Bitcoin Wallets: Die 7 BESTEN WALLETS im Vergleich

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 1/2)

Source | Guestbook
Note: Some answers were repetitive, but were not edited out.
Questions Answers
Have you ever gotten into legal trouble by exploring the dark places of the internet? Like, "sorry, officer, I was only surfing drug markets and child molester forums for my next journalism piece..." Do you worry about that? Do you have to take extra steps to protect yourself? I'm very careful not to go anywhere that it is illegal to visit. You will hear loads of stories about how easy it is to "stumble upon" child porn, but the fact is that those sites usually have names like "Preteen cuties" so you know exactly what they are, and in order to access them you have to register. So you have to make a very deliberate choice to log into them. I have no interest whatsoever in viewing any child abuse material, so I don't go into those places. When I was researching The Darkest Web, I went to the discussion forums that didn't allow any images (though they did link to sites that did), and even there I turned off images.
As for the drugs, weapons etc, there is nothing illegal about surfing them and looking around.
I do get a bit nervous every time I visit the US, especially when I was invited to a "friendly" lunch with Homeland Security once (it was reasonably friendly as it turns out, it was also terrifying)
the below is a reply to the above
Why did homeland security want to talk to you? They said it was about the murder-for-hire stuff, but some of the questions leaned toward something else
Is there anything that really concerns you about the dark web? Some of the things already discussed are beyond barbaric and that is only the stuff that has been found out about and been picked up by the media and your fantastic work. Do you think the public should expect worse and more horrific revelations from the dark web or is it just "more of the same" for lack of a better term and do you think the authorities are getting better in shutting this inhumanity down and catching the people responsible? I am definitely not against people taking back their online privacy and I actually think that buying drugs from the darknet markets is a safer and more sensible option than buying them from the dodgy dealer down the road. However the one thing that is really disturbing is that the dark web has provided a place for child predators to find each other and form communities where they support and egg each other on. Imagine a few years ago, someone who was into hurtcore could never tell anyone else and would be unlikely to ever come across another person with the same perversions. Now it is as simple as finding the relevant site on the dark web. When there are suddenly hundreds of people who all think and act in the same way, it normlalizes what they are doing.
One of the guys who got caught, Matthew Falder, was a sadist who used to crowdsource "ideas" for torturing the children and teens he was blackmailing into doing heinous things for him online. But apparently he was a "normal" intelligent popular guy
the below is a reply to the above
But how does everyone participate in those illegal sites without getting caught? You said in other comments that you tried to stay away from underaged sites because they were illegal. Can't they be tracked down, even with tor and a vpn? The thing that I don't understand is that even on the dark web people say you should stay away from illegal sites, but how are pedos not getting caught? they are getting caught, but the way they are getting caught is through painstaking detective work, looking for clues in photos, befriending them online and getting them to reveal things about themselves (what is known as social engineering). It takes a long time and many resources.
I say don't go there because (a) it is illegal and (b) you really shouldn't want to go there
Iirc you attended the trial of the person behind the horrific hurt core website that was exposed a few years back. I was wondering if there was anything in particular that happened during the trial that particularly shocked or horrified you that isn't really public knowledge or talked about? Reactions from the judge or perpetrator during the trial etc. As I remember it the guy was a fairly young loner who lived with his parents but would probably never have been expected to be behind the horrific vile things which he was found to be. Also, how did you get into investigative journalism/writing? I wrote in one of the other replies above about the little mute girl that has stayed with me. Also, at the insistence of the prosecution, the judge had to watch "Daisy's Destruction" which was a video of torture of a toddler. He put it off for two days and when he came back he was white. He didn't have the sound on, which is considered the worst part, but he still looked shell-shocked. I don't envy him.
I'll cut'n'paste re your last question: I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
the below is a reply to the above
Thanks for the reply.. that really must've been horrific for all involved from investigation to trial and for all of the victims (apart from the scum responsible of course). I guess it would be naive to assume that the end of this site did anything other than drive this depraved community even further underground. That is the part which is really scary to me but I suppose all we can do is have faith that the authorities are always close on the tail. Thank you for your work on reporting on this and raising this stuff more into the public consciousness and making people more aware of what kind of evil still lurks. It was the most disturbing two days of my life, made all the worse because they read out hours of interactions from the site where the children still had not been identified or the predators caught.
Hurt2theCore was not the last site of its kind and there are still hurtcore sites to this day on the dark web. The one hopeful thing is that there are international task forces that seem to work together really well (unlike when it comes to drugs and every law enforcement agency wants to take the lead and they all withhold info from each other). There are a lot of resources allocated to identifying predators and their victims. Sometimes this has involved some very controversial tactics, such as taking over the sites and letting them run, so that they can use social engineering techniques to identify those who are using the sites and who are actually abusing children
the below is another reply to the original answer
So daisy's destruction is real? Was it referred to by that name court? I always thought it was a myth Yes, Daisy's Destruction is real, it was referred to by name in court and the judge had to watch the 12 minutes of it that were hosted on Hurt2theCore.
The "myth" part is that it shows a murder. The toddler, Daisy, lived, though she suffered such horrific injuries she will never be able to bear children. Hopefully she was young enough that she will grow up without the memory.
However, Scully did murder at least one child, whose body was found under the floorboards of his house. it is not known whether he filmed her murder as no video evidence of it has come to light.
the below is a reply to the above
Thanks for answering. I actually watched a really good video on Hurt2theCore on youtube once, I think it was by a guy called Nexpo. It was really detailed and informative about the whole case - I forgot those details. Thanks again for replying, this AMA is really informative! I think I recall that one, it was from a few years ago.
An excellent podcast that came out recently is "Hunting Warhead", highly recommend a listen. It is a tough listen, but exceptionally well-told and respectfully handled
How do you detach yourself from your work? I'm an investigator for a law firm and I've had a lot of difficult working on wrongful death cases recently. Also, how did you first end up getting published? Any tips for people interested in that field? Thanks! I don't detach. When I was researching hurtcore, it was harrowing and affected me deeply. Writing that part of the book was a very slow process because I just couldn't be in that headspace for very long at a time. Once the book was written I didn't go back there.
I already had a reputation as a blogger and a freelance journalist when i pitched my book on Silk Road. I got an agent and it was auctioned off, with Pan MacMillan getting the rights. At the time, Silk Road was still going strong, and the book I wrote was about this new frontier of drug dealing that was changing the world. I was writing it "from the inside" as I had been an active part of the community for two years. However, right as I submitted the final manuscript to my publisher, Silk Road was busted and Ross Ulbricht arrested, so i had to quickly change the narrative to a "Rise and Fall" thing!
How many times have you approached law enforcement with information and how many times has the approach resulted in action? and... are there times where you know something nefarious is happening but history and the evidence at hand tells you it's not worth the effort? There is no point in approaching law enforcement to say "I have come across this site". If I've found it, you can guarantee law enforcement has found it as well.
The only time I've approached law enforcement was when I had information that they did not, which was when a friendly hacker provided me with a back door into the Besa Mafia murder-for-hire site. I got to see all the messages and orders etc. Of course LE knew about the site, but they did not have the details of the people who had hits taken out on them. We tried desperately to tell police in several countries that real people had paid real money to have other real people killed, but they just weren't interested. We sounded like crazy people talking about dark web hitmen, who were scams anyway and nobody was dead, so why should they be interested? They became much more engaged when one of the people WE HAD PREVIOUSLY TOLD THEM ABOUT later turned up dead
the below is a reply to the above
By law enforcement, do you mean only local or else the big agencies? I feel like I wouldn't tell my local police department because they wouldn't really know what to do. It would have to the the bigger agencies. FBI in US. NCA in UK. AFP in Australia. Nobody was very interested, although the FBI did visit at least one of the targets to let her know she was a target. She still wound up dead
What are some of the most prevalent uses of the dark web that AREN'T all shady and nefarious? We might be getting into semantics here, but people use Tor, which is the most possible darknet that is used to access the dark web, just for private browsing and ensuring that commercial interests aren't following them everywhere to bombard them with ads for some thing they looked up.
Some of the news organizations have a dark web presence so that whistleblowers can upload information safely. Even the CIA has a site on the dark web so that people can anonymously tip off matters of national security.
Other than that, there are just forums, where you don't have to worry that every single stupid thing you post will be saved in posterity forever, to be trotted out years later when you run for congress or something
After everything you've seen, does anything surprise you anymore or are you just numb to it at this point? Do you think there should be more education/exposure about the dark web than there is now or would that just be counter-productive as people would just find another place to hide? I'm curious to hear any favourite stories about the Psychonauts. I am not numb and I hope I never become numb. I really don't visit the horrible dark places very often, unless I'm researching something specific, and even then I don't look at pictures or videos. Most of the crime is pretty benign - I'm not fazed by people wanting a safer way to buy drugs.
I think there needs to be ongoing discussions about online activity and its misuse in general, but most crime still happens on the clearnet. The dark web is not nearly as large or prevalent as people fear.
For a long time, a dealer provided free LSD to anyone who wanted it for personal use (ie not sale) and to any organizations who were doing psychedelic therapy.
One psychonaut got busted and spent time in prison... only he still had bitcoin in a wallet and by the time he was released he was a millionaire. He would have just spent it on drugs otherwise :)
I know law enforcement has to delve into the predator side of the dark web. With what you've seen do you think it should be mandatory or an industry standard that law enforcement officials seek professional help? I couldn't imagine investigating that daily and not thinking less of humanity at some point. I'm pretty sure they do. I worked for Legal Aid for a while, and i know there were pretty strict rules in place for the lawyers who had to defend child abusers.
When I was at the trial for Lux, owner of Hurt2theCore, I met a cop whose job it was to watch all the videos and befriend the predators in an attempt to get them to slip up and reveal something of themselves. She said she had a little filing cabinet in her brain where she put all that stuff, and that making an arrest made it all worthwhile. She had made several arrests personally. She was a sex offender's worst nightmare :)
What’s one of your personal favorite investigations and what made it unique for you? By far the Besa Mafia murder-for-hire case. What made it unique was that, first, I was provided a back door into the Besa Mafia site by a friendly hacker, so i had information that nobody else had. But then I became "friends" for want of a better word with the owner of the site, Yura. Besa Mafia, of course, was not killing anyone, but Yura made a LOT of money scamming would-be murderers out of their money. We entered into a weird relationship over the years where i would report on his activities and he would try every trick under the sun to stop me from doing so, so that he could keep scamming people. He even offered me a job, helping him, because he had become so busy. He also provided me with names and details of people who had hits taken out on them so I could pass them on to law enforcement.
It all became horribly real when one of the people who had a hit put out of them wound up dead. It wasn't Yura of course, but the guy had paid him $13K before giving up on the site and doing it himself. The thing was WE HAD TOLD THE FBI about the hit and the $13K and they visited the victim, but then put it into the too-hard basket when she couldn't think who might have paid that much to kill her.
the below is a reply to the above
Wow. That’s actually pretty cool. Reminds me of an old saying. “Keep your friends close, but your enemies closer.” It's a seriously bizarre relationship. When I was hired as a consultant by CBS for a 48 Hours expose on dark web hitmen, he actually agreed to meet me in London. But he thought that CBS was going to advertise his site as the real deal and he got excited and sent them details of two people who had hits put out on them. CBS sent them straight to the police and very shortly after two arrests were made and it was all over the news, where they called his site a scam. Yura got so pissed about it, he never turned up to our meeting. They had even hired an Academy Award-nominated master of disguise makeup artist to disguise him!
are "red rooms" actually a prevalent thing, or just a widespread misconception or rumor? I ask in part because it's very easy to see, for instance, Mexican cartels dismembering people alive, etc, just on the clearnet. Hell, a couple days ago I saw a video posted of a cartel member cutting out a dude's heart while the guy was alive, and he ATE it. He fucking ATE it. So it seems plausible... The most popular myth of all is Red Rooms, where people – usually women – are tortured to death live on camera while those who have paid to watch type in torture commands in a chat box. Think the movie Hostel, with webcams. In this sense these have never been proven to exist. I get where you are coming from with the cartels, and the recent news item where they found those shipping containers set up with torture rooms freaked me out and made me wonder!
There is some truth to this rumour, but the execution is not like you see in the movies. Most notably, because it involves children, not adults abused on demand for paying pedophiles, but not to the point of death
the below is a reply to the above
The news about those shipping containers really made me speculate, since for every one person who gets caught doing something evil, there must be at least several more people who are very honed in their 'profession' doing the same evil deeds and worse, yet who evade being captured for decades. Anyway, based on morbid things I've seen, karma comes around eventually... I know, right? It really freaked me out, and then when I read that they already had intended victims for them but the police got to them first and put them in protected custody.. IMAGINE SEEING THOSE PICTURES AND KNOWING YOU WERE SUPPOSED TO BE IN THEM!! I would retire to a deserted island somewhere
the below is a reply to the above
Your line of work could easily result in something like C-PTSD down the road a little ways. I have a morbid curiosity, and have seen worse than those shipping containers had to offer. I'm sure you have as well. So one more question from you, if you don't mind: what are some proactive approaches to mental health you take to safeguard your sanity? A lot of wine. Cuddle my dog
Hi, there! This has been fascinating to read; thank you so much for sharing! I'm curious: why do you think so many people who don't want to engage with disgusting and illegal content like hurtcore find it so interesting to read about? Do you have any insight into your readership and the ethics associated with reading about these kind of topics? I think morbid fascination with the dark is exceedingly common - just look at how many people can't get enough about serial killers! In some ways it is probably a self-defense mechanism - the vast majority of true-crime readers are women. People like to be armed with knowledge. We also like to be spooked and scared.
As for my books, I don't really go into much gory detail, but the horror still shines through
Out of all 9-5 jobs out there, why this? What’s your motive? I got disenchanted by being a lawyer and I had wanted to be an author since childhood. The lawyering put me in a strong enough financial position that I could quit to do a uni course for a couple of years. My plan was to become a best-selling novelist, but my first chick-lit novel was nothing special. However, during the course, I found I did really well at journalism and was soon making a living as a freelance journo before I finished the course. My first major feature was on the Silk Road drugs market, which I had discovered thanks to a friend who was using it. Once I got in there I became fascinated by everything about it and started contacting the owner, users, vendors etc asking for stories (I was upfront about who I was). I began the first serious dark web blog - allthingsvice.com - and also became the go-to freelancer for Australian dark web stories. Then I pitched my first book and got a healthy advance for it.
I like working for myself, working from home and delving into things. Right now I have my dream job (though it wouldn't hurt to pay a bit more. I'm certainly not making anywhere near what I used to make lawyering, but I make enough to get by and I live pretty simply)
Did you ever do any writing on Brian Farrell and his role in Silk Road 2.0? I was Brian's cellmate for all of 2017 at Sheridan Federal Prison and heard all of his crazy stories. Was just curious as to the validity of them all. DoctorClu! I did write briefly about him in Silk Road, but it wasn't all positive. I remember being frustrated by the shitshow that was Silk Road 2.0 in the beginning, right after SR1 shut and when DPR2 took off and Defcon got all dramatic. It settled down after a bit and lasted a year, when it was revealed THEY HAD A FUCKING UNDERCOVER HOMELAND SECURITY OFFICER ON STAFF THE WHOLE TIME. But yeah, anyhow, they are probably true. I'd love to hear them :)
Was there ever something on the dark web that made you surprised ( in a good way) and smile ? So many things. Back in the day of the original Silk Road, I became obsessed with the forums, the people behind it, the intelligent discourse about the War on Drugs and philosophy. I found it amusing that drug dealers ran sales and giveaways. There were book clubs and movie clubs.
One of the most important people from that era was Dr Fernando Cauevilla, who became a member of Silk Road as "DoctorX". He was a real doctor who provided genuine, free, non-judgmental advice about drug use to the members of the site. It was quite an amazing time.
the below is a reply to the above
Did Ulbricht get taken down the way we were told in the news? What happened to all the Bitcoins? His arrest went down the way we were told in the news. How they located the server has never been disclosed (other than a fanciful explanation that NOBODY could believe). This explanation may be tested if Variety Jones runs a Fourth Amendment argument at his trial
The bitcoin in the wallet on Ross' computer was auctioned off by the Feds. He may have other bitcoin wallets stashed somewhere but nobody knows
the below is another reply to the original answer
Book/movie clubs on the silk road? Yeah, they would set reading and then everyone would come back and discuss the book, or they would have a time when everyone watched the same movie at the same time and chatted about it in real time
the below is a reply to the above
Haha that's amazing! I don't suppose you remember any of the books in question? They used to be a lot of philosophy books, especially on agorism. A Lodging of Wayfaring Men was one of the books. I remember V for Vendetta on a movie night
You don't seem to be pushing your most recent project and you're actually answering all the questions people ask, so I've got ask...are you some sort of government plant meant to destabilize reddit? This isn't how AMAs are supposed to work. You come in, you half ass a few questions, hawk whatever you're here to hawk, and then leave after 20 minutes. That's how it's done. lol I'm a genuine redditor from way back, and I love talking about the stuff I do. I did find that after I answered a question in an AskReddit thread a while back that blew up, the sales followed. But that was organic and I don't think you can force it to happen - Reddit can spot that a mile awy
What are some of the best things about the dark web? And can anyone get on it? Things you can buy that you can’t buy normally online? I really enjoy some of the forums, especially the psychonaut forums where people who like to trip on psychedelics get together and talk drugs and philosophy. There's a real "be kind to one another" vibe.
Getting on the dark web is easy, but not getting scammed when buying things takes a lot of homework. Yes, you can buy most things, but the most popular things are drugs and digital goods, i.e. things that depend on repeat custom and are easily transferable from seller to buyer
the below is a reply to the question
[deleted] You're doing the Good Work my man. I'd give you one of those awards if i knew how
What would you define the word "Safe" when it come to the internet (both www and dark web) world and are there any tips that I should follow to keep myself safe? It really depends on what YOU mean by safe. Tor, which is the darknet that provides access to the dark web will keep you safe from prying eyes and surveillance.
If you mean keep your information safe, the old-fashioned advice is to never reuse your password and to enable 2-Factor authentication wherever you can. Your information is quite likely somewhere on the dark web thanks to high-profile hacks of major organizations, but provided you don't re-use usernames and passwords, you really don't have to worry too much about it.
If you mean keeping yourself and/or any kid safe from predators, the only thing is to ensure you are educated about the approaches and methods they use.
Has Covid affected the Dark Web in any real way? Also I just read through all of the post comments, what incredible story’s. I would totally buy a book about the Silk Road or Yaru! re covid on the dark web, here's some notes I made for an interview I did recently:
* when Trump first hyped hydroxychloroquine as a potential miracle cure for COVID-19, drug dealers on the dark web seized on the claim.
* Listings quickly popped up on the most popular darknet markets
* A vendor on Whitehouse Market sells 100 Pills for $90, calling it a “Miracle Drug For Coronavirus” and suggesting buyers purchase in bulk to sell at a mark-up locally.
* Another makes the dubious claim “This drug will help people to beat Corona Virus” There are 11 listings on Empire Market currently, although more than half are from the one seller, who is a well-known and trusted vendor on the site.
* There were also people claiming to be selling infected blood or plasma of recovered COVID victims
* The infected blood stuff is just bullshit IMO Just because something is listed doesn’t mean it is genuinely for sale
* There's been some claims to be selling vaccines
* At the beginning there were also loads of listings for PPE
* some just used it as a marketing tactic - “fight off the virus with edible cannabis” or “relax with Xanax” and others as an excuse to raise their prices
* However, sales are low compared to sales of other drugs on the site, so it is difficult to say whether it’s something that will really catch on
* It didn’t take long for complaints to come in and market owners to clamp down on anything claiming to be a miracle cure or vaccine
* users were discouraging other users from profiting off the pandemic and requested markets provide health and safety information
* All the major markets forbid anything being sold as a cure for COVID. They flagged keywords and vendors would be told to take any listings down. They also put out PSAs telling people not to buy
* Monopoly: threatened to ban and.. “You are about to ingest drugs from a stranger on the internet - under no circumstances should you trust any vendor that is using COVID-19 as a marketing tool to peddle already questionable goods”
* It was a business decision. They don’t want anything that will attract attention or that might cause desperate people who wouldn’t normally use the DNMs to find their way there
* The idea behind DNMs generally is educated and responsible drug use. They really don’t want people dying - bad publicity and no repeat custom
* However the dark web is rife with scammers and people willing to prey on the desperate so there are still scams out there
* The only way I could ever see it becoming a thing is if there is a well-known potential cure/vaccine that is not being made widely available and could plausibly find its way onto the black market
Hi Eileen :) My question is about how you construct your Casefile episodes - I assume there is an extensive amount of outlining but do you write the final draft like a script specifically thinking about his voice? And about how long are they as far as - for example - does one hour equal 50-60 pages? Thank you. I initially write them as if I'm writing an article or book, but then go back and edit them to be read out and yes, when I do that, I do have his voice in my head lol. One episode is usually around 12,000 words. It then goes to another editor who edits the episode to be even more "casefileaa' before it finally goes to Casey
Have you been exposed to things in your investigations that have made you second-guess what you do? If so, what has made you keep going back? i've definitely had days where I question everything, but to be honest, I don't really hang around the horrible really dark places much. I did delve into the child predator forums when I was writing The Darkest Web, but I don't make it a habit to go there. The psychonauts are much more friendly
the below is a reply to the above
To continue with that- have you clicked images, links that make you a suspect in certain scenarios? Oh absolutely. Sometimes I go to a "Fresh Onion" site, which is a site that crawls all the .onion addresses (dark web URLs end in .onion rather than .com, org etc) and alerts you to any new ones. Sometimes they don't have any description, so you take a big risk clicking on any of those. The most dangerous button on the dark web is the "Random Onion" button, so I avoid that.
I'm pretty careful about what I click, but the moment something looks questionable I nope the fuck right out of there
the below is a reply to the above
Have you ever felt that you may be a suspect whether it be ok a drug site, a pedo site, etc. Have you ever been contacted by someone regarding your surfing habits? Well my actual surfing habits are protected by Tor, which means they are hidden from prying eyes, so no I haven't been contacted about them. I am very open on the dark web about who I am and what I'm doing there - I use the name OzFreelancer on all of the markets and forums. I don't go to the sites that host child abuse images - you can't un-see that shit and I don't need it in my head.
As noted in another reply, I was contacted by Homeland Security on one of my visits to the US and taken for a "friendly" lunch.
the below is another reply to the original answer
Psychonauts are more friendly than most people. Something about regular mind altering experiences makes you want to be less of a cunt. Yeah, I call The Majestic Garden a little corner of sunshine and rainbows on the dark web :)
the below is a reply to the above
More about The Majestic Garden please? What is grown there? It's a place where people talk about and source psychedelics - most notably LSD, the 2C family, DMT and MDMA. Talk about and sourcing harder drugs is forbidden. In fact the admins snuck in an autocorrect so that any time someone wrote the word "cocaine" it would post as "a raging hardon" :D
Do you fear that seeing all this stuff might turn you emotionally blunt? I'm not watching any of this stuff on purpose (even the clearnet stuff), because I fear that the more you see of it, the more normal it gets, and ultimately, the more it will fuck you up. To quote the movie 8mm... "If you dance with the devil, the devil don't change. The devil changes you." No, I can't even watch "3 Guys 1 Hammer" in its entirety, let alone look at the really dark materials on the dark web. When I was researching The Darkest Web, going into the predator forums did the opposite of making me blunt. It was the shortest section of the book but took the longest to write because it was so emotionally draining
the below is a reply to the above
I have to ask, what is "3 Guys 1 Hammer"? It's a video of two teenagers murdering an innocent man with a hammer that went viral on the gore sites of the regular internet. It's truly horrible.
The teens killed over 20 people. I wrote about them in my book Psycho.com (excuse the plug)
I heard somewhere that you foster dogs. Is that something you do to counter all the terrible humans you encounter in your research - everyone knows how dogs are better than people. How many dogs have you fostered and which one was your favourite? After my dog died I knew I didn't want to have another dog as I wanted to travel more. So I thought fostering dogs would be the answer as you give them love for a few weeks and then they go to their forever home. My first foster, Roy, was a big fat failure and now he lives here and sleeps in our bed and is the most spoiled dog alive
the below is a reply to the above
Did you then just decide to quit travelling? I don't know anything about Roy, but I already think I love him. Nah, he has family he can stay with when I go away, but any major travelling has been thwarted by COVID for now anyway. I'm in a hard lockdown city.
And I'm sure Roy would love you too, u/suckmyhugedong
Given how much you know about the dark web, what kind of crazy awful nightmares have you had? This could be a really good one. Thank you Probably the worst thing was delving into the forums where child predators gathered. I never looked at any videos or photos, but just seeing their discussions sickened me. The one thing that keeps coming back to me came out of the sentencing hearing that I attended of Lux, owner of Hurt2theCore, considered the most heinous website in history. In court they read out a conversation between him and an abuser who made videos of torture of the mute disabled child in his care. They were joking "at least she won't be able to tell anyone" . the abuser wasn't caught, at least by that stage
As an indie author, how have you sourced freelancers? Did you seek out those that have specific expertise or did you work with editors from your time as a traditionally published author? I learned to do everything myself before I started outsourcing.
I work with a professional editor who happens to be a friend of mine from back when we did a writing course together. I've been doing my own covers, but now that I have some royalties coming in, I've engaged a professional cover artist from Reedsy to develop a brand and more professional-looking covers for me. It is the hardest thing to find people you really want to work with and who are in budget.
I still haven't got the hang of email lists, newsletters or a website - they are all in a total mess at the moment and I'd love to find someone who can do them, but again it is that problem of finding the right person who is within budget
is it true that most of the internet is in the "dark web"? if so about how much percent is it? By far the biggest myth is that it 10x larger than the Internet. I mean, this should be common sense anyway, but it gets propagated by tabloid media all the time. It stems a lot from people using the terms "deep web" and "dark web" interchangably when they are different things.
The statement that 90% (or thereabouts) of the internet is hidden is true, and it is called the deep web (not the dark web). The 90% that is hidden is all those pages you won’t get to using google or any other search engines. There’s nothing scary about that – in fact it works in your favour.
The easiest example is your bank. The bank’s major page is available to anyone who searches the web (part of the 10%, also known as the “clearweb”). But once you log in, all those pages you can access that contain your personal details? Not searchable on google. Each one of those pages is part of the 90% of the deep web. Business and government intranets also make up part of the deep web. Honestly, it’s nothing to worry about.
The dark web – the hidden services available through Tor and other anonymising programs – makes up a tiny fraction of the deep web. A really, really tiny fraction. It is infinitely smaller than the clearweb.
Do you think human trafficking happens on the dark web? Last year (I think) there was a really bizarre story here in the UK about a model who was supposedly kidnapped to order, drugged and transported overseas by a group called "Black Death". The official story is that BD doesn't exist, and the kidnapper was a fantasist. Is it likely that humans are bought and sold into slavery over the dark web? There are no slick websites with auctions for slaves on the dark web, but I have no doubt that human traffickers use dark web encryption to communicate.
(here comes the second plug for the thread) - I wrote about the kidnap of Chloe Ayling and the Black Death Group in Murder on the Dark Web
What ever happened to the plural of mongoose storyline? it seems like after he was arrested in the united states, his case just fizzled away. did you ever find out any more information about yuri after he cancelled the interview with a news program? what happened with peter scully's case? i read that there was a fire where a lot of evidence against him was held and it all went up in smoke. are there any character and/or personality storylines that you feel haven't been told or are still a complete mystery? eg. tony76 1. He is still in the MCC in NY and awaiting trial. It has taken a long time because he had terrabytes of information to go through and things would have slowed down due to covid. I understand he is running the Fouth Amendment argument that Ulbricht probably should have run in the first place
2. I last heard from Yura just a few weeks ago. He is still scamming. There are some more programs in the works about him
3. Yes there was a very convenient fire, but he still got sentenced to life and i hope he rots in hell
4. I am madly curious to know what is happening with the extradition of James Ellingson, aka “MarijuanaIsMyMuse”, aka "redandwhite", MAYBE aka Tony76. I would LOVE to know that full story!
the below is a reply to the above
Wow, this shit is a blast from the past. I used to love following the darknetmarket drama. Did you write about PoM and tony76 in one of your books? Ever since reddit shut down /darknetmarket I've been out of the loop. Yes, I wrote about them in The Darkest Web
I was in touch with PoM/Mongoose when he went on a posting rampage on MyPlanetGanja, then visited him in Bangkok prison several times. Wrote all about it :)
This may have been answered by a previous post pertaining to native language barriers to specific sites on the dark web, but in your investigations, did you come across content/pages/forums from warzones? Middle East, Burma, Afghanistan, etc? If yes, what was the most memorable bit? There are loads of sites in foreign languages, but it is too difficult for me (a one-language numpty) to attempt to translate through AI, and it is not worth hiring a translator when they could just turn out to be Cat Facts
submitted by 500scnds to tabled [link] [comments]

Particl Marketplace: Where Sellers Meet Buyers

Particl Marketplace: Where Sellers Meet Buyers
People had been speculating since the dawn of crypto when the world’s largest online marketplaces, the ones of the Amazon caliber like eBay, Etsy or AliExpress, and, well, Amazon itself, would start to accept cryptocurrencies. There were a slew of rumors, opinions, and theories thickly interspersed with false reports popping up here and there of Amazon and its little cousins being on the verge of embracing cryptocurrencies. On top of that, someone has actually posted a petition on change.org to add Ether to Amazon as a payment method.
by StealthEX
Long story short, that was a waste of time. High hopes fell flat, and people lost religion. But not all. As the common wisdom goes, when hope dies, action begins. This exposition describes one such effort which tries to bring to fruition the idea of a decentralized marketplace for trading goods and services. And as you might have already figured it out, with a cryptocurrency as a means of payment. So let’s welcome Particl Marketplace and see what it has to offer – and what Amazon has missed.

What is it, in simple words?

Particl Marketplace is an online marketplace where you can trade goods and services. Not a big deal, you may think. However, what distinguishes it from places like Amazon as well as cryptocurrency-enabled marketplaces is the decentralized nature of purchases on Particl. You can think of it as a variety of a decentralized cryptocurrency exchange (aka DEX) where trades are being conducted on-chain. But in case of Particl, it is goods and services that are being traded, not fiat or crypto, with deals on-chain as well, fully encrypted and decentralized.
Particl is a global peer-to-peer privacy-centered marketplace that uses an automated two-party escrow system. It is crypto-agnostic and designed to work with any cryptocurrency, creating a secure, highly-scalable environment supported by a privacy-focused blockchain-based platform. The team behind the project sees its mission in developing “a new decentralized, private and democratic economy” that is governed by the network of its users, with no central authority or middleman getting in the way.
In the project developers’ own words, Particl enables everyone to participate in a free, anonymous exchange of all kinds of goods, without paying any fee and regardless of geographical location. To be sure, you are already thinking about Silk Road and its dark fate, and that the government is going to crack down monumentally on Particl one day. Well, the outcome may vary as the payments on the platform are made using its own cryptocurrency PART, with its laser focus on privacy and anonymity. But more on this later.

How did it grow up?

The development of the Particl project started in early 2017 with the release of the white paper describing the team’s vision for the marketplace, which was shortly followed by a successful seed funding that brought in enough funds ($750,000) to support the development of the project for a year (it turned out sufficient to last for over two years).
These donations helped to establish the Particl Foundation, a non-profit Swiss organization with the goal of providing legal protection for the project to ensure its sustained development and compliance with government regulations. It receives 10% of all the staking rewards generated on the Particl network, making the project self-sustainable and free for most uses.
Unlike other such projects in the crypto arena, Particl has been using its own blockchain from day one, which happened to be July 17, 2017. It was specifically designed to be crypto agnostic by supporting and working with any cryptocurrency. Additionally, it supported the smart contract tech out of the box, giving users an ability to build all kinds of decentralized applications (dApps) that can be directly integrated into the Particl marketplace.
On May 31, 2018, the Particl Marketplace, the Holy Grail of the entire endeavor, was made available for alpha testing on the testnet of the project, which later split into development and stable branches. It went live with the mainnet release of the Particl Open Marketplace on August 12, 2019, which featured Particl Desktop 2.0.0, a client-side application providing user interface and built-in wallet functions.
On November 25, 2019, the Particl Desktop 2.3.0 client was released that enabled Bitcoin payments and marked the introduction of untraceable transactions. With the help of the new in-wallet exchange module, everyone can easily swap their bitcoins for the native PART coin. Moreover, the module allows seamless integration of third-party accountless exchange services right into the marketplace, with StealthEX being one of them.

How is it different from other marketplaces?

The common solution many P2P marketplaces implement to protect buyers and sellers from the other party failing to honor their end of the bargain is through third-party escrow, where the “third-party” in the majority of places and cases is the platform itself that the market participants must mutually trust. In short, it is a single point of failure. And the selling (pardon the pun) point of the entire Particl’s marketplace is its decentralized escrow, which is a thing entirely between the two parties engaged. No middlemen allowed here!
And these are not empty words. Particl implements the concept best known as Mutually Assured Destruction (aptly shortened as MAD), a military doctrine you are certainly familiar with, and probably even afraid of, that consists in a mutual destruction of two belligerent parties in an all-out nuclear holocaust. If you are curious, the idea stems from the game theory and has a lot to do with the Nash Equilibrium, of John Nash’s fame. In a nutshell, Particl removes the need for a trusted escrow agent by introducing MAD escrow smart contracts.
A MAD escrow contract allows to lock funds in a multi-signature address that can be released only if all the parties sign off on the transaction. So both the seller and the buyer lock in the contract an agreed amount for a specified period of time, with the buyer also depositing the payment for the items purchased. The escrowed funds are released when both parties confirm the fulfillment of the agreement. Should one party break the terms, the funds remain locked for good causing a mutual financial loss until both parties agree to sign off.
Another crucial aspect of Particl Marketplace is its end-to-end privacy. The problem with conventional marketplaces acting as an escrow agent is that the communication between the parties should be open to the agent for it to serve as an arbitrator. With Particl, it is no longer required, and all messages between the buyer and the seller are encrypted. Despite being public, only their recipient can decrypt them, which effectively makes messages untraceable.
This is also where the PART coin turns up quite handy. It enables three different privacy modes, and with the most secure mode, the Anon mode, PART transactions utilize the RingCT privacy protocol, which hides both the amount transferred and the identity of the parties transacting. Accordingly, every part of the entire Particl trading environment is thoroughly decentralized, and the full anonymity of market participants is maintained at all times, making the platform a completely trustless marketplace. Big Brother is no longer watching you.
Aside from that, you can stake PART and generate a source of passive income for yourself. Particl uses a custom Proof-of-Stake consensus protocol, allowing you to get a piece of the pie in the form of new coins created at each block according to the scheduled inflation process. The annual inflation rate is initially set to 5% and goes down 1 percentage point every year until it finally floors at 2% indefinitely. Moreover, these rates are a bare minimum as they assume that all PART coins have been staked. Otherwise, the income will be bigger and better as the same rewards are paid to fewer coins.
Additionally, your passive income through staking PART will be augmented by the fees generated through the everyday marketplace operations. Whether it is network fees collected via PART transactions or marketplace listing fees paid by the sellers, all of them contribute to the stakers’ rewards. At the end of the day, staking PART can turn into a profitable business once the Particl platform starts to attract more traffic. In simple words, the more popular the market gets, the more fees it generates, the more coins the stakers earn.
As PART is a standalone cryptocurrency, it can be used outside Particl Marketplace as well. So if you plan on using it for purposes other than eCommerce, it is traded on several exchanges, for example, HitBTC and Bittrex, with more exchanges to list PART in the future. There are native Particl wallets available for storing PART such as Particl Qt with Ledger support, Particl-cli, and Particl Copay Wallet, with the latter available for both the desktop and the mobile. There is also a third-party multicurrency Flare Wallet, enabling cold staking for Particl.
Running Particl is a collective effort, which means no operational costs and no company bagging profits from it. The marketplace buyers don’t pay any commissions other than tiny network confirmation fees, while the sellers are only charged a small listing fee to keep spam listings to a minimum. This creates a highly competitive environment, with the sellers making more profits and the buyers having access to cheaper goods and services as a result.

What’s in the pipeline?

The next major release of the Particl Marketplace should have been Particl Desktop 2.4.0, but it was later rebranded as Particl Desktop 3.0 to reflect its breakthrough nature. It is set for release in the second half of 2020 and will enable the addition of user-created markets and storefronts, effectively turning the Particl marketplace into a network of specialized markets.
And if you think about it, that makes perfect sense. Say, you have a social network account highly merited and full of karma that you want to sell, whatever your reasons might be. Then creating a dedicated market for trading such accounts privately and securely may look extremely appealing to you. Whether it is the right thing to do is another matter, of course.
Kidding aside, it is obviously not about selling or offering something that the society on the whole doesn’t approve of or frowns upon. If you are a freelancer, for example, a graphics designer or a translator, you would be certainly interested in the future freelancer markets – along with your potential employers. Put simply, birds of a feather should flock together.
To keep things in perspective, popular freelancer markets that exist today charge up to 10-20% of what you would get from your client if you negotiated directly. All in all, establishing communities across the marketplace seems to be the next logical step in the natural evolution and growth of the platform. In fact, it is a little surprising that the Particl team didn’t come up with this idea earlier.
Meanwhile, we wish Particl success and good luck in achieving their goals and aspirations.
And remember if you need to exchange your coins StealthEX is here for you. We provide a selection of more than 250 coins and constantly updating the list so that our customers will find a suitable option. Our service does not require registration and allows you to remain anonymous. Why don’t you check it out? Just go to StealthEX and follow these easy steps:
✔ Choose the pair and the amount for your exchange. For example ETH to PART.
✔ Press the “Start exchange” button.
✔ Provide the recipient address to which the coins will be transferred.
✔ Move your cryptocurrency for the exchange.
✔ Receive your PART coins!
Follow us on Medium, Twitter, Facebook, and Reddit to get StealthEX.io updates and the latest news about the crypto world. For all requests message us via [email protected].
The views and opinions expressed here are solely those of the author. Every investment and trading move involves risk. You should conduct your own research when making a decision.
Original article was posted on https://stealthex.io/blog/2020/08/26/particl-marketplace-where-sellers-meet-buyers/
submitted by Stealthex_io to StealthEX [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethereum [link] [comments]

How did you discover Bitcoin?

Hi y'all,
I'm curious to hear how/when others first discovered Bitcoin or any other crypto. I'll go ahead and share my discovery story. It's a bit lengthy so bear with me.
The year is 2012 and I'm a junior in college. My college boyfriend sold weed at the time and also dabbled in other substances. He purchased these goodies through the Silk Road and bought them using Bitcoin.
He probably had a decent amount of coins in whatever early software wallet he used at the time, but I never bothered to inquire further. I always associated Bitcoin as "the digital drug money" and that was that.
Fast forward to 2016. We've graduated college, broken up, and don't keep in touch. My work colleagues (tech bros) are talking about the Bitcoin they bought. It fluctuated throughout the year from around $450 - $800ish by the end of the year and was driving them crazy as they tried to time selling/buying.
"Silly tech bros" I thought. "What a dumb idea to invest in something so volatile"
Now it's May 2020. A couple months into an early century pandemic. I've been playing lots and lots of online poker with friends and using it to fuel my competitive side while being stuck indoors. Volatility now excites me.
I live in NYS which sucks for online poker because it's not permitted (actual cash games or tourneys w/ payouts). As I'm searching for a workaround, I come across all these sites accepting and paying out in... Yup you guessed it, Bitcoin.
What turned into a search to play poker online has evolved into fascination around crypto and the decentralized nature of digital currency. I've now spent a couple of weeks researching and reading up on best investment practices so that I can enter this world myself.
And now I often wonder if my ex held on to his bitcoin when the Silk Road was shut down in 2013. If he did, I wonder if he was able to access his digital wallet or if he was screwed out of his money like many others who were told their bitcoins were no longer available.
TL;DR: 8 years ago college bf bought drugs off the silk road using Bitcoin. I thought it was dumb. 4 years ago co-workers started buying Bitcoin. I thought they were dumb. This month I tried to find a way to play poker online for money and fell deep into the world of cryptocurrency investing, deciding to partake myself. I now own Bitcoin, and am beginning to believe that beyond trading, crypto truly is the currency of the future.
Thank you for rehashing that with me.
How did you discover Bitcoin?
submitted by butchcoin to BitcoinBeginners [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to privacycoins [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to CryptoCurrencies [link] [comments]

The Privacy Coin Guide Part 1

As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.
If you’re looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don’t have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

FIRST THERE WAS BITCOIN

Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

Used in: Monero and Particl as its successor RING-CT, Bytecoin
In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.
RING SIGNATURES and STEALTH ADDRESSES

PROS

– Provides sender and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume
-Does not hide transaction information if not combined with another protocol.

COINJOIN

Used in: Dash
Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to ‘mix’ the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.
COINJOIN

PROS

– Provides sender and receiver privacy
– Easy to implement on any cryptocurrency
– Lightweight
– Greater scalability with bulletproofs
– Mature technology

CONS

– Least anonymous privacy solution. Transaction amounts can be calculated
– Even without third-party mixer, depends on wealth centralization of masternodes

ZEROCOIN

Used in: Zcoin, PIVX
In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]
ZEROCOIN

PROS

– Provides sender and receiver privacy
– Supply can be audited
– Relatively mature technology
– Does not require a third-party

CONS

– Requires trusted setup (May not be required with Sigma protocol)
– Large proof sizes (not lightweight)
– Does not provide full privacy for transaction amounts

ZEROCASH

Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private
In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]
ZEROCASH

PROS

– Provides full anonymity. Sender, receiver and amount hidden.
– Privacy can be default?
– Fast due to small proof sizes.
– Payment amount can be optionally disclosed for auditing
– Does not require any third-party

CONS

– Requires trusted setup. (May be improved with zt-starks technology)
– Supply cannot be audited. And coins can potentially be forged without proper implementation.
– Private transactions computationally intensive (improved with Sapling upgrade)

CONFIDENTIAL TRANSACTIONS

Used in: Monero and Particl with Ring Signatures as RING-CT
The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be ‘committed’ to, without the amount actually being known. I’m terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.
CONFIDENTIAL TRANSACTIONS

PROS

– Hides transaction amounts
– Privacy can be default
– Mature technology
– Does not require any third-party

CONS

– Only provides transaction amount privacy when used alone

RING-CT

Used in: Monero, Particl
Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which “allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation”.[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.
RING -CONFIDENTIAL TRANSACTIONS

PROS

– Provides full anonymity. Hides transaction amounts and receiver privacy
– Privacy can be default
– Mature technology
– Greater scalability with bulletproofs
– Does not require any third-party

CONS

– Privacy not very effective without high volume

MIMBLEWIMBLE

Used in: Grin
Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a “privacy and fungibility focused cryptocoin transaction structure proposal”.[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].
MIMBLEWIMBLE

PROS

– Hides transaction amounts and receiver privacy
– Privacy is on by default
– Lightweight
– No public addresses?

CONS

– Privacy not very effective without high volume
– Sender and receiver must both be online
– Relatively new technology

ZEXE

Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called ‘decentralized private computation.[30] It allows users of a decentralized ledger to “execute offline computations that result in transactions”[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

NETWORK PRIVACY

Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

UPCOMING

Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).
Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin’s lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we’ll talk more about the pros and cons and give an idea of how the coins can be compared.

There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/
submitted by CryptoRamble to ethtrader [link] [comments]

r/MAINSTREETCRYPTO EXCLUSIVE: INTERVIEW WITH ROGER VER

MAINSTREETCRYPTO EXCLUSIVE: INTERVIEW WITH ROGER VER
MAINSTREETCRYPTO EXCLUSIVE: INTERVIEW WITH ROGER VER
https://preview.redd.it/9rycme1mdgr41.jpg?width=200&format=pjpg&auto=webp&s=30c55fb3ff8b3705726a04109797063a26798798
Roger Ver, is one of the five founders of the bitcoin foundation. You could say he was ahead of his time, buying $25,000 worth of bitcoin when they were merely $1 each. He was the first major investor to invest millions in Blockchain.info, Ripple, Kraken, and Bitpay among others. Now he wants Bitcoin Cash, a fork of the legacy chain, to be used as a global P2P currency, and says it can scale just like Satoshi first laid out in the original Bitcoin whitepaper. -------------------------------------------------------------- Bitcoincash.org Rank: #5 Current Price: $257.65 Market Cap : $4,741,042,759 24 hour trading volume : 1.741 Billion USD -------------------------------------------------------------- Hi Roger, first and foremost, I wanted to thank you for taking the time to do this. You are truly a pioneer in the Bitcoin space, and all of us owe you a debt of gratitude. On behalf of all of us, I wanted to say thank you for advancing the space.
1. First, I want you to take a moment and appreciate how far bitcoin and cryptocurrency has come this past decade. Did you ever believe you would see such growth, interest, and adoption in such a short period of time or has it completely surprised you?
We always over estimate the amount of progress that will be made in the short term, but underestimate the amount of progress that will be made in the long term.
Crypto currency is another example of that.
2. At what point did it hit you that bitcoin was history in the making?
From the very first day I knew it was one of the most important inventions in the history of humankind.
The book Digital Gold goes over how I literally had to go to the emergency room because of the excitement I had for Bitcoin.
3. How did you first get into bitcoin, pre Bitinstant?
I first heard about it on the FreeTalkLive.com radio show.
A full history of the early years is covered well by Digital Gold.
4 .What economists and philosophers do you align with?
I think Murray Rothbard fits into both categories and his thinking influenced mine more than any other single author.
Others who have influenced me would include:
Adam Smith
Ludwig von Mises
Milton Friedman
David Friedman
John Locke
Henry Hazlitt
Frederick Bastiat
Larked Rose
Ray Kurzweil
6. What has been your favorite moment in crypto history thus far?
My favorite moments were reading the underlying philosophy behind the Silk Road.
The government has done an amazing job distorting and smearing the underlying message behind the site.
My eyes started to tear up when I read this post on the front page of the Silk Road for the fist time:
https://www.reddit.com/Anarcho_Capitalism/comments/29diyt/defcons_latest_post_on_silk_road/?sort=top
I never bought or sold a single thing there, but I spent countless enjoyable hours reading their forums and exploring the site.
7. What are your future plans for Bitcoin Cash?
It isn’t just a hobby, it’s a global revolt. We will become money for the world.
8. Branding is so important. Bitcoin currently has greater brand recognition a la Coca-Cola, and is regarded by many as the “real” Bitcoin, even though this is widely disputed, especially by crypto-fundamentalists. Do you envision a Coca-Cola vs. Pepsi type scenario? Do you envision parity price-wise between the two on a long enough timeline?
Bitcoin Cash has more utility than BTC, so in the long run it will have a larger market cap. Currently we are in the era when Myspace was bigger than Facebook, but Myspace’s servers were being over loaded and causing a bad user experience.
Eventually people migrated to Facebook and eventually people will migrate away from BTC.
8. a) Have you ever thought of re-branding Bitcoin Cash?
No one is in control to do such a thing by themselves. The community can’t even agree on orange vs green for the colors.
9. Bitcoin Cash has the potential to truly be used as a global form of payment rather than merely a store of value, what else excites you the most about the potential of Bitcoin Cash?
  1. Fast
  2. Cheap
  3. Reliable
  4. Private
Payments for the world. That’s all we need.
10. I asked Adam Back the same question: If you could remove yourself from the equation, and remove bias, how would you objectively evaluate the pros and cons of Bitcoin Cash versus The Lightning Network?
Anyone can permissionlessly start using BCH to start sending or receiving payments world wide in about 30 seconds. (The time it takes to download an app)
It is accepted by more than 100,000 websites around the world, and has millions of users.
Lightning Network would take about a full day to setup and get working permissionlessly, and would take several hundred dollars of additional computer hardware.
Once it is setup, you can spend it at about 300 websites world wide, and it has maybe a few tens of thousands of users.
11. When you’re not working, what do you like to do for fun? Favorite hobbies?
I enjoy reading, and Brazilian Jujitsu. I’m especially interested in doing more competitions before I get too old.
12. What are a few of your favorite books? What are some that have made a long lasting impact on you? (Can be fiction or nonfiction)
I loved the Age of Spiritual Machines. It painted a picture of how exciting the world is going to be thanks to More’s Law.
I also loved The Moon is a Harsh Mistress. I see crypto currency being a world life parallel.
13. What are you most excited about for the future of blockchain technology and where do you see the space in 5 years?
I’m excited to see wide spread wallets with strong privacy, and more agorism starting to take place around the world.
14. What are your personal theories of who Satoshi was / were, what was their motivation, and do you think something like bitcoin would have inevitably been created eventually, had Satoshi never existed?
I don’t know who Satoshi is or was, but it was clear they were trying to build a peer to peer electronic cash system, not what BTC has become today.
It was an inevitability that someone would create something like Bitcoin eventually. People like David Friedman and others had been writing about it for decades in advance.
15. What advice would you give our viewers regarding blockchain, business, motivation, or life in general?
Read more books. Reading a book like having a one on one tutoring session from the author. It’s the best way to learn directly from the greatest minds the human race has ever produced.
BONUS:
If you were a director and could make only one film out of all the wild stories regarding crypto, what subject matter would you choose and why?
The Silk Road because it embodied the spirit of peer to peer cash and voluntaryism.
submitted by blindedzeppelin to mainstreetcrypto [link] [comments]

When alprazolam powder ran through the postal system like gold

So roughly around the end of winter in 2015 going on 2016 I was finishing up college for my computer networking degree. I was a avid silk road customer with ties to Xanaxman and few others I wont mention but mostly all are incarcerated now. With real alprazolam xanax powder flowing through the postal system like gold in the hills, there were 2, 2.5, and 3 and even 4mg pressed xanax bars being sold for .20 cents to 75c per pill. As a college student in a college town and experimenting with different drugs every weekend I knew I could make some money.
I quickly made friends with one of the biggest xanax distributors on the silk road. We actually had conversations daily and I considered him a friend. He would explain his press machine, the way he operated his business and allot of personal information as we just clicked and quickly a friendship became. From going to selling 1000 every 2 weeks for 3$ ea and customers coming back like clockwork this quickly went to 5k a week selling bulk. He would eventually front me 20k sent 4 packages to 4 different addresses that I knew my friends wouldn't mind for cash.
This is where I knew I fucked up. With cash coming in like I've never seen before I literally could do or go anywhere. I was on top of the world. ( I'll get back to this in a second). One afternoon I woke up from a night at the bar, head still spinning and that good next day feeling from the benzos. As I tried rubbing the sleep off my eyes I stumbled out of my roommates bed onto his glass table breaking the entire thing, shattering it into hundreds of peices. How I didn't get hurt is beyond me.
As I lay on the ground very confused and panicked I look at the ceiling fan which is on, swinging a belt from the blades around and around. I get up cussing at my self and remember yelling out to my roommate to come here. I took the belt off the fan and noticed it wasn't mine and a wallet came off with the belt that was holding it down. I looked at the wallet, I had no idea who this person was.
After sitting down for a second trying to recollect from the night before I get up and go to the living room where I see my front door wide open I freak out worried my dog got out but I ran to my room which door was closed and thankfully he was on the bed looking at me like mother fcker you have some big problems. Sigh of relief my pup was there but shit and piss was everywhere.
Now to find my phone. I tore up my roommate's bedroom looking for my phone. No luck. As a few hours passed I got a more worried as I totally blacked out the night before and couldn't remember anything after popping 3 3mg xanax and flow of drinks. I realized I was supposed to be getting a package this day and went out to mailbox but nothing was there. Little freaked out I came back inside and grabbed my burner phone and called one of my drops. The package wasn't there either, nor was any of them.
I then drove to the bar I was last at the night before and not even 3 steps in the owner stopped me and said sir you are no longer allowed in here after what happened last night and I'm calling the police. Stunned, I said I don't remember what happened last night and whatever I did I'll pay for the damage. He said the only thing you broke was a pool stick across a police car and you and your friend got into a fight with 5 college students. I looked down and things were starting to come to me. He said police were looking for me and my roommate was in jail. Very confused I thanked him and gave him 100$.
So I assume the wallet was one of the persons I got into a fight with. I go to address on ID but no one answered so I left it on the chair on the front porch. Why the hell was a belt and his wallet on the blade of my ceiling fan? So many questions I had. I come home and get on my computer to see where my packages were at before I call the jail. All packages said they needed to be picked up at post office sig required. This freaked me out beyond belief. How was I going to tell this vendor I wouldn't be able to pay for 40k bars that were fronted. Logged off my account and got off my chair and a knock on the door. I hit my toe on the edge of my bed and there was my phone, I was very happy. I plugged it in and went to front door. It was a police officer.
Freaking out, I didn't know what to do so I just stood behind the door panicking. I ran to my safe and put everything I had in there which I hadn't used in years because I forgot the code to get in. Along with the drugs was my random generated pin for my btc wallet. As I closed it I very loudly shouted FUCK as I watched it closed remembering I didn't know the code. I'll just worry about it later I told myself and rushed to door. Officer asked if I was at the bar last night where the incident happened I said yes I was and he asked if I could come down to station to write a affidavit. Agreeing nervously as I didn't want more cops to come or come inside my house he let me follow him up there.
As i sit down he asks me questions about the fight and said my roommate had broken one guys jaw that's why he was in jail. I told him honestly sir I blacked out, defended myself and I don't remember how I got home. He said I was told you were running down the street with only shoes on and a belt. I looked down and busted out with a laugh saying sir there is no way that's accurate. With the straightest face he said does it look like I would make this up. My face was white as a ghost and I looked down again apologizing asking if I was in trouble. He stated there was nothing on camera about the fight nor was the guy pressing charges. Thought maybe this day will finally get better.
So he said to fill out the affidavit best of my knowledge and I asked when my friend was getting out since no charges were being filed. He said when he calms down as he was still in the drunk tank. I left there wth only one thing on my mind, how in the hell am I going To get these packages.
I was honestly scared and figured they were seized but wondered why I didn't get a controlled delivery instead. Not that I was complaining but I was still freaked out about losing 40K bars and how is it going to explain it to my silk road vendor. Days go and pass and about a week later I find over 200 people had had controlled deliveries across the US and my vendor had been arrested. I had been so scared these past few days that I haven't even thought about getting back into the safe as I had bars laying around the house that I was taking to call my anxiety and so I didn't have any type of come down in decided to wing myself off now that I Was facing possible charges on these packages.
3 weeks pass and I finally try to get the remaining bars I had left from the safe and remember about my btc wallet code. This wasnt a 100$ safe it was a family members huge gun safe that was like a bank vault. My roommate and I tried to get into that safe for 3 days straight doing anything and everything I could and nothing would budge. I was out of options. I finally gave up and given up selling xanax as I was afraid of the possible consequences that might occur.
Almost a year later when I moved out of the house I had a few friends of mine get to say from the back of The truck to take it out to a lease to blow it up with tannerite. It took us a few days of blowing up, shooting it and putting a drill to the corners we finally opened it. I had forgotten how many drugs were actually in there. Finding my btc pass for my wallet I was really excited as the price of bitcoin had gone up substantially. It was all there. Ended up being close to 65k worth of btc. It was a glorious day. I was completely off all drugs and had all this bitcoin.
Nothing ever came about the packages and I moved far away from where I went to college. Looking back it was a fun, dangerous ride but wouldnt change a thing. Unfortunate events for my buddy being busted for his lab and I eventually found him in prison system and sent a letter anonymously saying I can send him money to family if he wanted. I never got a letter back and dont know if he even got the letter. Craziest thing I've ever done but wouldn't of gone back to do it any different. Bars took a tole on me and I'm very fortunate I even came out of the situation not in jail or repercussion for owing someone money. Oh the good ol days...?
submitted by c0rrect6 to BartardStories [link] [comments]

Square accepts Bitcoins -- Silk Road: Bitcoin is not Money -- Trezor Hardware Bitcoin Wallet 10M Bitcoin.com Wallets created, Updates on local.bitcoin.com, Opinion on SilkRoad and DNM's support Silkroad & Bitcoin - All PR is good PR  Silicon Real Panel - Best of - Securing Bitcoin Wallets - YouTube Best of - Set Up Your Bitcoin Wallet

So you want to make some online purchases using the Silk Road? Maybe you need to buy something else with Bitcoins online? Well, whatever the case, we’ll help you get those Bitcoins. 1. Get a Bitcoin Wallet Bitcoin wallets work just like real-life wallets do. They let you send and receive Bitcoins when you need to. Think of a Bitcoin wallet like a Paypal account. Most hard-core Bitcoin users ... The best bitcoin wallet for your needs depends on your comfort with technology and your goals. Here are some of the best types of wallets for different situations: Advanced users: Hardware wallets offer the best security and people very comfortable with computers should have no problem navigating the additional complexities. Trezor and Ledger are great choices for this group. Beginners ... Atomic Wallet is a multi-currency custody free wallet that supports over 300 coins and tokens. This one is the first cryptocurrency wallet with decentralized cross-chain atomic swaps on board. Users can exchange Bitcoin, Litecoin and QTUM with no intermediaries. In terms of its size, Silk Road is currently Bitcoin’s largest e-commerce platform, having about twice as many products as its largest legal competitor, bitmit.net, but it is far from being Bitcoin’s economic powerhouse, a title to which businesses like Butterfly Labs and BitInstant hold a much greater claim. Both supporters of Silk Road’s particular brand of crypto-anarchic freedom and ... Silk road Bitcoin wallet gets active, is a dump coming? Silk Road was launched in February 2011 as the “first modern darknet market.” The platform allowed the users to buy and sell illegal things online anonymously. The Silk Road, however, was shut down by the Federal Bureau of Investigation (FBI) in October 2013. A year after, Silk Road 2 ...

[index] [35032] [45287] [31672] [38574] [18413] [40366] [9530] [45432] [38120] [44483]

Square accepts Bitcoins -- Silk Road: Bitcoin is not Money -- Trezor Hardware Bitcoin Wallet

10M Bitcoin.com Wallets created, Updates on local.bitcoin.com, Opinion on SilkRoad and DNM's support - Duration: 8:05. Bitcoin.com - Official Channel 2,833 views 8:05 Silk Road Gründer: BITCOIN auf 100k DOLLAR in 2020 ! VeChain Hack Ripple & SendFriend Tezos Moon VeChain Hack Ripple & SendFriend Tezos Moon Finanzielle Freiheit dank Kryptowährungen Grab our top-rated Bitcoin wallet for free: https://wallet.bitcoin.com Buy and Sell Bitcoin Cash peer-to-peer: https://local.bitcoin.com Trade with Bitcoin Cash: https://exchange.bitcoin.com Visit ... Our Bitcoin discussion topics includes the Bitcoin protocol of the block chain, the real identity of Satoshi Nakamoto, ramifications of the Silk Road on Bitcoin price, Dogecoin, Litecoin, the Dark ... Bitcoin is clearly the most exciting Internet protocol today. Texas Bitcoin Conference The Texas Bitcoin Conference will allow attendees to explore this new ...

#