvy > "Second. It's a security measure INce put in place. There are robots afoot." > he nods again like my word is law 
day 33
 > Ultron guy blabs and tells everyone about google ultron > now everyone in the fucking office has a sharepoint ticket asking for it to be installed > a few of the more competent people are asking me what the fuck google ultron is > I just give them finger guns until they walk away > have to spend entire day going from desktop to desktop pretending to dl google ultron > literally spend 3-4 hours pretending to dl software that nasa uses > one girl asks me if this even legal > "Are you a cop?" > she reports me to HR for "criminal like behaviour > have already explained to HR what google ultron is... > HR thinks its real > HR thinks nasa uses it > HR tells the narc to stop interfering with important technological matters because the narc doesnt know anything about IT like me > doesnt know anything about IT like me 
day 34
 > been playing portal 2 all day in my office > haven't heard so much as a complaint > haven't had to update adobe reader or adobe flash all fucking day > something's not right > no one's said shit about it > poke my head out of the office > everyone's heads down just typing away > starting to get worried > ask a guy how his computer is working > "Great. Ever since you downloaded Google Ultron, my whole computer has just been flying" > wtf > do a quick google search on google chrome > supposedly it automatically downloads the most up to date versions of adobe > omfg > if I don't have fucking adobe reader I'm fucking out of a job > send out mass email > ATTN: do not open google ultron it has been hacked > spend rest of day uninstalling and making IE the default browser 
day 35
 > people are becoming restless with the hackevirus stuff > they wonder why I haven't solved the case yet > some even believe its not a hacktivst group like I've been hinting > "We're not just dealing with amateurs here. We're dealing with the best. And that's why I need to update your antivirus scanner" > just to strike the fear into people I covertly turn on the computer of a person who's sick and stationed right in the middle of one of the larger areas > turn off her monitor > put speakers full > then go back to office and remote in > play Wham's Jitterbug at 3 second intervals throughout the day > eventually people Start coming to my office to report this > I nod > it's worse than I thought > "What? What is it?" > it's the Jitterbug gang. One of the world's best hacking groups" > "I've never heard of them." > "That's why they're the best" 
day 36
 > check messages > local police called > FUUUUCK > need to speak with me since I am IT about recent hacks on our organization > delete message > cougar comes into my office > asks if I can adjust her desktop so the wallpaper changes every couple of minutes > "Sure." > head over there with her > she tells me she's getting a divorce > "Oh." > Says she's actually starting to date again and it's pretty awkward > fuck it > "Wanna maybe grab a beer sometime after work?" > she laughs > "What? I mean why not?" > "You're joking right? You're IT..." > my eyes well up as I stare at adobe prompts me that reader has a new update > "Just gonna download this." 
day 37
 > feeling like shit today > cougar told her sales friends that I tried asking her out > people are laughing behind my back > can hear the whispers > "eww haha IT?!!! ewwwwww" > want to just open up a computer and jump through the moving cpu fan > mean sales guy who usually calls (yeah that one) stops by office > "My laptops not working" > I trudge over to his desk with him > hit the power button for a reset > don't say anything and just walk away > "If that's all you ever do.. Why do we need you?' > turn around > "what?" > "if you only ever just restart my computer... why are we paying you? I can restart my own damn computer" > grin > "Have you ever repaired a server here? Do you know how hard it is to get it operational? Remember how we were down for a day and a half?" > he shakes his head > "That's what I thought." > of course I just restarted it lol 
day 38
 > still feel like shit after the cougar shut me down > decide to block 1 major site on the webfilter every hour > feel like the Joker doing it > first youtube > then ebay > then reddit > hear the moans from people as they read my webfilter note > "This is a place of work not a fun house" > One woman storms into office > "This is not funny...this is serious" > "Why so serious?" I ask her > "I need you to unblock ebay" > lot seriously > "I HAVE AN AUCTION ENDING IN 5 MINUTES!" > put it back on the safe list > but it was too late > she missed out on her cellphone case > mwhahahahaha 
day 39
 > an "investigator" comes to the office > the execs were worried that we had too much to lose and wanted to bring in a professional > I'm fucked > show him around the office > he keeps asking to see the server room > "And this is Carol. She's a riot. Aren't you Carol" > doing everything I can to stall > we go back into the server room > he compliments me on how neat the cables are > think about picking up a monitor and bashing his skull in and then running away to mexico > cant do it > I'm not a monster > I'm IT > the guy goes onto the server > asks me for the login info > figure the jig is up > give it to him > he logs in > opens up IE > looks over his shoulder at me > "You don't need to be here" > "It's fine" > I need to be there when it happens > he literally starts shaking his mouse really quickly around IE clicking on random parts of the screen > I know because a popup for Home depot came up > he starts muttering to himself... "hmmm... hmmm" > watch him type in adobe reader in google > he dl's it > swings his cursor around some more > and then finally goes > "fucking hackers right?" > we are brothers he and I > IT brothers 
day 40
 > wake up and realize how lucky I truly am not to be fired or worse > see cougar girl walking into the office from parking lot > asks me how things are going > I think we finally put an end to the jitterbug gang > "no, I meant... not work stuff' > look at her strangely then smile. > "Oh you know how it is" > she flicks her hair and then laughs > what the fuck? > "Cool. I'm having problems opening a file...can you open it for me hun?" > sigh > "Yeah sure..." > we walk into her office she's being all flirty > click on the sharepoint link of a pdf file > won't open > download adobe reader > while it's loading I ask her what she's planning on doing on the weekend > "I'm going to the mountains with this guy for our first getaway" > stop adobe reader at 80% > walk right out > I am IT 
day 41
 > this hot yoga girl from events comes into my office > her keyboard keeps typing in french > too busy playing Happy bird to care > "so are you going to help me?" > "if things slow down. I've been swamped today" > "I'm going to fucking kill you" > she waggles her glorious yoga butt away > cute girl, and don't even care anymore just want day to fucking end > I hate this fucking job > all I do is get yelled at and download adobe reader > I cant even find the joy in games any more > Dad walks by > sees I'm looking blue > Dad takes me out for lunch > pats me on the shoulder > "I'm so proud of you son." > to date the company is in fucking shambles > and I still am primarily an adobe reader downloader > but I wouldn't change any of it for his very next words > "I love you son." Thanks guys and thanks Dad for the job. :) Don't forget to download your adobe readers guys. 
I didn't make this, I converted it to text from the imgur images and am working on correcting it occasionally.
submitted by that1communist to funny [link] [comments]

Confirm Bitcoin Transaction Using Double Spend RBF & CPFP 918360809034 BITCOIN HACK?! Double Spending, Ledger Live, BTC Technical Analysis, Live Trade, Bitcoin Profits What is a 51% Attack in Cryptocurrency? Explained W/ Bitcoin & ZenCash Double Spend Hack Bitcoin (BTC) double spend on main Thai PoS system BITCOIN TRANSACTION - DOUBLE-SPENDING ATTACK (51% ATTACK)

In an attempt to execute a “double spend” attack using Bitcoin Cash, an unidentified individual purportedly lost $2,000 purchasing a gift card worth $1,000, as reflected in Cryptonize.it transaction data. Hacker News new past comments ask show jobs submit: login : Bitcoin Gold Hit by Double Spend Attack, Exchanges Lose Millions (ccn.com) 973 points by drexlspivey on May 23, 2018 hide past web favorite 531 comments: jhpriestley on May 23, 2018. When Bitcoin was running up to $20,000, I tried to analyze the system and come to a personal conclusion about its equilibrium value ... An unidentified hacker has mounted several "double spend" attacks on the infrastructure of the Bitcoin Gold cryptocurrency and has managed to amass over $18 million worth of BTG (Bitcoin Gold ... She then said it seems to her that the hacker was splitting the BTC into smaller amounts and she wrote “RIP BCH … only a double-spend can help this poor guy now.” Crypto Exchanges Lose Remarkable Amounts Of Money After Double Spend Mining Attack on Bitcoin Gold. Cryptocurrencies claim to operate more securely and privately than fiat currencies, but the truth is sometimes the security line is the way too thin and hackers just take advantage of it.Ever since virtual coins have emerged to the financial industry, many scandals have been linked to ...

[index] [36993] [750] [19999] [17366] [33092] [47265] [24443] [30441] [35434] [24306]

Confirm Bitcoin Transaction Using Double Spend RBF & CPFP 918360809034

Daniel and I discuss this essential problem and the solution that is Bitcoin. "Double-spending" Bitcoin -- the process of making someone believe you sent them funds when you didn't -- used to be only for the tech-savvy. Thanks to Glass... King Bitcoin Doubler Recommended for you 5:25 FREE Bitcoin Double Spend Generator Tool #Bitcoin #BTC #DoubleSpend #FakeBitcoin #FakeTransaction - Duration: 7:12. This is part 22 of the Blockchain tutorial explaining what double spending is. The ecash system conceived by David Chaum is used as an example why third parties are used. In this tutorial several ... What is a 51% attack and why is it only possible with Proof-Of-Work cryptocurrencies like Bitcoin and ZenCash? Lets review how all PoW coins can be the victim of a double spend hack and how much ...