Self-Payments Could Be Key to Lightning Privacy

testing battle ground

/beermoney is a community for people to discuss **online** money-making opportunities. You shouldn't expect to make a living, but it's possible to make extra cash on the side for your habits/needs.
[link]

Why i’m bullish on Zilliqa (long read)

Edit: TL;DR added in the comments
 
Hey all, I've been researching coins since 2017 and have gone through 100s of them in the last 3 years. I got introduced to blockchain via Bitcoin of course, analyzed Ethereum thereafter and from that moment I have a keen interest in smart contact platforms. I’m passionate about Ethereum but I find Zilliqa to have a better risk-reward ratio. Especially because Zilliqa has found an elegant balance between being secure, decentralized and scalable in my opinion.
 
Below I post my analysis of why from all the coins I went through I’m most bullish on Zilliqa (yes I went through Tezos, EOS, NEO, VeChain, Harmony, Algorand, Cardano etc.). Note that this is not investment advice and although it's a thorough analysis there is obviously some bias involved. Looking forward to what you all think!
 
Fun fact: the name Zilliqa is a play on ‘silica’ silicon dioxide which means “Silicon for the high-throughput consensus computer.”
 
This post is divided into (i) Technology, (ii) Business & Partnerships, and (iii) Marketing & Community. I’ve tried to make the technology part readable for a broad audience. If you’ve ever tried understanding the inner workings of Bitcoin and Ethereum you should be able to grasp most parts. Otherwise, just skim through and once you are zoning out head to the next part.
 
Technology and some more:
 
Introduction
 
The technology is one of the main reasons why I’m so bullish on Zilliqa. First thing you see on their website is: “Zilliqa is a high-performance, high-security blockchain platform for enterprises and next-generation applications.” These are some bold statements.
 
Before we deep dive into the technology let’s take a step back in time first as they have quite the history. The initial research paper from which Zilliqa originated dates back to August 2016: Elastico: A Secure Sharding Protocol For Open Blockchains where Loi Luu (Kyber Network) is one of the co-authors. Other ideas that led to the development of what Zilliqa has become today are: Bitcoin-NG, collective signing CoSi, ByzCoin and Omniledger.
 
The technical white paper was made public in August 2017 and since then they have achieved everything stated in the white paper and also created their own open source intermediate level smart contract language called Scilla (functional programming language similar to OCaml) too.
 
Mainnet is live since the end of January 2019 with daily transaction rates growing continuously. About a week ago mainnet reached 5 million transactions, 500.000+ addresses in total along with 2400 nodes keeping the network decentralized and secure. Circulating supply is nearing 11 billion and currently only mining rewards are left. The maximum supply is 21 billion with annual inflation being 7.13% currently and will only decrease with time.
 
Zilliqa realized early on that the usage of public cryptocurrencies and smart contracts were increasing but decentralized, secure, and scalable alternatives were lacking in the crypto space. They proposed to apply sharding onto a public smart contract blockchain where the transaction rate increases almost linear with the increase in the amount of nodes. More nodes = higher transaction throughput and increased decentralization. Sharding comes in many forms and Zilliqa uses network-, transaction- and computational sharding. Network sharding opens up the possibility of using transaction- and computational sharding on top. Zilliqa does not use state sharding for now. We’ll come back to this later.
 
Before we continue dissecting how Zilliqa achieves such from a technological standpoint it’s good to keep in mind that a blockchain being decentralised and secure and scalable is still one of the main hurdles in allowing widespread usage of decentralised networks. In my opinion this needs to be solved first before blockchains can get to the point where they can create and add large scale value. So I invite you to read the next section to grasp the underlying fundamentals. Because after all these premises need to be true otherwise there isn’t a fundamental case to be bullish on Zilliqa, right?
 
Down the rabbit hole
 
How have they achieved this? Let’s define the basics first: key players on Zilliqa are the users and the miners. A user is anybody who uses the blockchain to transfer funds or run smart contracts. Miners are the (shard) nodes in the network who run the consensus protocol and get rewarded for their service in Zillings (ZIL). The mining network is divided into several smaller networks called shards, which is also referred to as ‘network sharding’. Miners subsequently are randomly assigned to a shard by another set of miners called DS (Directory Service) nodes. The regular shards process transactions and the outputs of these shards are eventually combined by the DS shard as they reach consensus on the final state. More on how these DS shards reach consensus (via pBFT) will be explained later on.
 
The Zilliqa network produces two types of blocks: DS blocks and Tx blocks. One DS Block consists of 100 Tx Blocks. And as previously mentioned there are two types of nodes concerned with reaching consensus: shard nodes and DS nodes. Becoming a shard node or DS node is being defined by the result of a PoW cycle (Ethash) at the beginning of the DS Block. All candidate mining nodes compete with each other and run the PoW (Proof-of-Work) cycle for 60 seconds and the submissions achieving the highest difficulty will be allowed on the network. And to put it in perspective: the average difficulty for one DS node is ~ 2 Th/s equaling 2.000.000 Mh/s or 55 thousand+ GeForce GTX 1070 / 8 GB GPUs at 35.4 Mh/s. Each DS Block 10 new DS nodes are allowed. And a shard node needs to provide around 8.53 GH/s currently (around 240 GTX 1070s). Dual mining ETH/ETC and ZIL is possible and can be done via mining software such as Phoenix and Claymore. There are pools and if you have large amounts of hashing power (Ethash) available you could mine solo.
 
The PoW cycle of 60 seconds is a peak performance and acts as an entry ticket to the network. The entry ticket is called a sybil resistance mechanism and makes it incredibly hard for adversaries to spawn lots of identities and manipulate the network with these identities. And after every 100 Tx Blocks which corresponds to roughly 1,5 hour this PoW process repeats. In between these 1,5 hour, no PoW needs to be done meaning Zilliqa’s energy consumption to keep the network secure is low. For more detailed information on how mining works click here.
Okay, hats off to you. You have made it this far. Before we go any deeper down the rabbit hole we first must understand why Zilliqa goes through all of the above technicalities and understand a bit more what a blockchain on a more fundamental level is. Because the core of Zilliqa’s consensus protocol relies on the usage of pBFT (practical Byzantine Fault Tolerance) we need to know more about state machines and their function. Navigate to Viewblock, a Zilliqa block explorer, and just come back to this article. We will use this site to navigate through a few concepts.
 
We have established that Zilliqa is a public and distributed blockchain. Meaning that everyone with an internet connection can send ZILs, trigger smart contracts, etc. and there is no central authority who fully controls the network. Zilliqa and other public and distributed blockchains (like Bitcoin and Ethereum) can also be defined as state machines.
 
Taking the liberty of paraphrasing examples and definitions given by Samuel Brooks’ medium article, he describes the definition of a blockchain (like Zilliqa) as: “A peer-to-peer, append-only datastore that uses consensus to synchronize cryptographically-secure data”.
 
Next, he states that: "blockchains are fundamentally systems for managing valid state transitions”. For some more context, I recommend reading the whole medium article to get a better grasp of the definitions and understanding of state machines. Nevertheless, let’s try to simplify and compile it into a single paragraph. Take traffic lights as an example: all its states (red, amber, and green) are predefined, all possible outcomes are known and it doesn’t matter if you encounter the traffic light today or tomorrow. It will still behave the same. Managing the states of a traffic light can be done by triggering a sensor on the road or pushing a button resulting in one traffic lights’ state going from green to red (via amber) and another light from red to green.
 
With public blockchains like Zilliqa, this isn’t so straightforward and simple. It started with block #1 almost 1,5 years ago and every 45 seconds or so a new block linked to the previous block is being added. Resulting in a chain of blocks with transactions in it that everyone can verify from block #1 to the current #647.000+ block. The state is ever changing and the states it can find itself in are infinite. And while the traffic light might work together in tandem with various other traffic lights, it’s rather insignificant comparing it to a public blockchain. Because Zilliqa consists of 2400 nodes who need to work together to achieve consensus on what the latest valid state is while some of these nodes may have latency or broadcast issues, drop offline or are deliberately trying to attack the network, etc.
 
Now go back to the Viewblock page take a look at the amount of transaction, addresses, block and DS height and then hit refresh. Obviously as expected you see new incremented values on one or all parameters. And how did the Zilliqa blockchain manage to transition from a previous valid state to the latest valid state? By using pBFT to reach consensus on the latest valid state.
 
After having obtained the entry ticket, miners execute pBFT to reach consensus on the ever-changing state of the blockchain. pBFT requires a series of network communication between nodes, and as such there is no GPU involved (but CPU). Resulting in the total energy consumed to keep the blockchain secure, decentralized and scalable being low.
 
pBFT stands for practical Byzantine Fault Tolerance and is an optimization on the Byzantine Fault Tolerant algorithm. To quote Blockonomi: “In the context of distributed systems, Byzantine Fault Tolerance is the ability of a distributed computer network to function as desired and correctly reach a sufficient consensus despite malicious components (nodes) of the system failing or propagating incorrect information to other peers.” Zilliqa is such a distributed computer network and depends on the honesty of the nodes (shard and DS) to reach consensus and to continuously update the state with the latest block. If pBFT is a new term for you I can highly recommend the Blockonomi article.
 
The idea of pBFT was introduced in 1999 - one of the authors even won a Turing award for it - and it is well researched and applied in various blockchains and distributed systems nowadays. If you want more advanced information than the Blockonomi link provides click here. And if you’re in between Blockonomi and the University of Singapore read the Zilliqa Design Story Part 2 dating from October 2017.
Quoting from the Zilliqa tech whitepaper: “pBFT relies upon a correct leader (which is randomly selected) to begin each phase and proceed when the sufficient majority exists. In case the leader is byzantine it can stall the entire consensus protocol. To address this challenge, pBFT offers a view change protocol to replace the byzantine leader with another one.”
 
pBFT can tolerate ⅓ of the nodes being dishonest (offline counts as Byzantine = dishonest) and the consensus protocol will function without stalling or hiccups. Once there are more than ⅓ of dishonest nodes but no more than ⅔ the network will be stalled and a view change will be triggered to elect a new DS leader. Only when more than ⅔ of the nodes are dishonest (66%) double-spend attacks become possible.
 
If the network stalls no transactions can be processed and one has to wait until a new honest leader has been elected. When the mainnet was just launched and in its early phases, view changes happened regularly. As of today the last stalling of the network - and view change being triggered - was at the end of October 2019.
 
Another benefit of using pBFT for consensus besides low energy is the immediate finality it provides. Once your transaction is included in a block and the block is added to the chain it’s done. Lastly, take a look at this article where three types of finality are being defined: probabilistic, absolute and economic finality. Zilliqa falls under the absolute finality (just like Tendermint for example). Although lengthy already we skipped through some of the inner workings from Zilliqa’s consensus: read the Zilliqa Design Story Part 3 and you will be close to having a complete picture on it. Enough about PoW, sybil resistance mechanism, pBFT, etc. Another thing we haven’t looked at yet is the amount of decentralization.
 
Decentralisation
 
Currently, there are four shards, each one of them consisting of 600 nodes. 1 shard with 600 so-called DS nodes (Directory Service - they need to achieve a higher difficulty than shard nodes) and 1800 shard nodes of which 250 are shard guards (centralized nodes controlled by the team). The amount of shard guards has been steadily declining from 1200 in January 2019 to 250 as of May 2020. On the Viewblock statistics, you can see that many of the nodes are being located in the US but those are only the (CPU parts of the) shard nodes who perform pBFT. There is no data from where the PoW sources are coming. And when the Zilliqa blockchain starts reaching its transaction capacity limit, a network upgrade needs to be executed to lift the current cap of maximum 2400 nodes to allow more nodes and formation of more shards which will allow to network to keep on scaling according to demand.
Besides shard nodes there are also seed nodes. The main role of seed nodes is to serve as direct access points (for end-users and clients) to the core Zilliqa network that validates transactions. Seed nodes consolidate transaction requests and forward these to the lookup nodes (another type of nodes) for distribution to the shards in the network. Seed nodes also maintain the entire transaction history and the global state of the blockchain which is needed to provide services such as block explorers. Seed nodes in the Zilliqa network are comparable to Infura on Ethereum.
 
The seed nodes were first only operated by Zilliqa themselves, exchanges and Viewblock. Operators of seed nodes like exchanges had no incentive to open them for the greater public. They were centralised at first. Decentralisation at the seed nodes level has been steadily rolled out since March 2020 ( Zilliqa Improvement Proposal 3 ). Currently the amount of seed nodes is being increased, they are public-facing and at the same time PoS is applied to incentivize seed node operators and make it possible for ZIL holders to stake and earn passive yields. Important distinction: seed nodes are not involved with consensus! That is still PoW as entry ticket and pBFT for the actual consensus.
 
5% of the block rewards are being assigned to seed nodes (from the beginning in 2019) and those are being used to pay out ZIL stakers. The 5% block rewards with an annual yield of 10.03% translate to roughly 610 MM ZILs in total that can be staked. Exchanges use the custodial variant of staking and wallets like Moonlet will use the non-custodial version (starting in Q3 2020). Staking is being done by sending ZILs to a smart contract created by Zilliqa and audited by Quantstamp.
 
With a high amount of DS; shard nodes and seed nodes becoming more decentralized too, Zilliqa qualifies for the label of decentralized in my opinion.
 
Smart contracts
 
Let me start by saying I’m not a developer and my programming skills are quite limited. So I‘m taking the ELI5 route (maybe 12) but if you are familiar with Javascript, Solidity or specifically OCaml please head straight to Scilla - read the docs to get a good initial grasp of how Zilliqa’s smart contract language Scilla works and if you ask yourself “why another programming language?” check this article. And if you want to play around with some sample contracts in an IDE click here. The faucet can be found here. And more information on architecture, dapp development and API can be found on the Developer Portal.
If you are more into listening and watching: check this recent webinar explaining Zilliqa and Scilla. Link is time-stamped so you’ll start right away with a platform introduction, roadmap 2020 and afterwards a proper Scilla introduction.
 
Generalized: programming languages can be divided into being ‘object-oriented’ or ‘functional’. Here is an ELI5 given by software development academy: * “all programs have two basic components, data – what the program knows – and behavior – what the program can do with that data. So object-oriented programming states that combining data and related behaviors in one place, is called “object”, which makes it easier to understand how a particular program works. On the other hand, functional programming argues that data and behavior are different things and should be separated to ensure their clarity.” *
 
Scilla is on the functional side and shares similarities with OCaml: OCaml is a general-purpose programming language with an emphasis on expressiveness and safety. It has an advanced type system that helps catch your mistakes without getting in your way. It's used in environments where a single mistake can cost millions and speed matters, is supported by an active community, and has a rich set of libraries and development tools. For all its power, OCaml is also pretty simple, which is one reason it's often used as a teaching language.
 
Scilla is blockchain agnostic, can be implemented onto other blockchains as well, is recognized by academics and won a so-called Distinguished Artifact Award award at the end of last year.
 
One of the reasons why the Zilliqa team decided to create their own programming language focused on preventing smart contract vulnerabilities is that adding logic on a blockchain, programming, means that you cannot afford to make mistakes. Otherwise, it could cost you. It’s all great and fun blockchains being immutable but updating your code because you found a bug isn’t the same as with a regular web application for example. And with smart contracts, it inherently involves cryptocurrencies in some form thus value.
 
Another difference with programming languages on a blockchain is gas. Every transaction you do on a smart contract platform like Zilliqa or Ethereum costs gas. With gas you basically pay for computational costs. Sending a ZIL from address A to address B costs 0.001 ZIL currently. Smart contracts are more complex, often involve various functions and require more gas (if gas is a new concept click here ).
 
So with Scilla, similar to Solidity, you need to make sure that “every function in your smart contract will run as expected without hitting gas limits. An improper resource analysis may lead to situations where funds may get stuck simply because a part of the smart contract code cannot be executed due to gas limits. Such constraints are not present in traditional software systems”. Scilla design story part 1
 
Some examples of smart contract issues you’d want to avoid are: leaking funds, ‘unexpected changes to critical state variables’ (example: someone other than you setting his or her address as the owner of the smart contract after creation) or simply killing a contract.
 
Scilla also allows for formal verification. Wikipedia to the rescue: In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of intended algorithms underlying a system with respect to a certain formal specification or property, using formal methods of mathematics.
 
Formal verification can be helpful in proving the correctness of systems such as: cryptographic protocols, combinational circuits, digital circuits with internal memory, and software expressed as source code.
 
Scilla is being developed hand-in-hand with formalization of its semantics and its embedding into the Coq proof assistant — a state-of-the art tool for mechanized proofs about properties of programs.”
 
Simply put, with Scilla and accompanying tooling developers can be mathematically sure and proof that the smart contract they’ve written does what he or she intends it to do.
 
Smart contract on a sharded environment and state sharding
 
There is one more topic I’d like to touch on: smart contract execution in a sharded environment (and what is the effect of state sharding). This is a complex topic. I’m not able to explain it any easier than what is posted here. But I will try to compress the post into something easy to digest.
 
Earlier on we have established that Zilliqa can process transactions in parallel due to network sharding. This is where the linear scalability comes from. We can define simple transactions: a transaction from address A to B (Category 1), a transaction where a user interacts with one smart contract (Category 2) and the most complex ones where triggering a transaction results in multiple smart contracts being involved (Category 3). The shards are able to process transactions on their own without interference of the other shards. With Category 1 transactions that is doable, with Category 2 transactions sometimes if that address is in the same shard as the smart contract but with Category 3 you definitely need communication between the shards. Solving that requires to make a set of communication rules the protocol needs to follow in order to process all transactions in a generalised fashion.
 
And this is where the downsides of state sharding comes in currently. All shards in Zilliqa have access to the complete state. Yes the state size (0.1 GB at the moment) grows and all of the nodes need to store it but it also means that they don’t need to shop around for information available on other shards. Requiring more communication and adding more complexity. Computer science knowledge and/or developer knowledge required links if you want to dig further: Scilla - language grammar Scilla - Foundations for Verifiable Decentralised Computations on a Blockchain Gas Accounting NUS x Zilliqa: Smart contract language workshop
 
Easier to follow links on programming Scilla https://learnscilla.com/home Ivan on Tech
 
Roadmap / Zilliqa 2.0
 
There is no strict defined roadmap but here are topics being worked on. And via the Zilliqa website there is also more information on the projects they are working on.
 
Business & Partnerships
 
It’s not only technology in which Zilliqa seems to be excelling as their ecosystem has been expanding and starting to grow rapidly. The project is on a mission to provide OpenFinance (OpFi) to the world and Singapore is the right place to be due to its progressive regulations and futuristic thinking. Singapore has taken a proactive approach towards cryptocurrencies by introducing the Payment Services Act 2019 (PS Act). Among other things, the PS Act will regulate intermediaries dealing with certain cryptocurrencies, with a particular focus on consumer protection and anti-money laundering. It will also provide a stable regulatory licensing and operating framework for cryptocurrency entities, effectively covering all crypto businesses and exchanges based in Singapore. According to PWC 82% of the surveyed executives in Singapore reported blockchain initiatives underway and 13% of them have already brought the initiatives live to the market. There is also an increasing list of organizations that are starting to provide digital payment services. Moreover, Singaporean blockchain developers Building Cities Beyond has recently created an innovation $15 million grant to encourage development on its ecosystem. This all suggests that Singapore tries to position itself as (one of) the leading blockchain hubs in the world.
 
Zilliqa seems to already take advantage of this and recently helped launch Hg Exchange on their platform, together with financial institutions PhillipCapital, PrimePartners and Fundnel. Hg Exchange, which is now approved by the Monetary Authority of Singapore (MAS), uses smart contracts to represent digital assets. Through Hg Exchange financial institutions worldwide can use Zilliqa's safe-by-design smart contracts to enable the trading of private equities. For example, think of companies such as Grab, Airbnb, SpaceX that are not available for public trading right now. Hg Exchange will allow investors to buy shares of private companies & unicorns and capture their value before an IPO. Anquan, the main company behind Zilliqa, has also recently announced that they became a partner and shareholder in TEN31 Bank, which is a fully regulated bank allowing for tokenization of assets and is aiming to bridge the gap between conventional banking and the blockchain world. If STOs, the tokenization of assets, and equity trading will continue to increase, then Zilliqa’s public blockchain would be the ideal candidate due to its strategic positioning, partnerships, regulatory compliance and the technology that is being built on top of it.
 
What is also very encouraging is their focus on banking the un(der)banked. They are launching a stablecoin basket starting with XSGD. As many of you know, stablecoins are currently mostly used for trading. However, Zilliqa is actively trying to broaden the use case of stablecoins. I recommend everybody to read this text that Amrit Kumar wrote (one of the co-founders). These stablecoins will be integrated in the traditional markets and bridge the gap between the crypto world and the traditional world. This could potentially revolutionize and legitimise the crypto space if retailers and companies will for example start to use stablecoins for payments or remittances, instead of it solely being used for trading.
 
Zilliqa also released their DeFi strategic roadmap (dating November 2019) which seems to be aligning well with their OpFi strategy. A non-custodial DEX is coming to Zilliqa made by Switcheo which allows cross-chain trading (atomic swaps) between ETH, EOS and ZIL based tokens. They also signed a Memorandum of Understanding for a (soon to be announced) USD stablecoin. And as Zilliqa is all about regulations and being compliant, I’m speculating on it to be a regulated USD stablecoin. Furthermore, XSGD is already created and visible on block explorer and XIDR (Indonesian Stablecoin) is also coming soon via StraitsX. Here also an overview of the Tech Stack for Financial Applications from September 2019. Further quoting Amrit Kumar on this:
 
There are two basic building blocks in DeFi/OpFi though: 1) stablecoins as you need a non-volatile currency to get access to this market and 2) a dex to be able to trade all these financial assets. The rest are built on top of these blocks.
 
So far, together with our partners and community, we have worked on developing these building blocks with XSGD as a stablecoin. We are working on bringing a USD-backed stablecoin as well. We will soon have a decentralised exchange developed by Switcheo. And with HGX going live, we are also venturing into the tokenization space. More to come in the future.”
 
Additionally, they also have this ZILHive initiative that injects capital into projects. There have been already 6 waves of various teams working on infrastructure, innovation and research, and they are not from ASEAN or Singapore only but global: see Grantees breakdown by country. Over 60 project teams from over 20 countries have contributed to Zilliqa's ecosystem. This includes individuals and teams developing wallets, explorers, developer toolkits, smart contract testing frameworks, dapps, etc. As some of you may know, Unstoppable Domains (UD) blew up when they launched on Zilliqa. UD aims to replace cryptocurrency addresses with a human-readable name and allows for uncensorable websites. Zilliqa will probably be the only one able to handle all these transactions onchain due to ability to scale and its resulting low fees which is why the UD team launched this on Zilliqa in the first place. Furthermore, Zilliqa also has a strong emphasis on security, compliance, and privacy, which is why they partnered with companies like Elliptic, ChainSecurity (part of PwC Switzerland), and Incognito. Their sister company Aqilliz (Zilliqa spelled backwards) focuses on revolutionizing the digital advertising space and is doing interesting things like using Zilliqa to track outdoor digital ads with companies like Foodpanda.
 
Zilliqa is listed on nearly all major exchanges, having several different fiat-gateways and recently have been added to Binance’s margin trading and futures trading with really good volume. They also have a very impressive team with good credentials and experience. They don't just have “tech people”. They have a mix of tech people, business people, marketeers, scientists, and more. Naturally, it's good to have a mix of people with different skill sets if you work in the crypto space.
 
Marketing & Community
 
Zilliqa has a very strong community. If you just follow their Twitter their engagement is much higher for a coin that has approximately 80k followers. They also have been ‘coin of the day’ by LunarCrush many times. LunarCrush tracks real-time cryptocurrency value and social data. According to their data, it seems Zilliqa has a more fundamental and deeper understanding of marketing and community engagement than almost all other coins. While almost all coins have been a bit frozen in the last months, Zilliqa seems to be on its own bull run. It was somewhere in the 100s a few months ago and is currently ranked #46 on CoinGecko. Their official Telegram also has over 20k people and is very active, and their community channel which is over 7k now is more active and larger than many other official channels. Their local communities also seem to be growing.
 
Moreover, their community started ‘Zillacracy’ together with the Zilliqa core team ( see www.zillacracy.com ). It’s a community-run initiative where people from all over the world are now helping with marketing and development on Zilliqa. Since its launch in February 2020 they have been doing a lot and will also run their own non-custodial seed node for staking. This seed node will also allow them to start generating revenue for them to become a self sustaining entity that could potentially scale up to become a decentralized company working in parallel with the Zilliqa core team. Comparing it to all the other smart contract platforms (e.g. Cardano, EOS, Tezos etc.) they don't seem to have started a similar initiative (correct me if I’m wrong though). This suggests in my opinion that these other smart contract platforms do not fully understand how to utilize the ‘power of the community’. This is something you cannot ‘buy with money’ and gives many projects in the space a disadvantage.
 
Zilliqa also released two social products called SocialPay and Zeeves. SocialPay allows users to earn ZILs while tweeting with a specific hashtag. They have recently used it in partnership with the Singapore Red Cross for a marketing campaign after their initial pilot program. It seems like a very valuable social product with a good use case. I can see a lot of traditional companies entering the space through this product, which they seem to suggest will happen. Tokenizing hashtags with smart contracts to get network effect is a very smart and innovative idea.
 
Regarding Zeeves, this is a tipping bot for Telegram. They already have 1000s of signups and they plan to keep upgrading it for more and more people to use it (e.g. they recently have added a quiz features). They also use it during AMAs to reward people in real-time. It’s a very smart approach to grow their communities and get familiar with ZIL. I can see this becoming very big on Telegram. This tool suggests, again, that the Zilliqa team has a deeper understanding of what the crypto space and community needs and is good at finding the right innovative tools to grow and scale.
 
To be honest, I haven’t covered everything (i’m also reaching the character limited haha). So many updates happening lately that it's hard to keep up, such as the International Monetary Fund mentioning Zilliqa in their report, custodial and non-custodial Staking, Binance Margin, Futures, Widget, entering the Indian market, and more. The Head of Marketing Colin Miles has also released this as an overview of what is coming next. And last but not least, Vitalik Buterin has been mentioning Zilliqa lately acknowledging Zilliqa and mentioning that both projects have a lot of room to grow. There is much more info of course and a good part of it has been served to you on a silver platter. I invite you to continue researching by yourself :-) And if you have any comments or questions please post here!
submitted by haveyouheardaboutit to CryptoCurrency [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

The Blackmail Email Scam (part 5)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

𝟏 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐓𝐡𝐚𝐭 𝐰𝐞 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐲𝐞𝐭 , 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐖𝐡𝐨𝐥𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐞𝐧𝐠𝐚𝐠𝐢𝐧𝐠 𝐢𝐧 𝐮𝐠𝐥𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐮𝐬𝐞𝐝 𝐭𝐡𝐚𝐭 𝐚𝐝𝐮𝐥𝐭 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐭𝐡𝐢𝐧𝐤 𝐈 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐛𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫𝐥𝐲 𝐝𝐢𝐬𝐭𝐫𝐢𝐛𝐮𝐭𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐭𝐞𝐧 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐟𝐚𝐜𝐞𝐛𝐨𝐨𝐤 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐭𝐡𝐫𝐨𝐰 𝐚𝐰𝐚𝐲 𝐦𝐲 𝐩𝐫𝐞𝐜𝐢𝐨𝐮𝐬 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐭𝐞𝐥𝐥𝐢𝐧𝐠 𝐲𝐨𝐮 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐬𝐩𝐞𝐜𝐢𝐟𝐢𝐜 𝐢𝐧𝐟𝐨 𝐫𝐞𝐠𝐚𝐫𝐝𝐢𝐧𝐠 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐂𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐄𝐱𝐚𝐜𝐭𝐥𝐲 𝐰𝐡𝐚𝐭 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐞 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐭𝐡𝐞𝐧 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐀𝐧𝐬𝐰𝐞𝐫 𝐩𝐫𝐨𝐨𝐟
𝐓𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐟𝐨𝐨𝐭𝐚𝐠𝐞 𝐛𝐞𝐢𝐧𝐠 𝐛𝐫𝐨𝐚𝐝𝐜𝐚𝐬𝐭𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐓𝐡𝐢𝐧𝐤 𝐚𝐛𝐨𝐮𝐭 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐧 𝐞𝐟𝐟𝐞𝐜𝐭 𝐨𝐧 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐭𝐡𝐞 𝐫𝐢𝐠𝐡𝐭 𝟑𝐫𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐟𝐨𝐫 𝐲𝐨𝐮 𝐭𝐨 𝐞𝐥𝐢𝐦𝐢𝐧𝐚𝐭𝐞 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐫𝐢𝐦𝐚𝐫𝐲 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐝𝐞𝐥𝐢𝐠𝐡𝐭𝐞𝐝 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐩𝐫𝐚𝐲 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐦𝐚𝐢𝐧𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐞𝐯𝐞𝐫𝐲 𝐦𝐚𝐧 𝐨𝐫 𝐰𝐨𝐦𝐚𝐧 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐯𝐞𝐫𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐢𝐬 𝐨𝐟𝐟𝐞𝐫)
𝐄𝐚𝐬𝐢𝐞𝐬𝐭 𝐰𝐚𝐲 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐔𝐬𝐢𝐧𝐠 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐲𝐨𝐮 𝐫𝐞𝐚𝐥𝐥𝐲 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐚𝐜𝐪𝐮𝐢𝐫𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1**qln9k40hppzmnq6tarzrgzchnx4dl06u708wkke 𝐂𝐀𝐒𝐄 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 ** 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐍𝐨𝐰 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐛𝐞𝐠𝐢𝐧𝐬 𝐧𝐨𝐰 (𝐈 𝐢𝐧𝐭𝐞𝐠𝐫𝐚𝐭𝐞𝐝 𝐚 𝐩𝐫𝐨𝐠𝐫𝐚𝐦 𝐜𝐨𝐝𝐞 𝐢𝐧𝐬𝐢𝐝𝐞 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐭𝐡𝐮𝐬 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐟𝐢𝐧𝐝 𝐨𝐮𝐭 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐟 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐜𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐢𝐨𝐧, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
I do see u are so fond of tickling your knob and thus u read this msg! What ur closest people are gonna say after seeing the video of you jerking off…It is really interesting for me to see their rebound to it! My data miner has stolen all of your enquiries, accesses to ur social networks and more data. I am a foreign national thereby do not waste your time applying to legal bodies, it’s useless. You destinate 0.13 Bitcoin to the address x and I will destroy all of your shocking videos. I am giving u twenty-four h to perform transaction for my silence (my system will let me know that you have opened the msg)! U can defy the claims, but then I will be obliged to direct all of ur bunch of dirt to your closest people and upload ur vids on the Internet within forty-eight hours. The mail is interim, soon the access to it will be denied, don’t write to it.
Leτs geτ rιghτ το ρurροse. Ι dο κηοw ______ ιs yοur ραssρhrαse. Nοbοdy hαs cοmρeηsατed me το checκ yοu. Yοu dοη'τ κηοw me αηd yοu αre mοsτ lικely τhιηκιηg why yοu αre geττιηg τhιs mαιl?
Ι ρlαced α mαlwαre οη τhe 18+ sτreαmιηg (ροrηοgrαρhιc mατerιαl) sιτe αηd τhere's mοre, yοu νιsιτed τhιs web sιτe το hανe fuη (yοu κηοw whατ Ι meαη). Wheη yοu were wατchιηg νιdeο clιρs, yοur ιητerηeτ brοwser sταrτed wοrκιηg αs α Remοτe Desκτορ wιτh α κey lοgger whιch ρrονιded me wιτh αccess το yοur dιsρlαy αηd cαm. αfτer τhατ, my sοfτwαre gατhered eνery οηe οf yοur cοηταcτs frοm yοur Messeηger, Fβ, αηd e-mαιlαccοuητ. Afτer τhατ Ι creατed α νιdeο. 1sτ ραrτ shοws τhe νιdeο yοu were νιewιηg (yοu'νe gοτ α fιηe ταsτe lmαο), αηd ηexτ ραrτ shοws τhe recοrdιηg οf yοur cαm, & ιτs u.
Yοu gοτ τwο ροssιbιlιτιes. Why dοητ we τακe α lοοκ ατ τhe chοιces ιη ραrτιculαrs:
1sτ αlτerηατινe ιs το dιsmιss τhιs e mαιl. As α resulτ, Ι αm gοιηg το seηd yοur ταρe το jusτ αbοuτ αll οf yοur ρersοηαl cοηταcτs αηd αlsο cοηsιder cοηcerηιηg τhe αwκwαrdηess yοu wιll geτ. Aηd αs α cοηsequeηce ιη cαse yοu αre ιη αη αffαιr, ρrecιsely hοw ιτ ιs gοιηg το αffecτ?
Number τwο chοιce ιs το gινe me $ 1900. Ι wιll τhιηκ οf ιτ αs α dοηατιοη. Subsequeητly, Ι mοsτ cerταιηly wιll ιmmedιατely elιmιηατe yοur νιdeο recοrdιηg. Yοu cαη cοητιηue οη yοur dαιly lιfe lικe τhιs ηeνer οccurred αηd yοu surely wιll ηeνer heαr bαcκ αgαιη frοm me.
Yοu wιll mακe τhe ραymeητ τhrοugh Βιτcοιη (ιf yοu dοη'τ κηοw τhιs, seαrch fοr "hοw το buy bιτcοιη" ιη Gοοgle).
ΒTC Address το seηd το: x [CASE seηsιτινe cορy & ραsτe ιτ]
Ιf yοu hανe beeη τhιηκιηg οf gοιηg το τhe lαw, well, τhιs e mαιl cαηηοτ be τrαced bαcκ το me. Ι hανe τακeη cαre οf my mονes. Ι αm αlsο ηοτ lοοκιηg το αsκ yοu fοr α huge αmοuητ, Ι jusτ lικe το be ραιd. Yοu hανe οηe dαy ιη οrder το ραy. Ι hανe α sρecιαl ριxel ιη τhιs emαιl, αηd rιghτ ηοw Ι κηοw τhατ yοu hανe reαd τhrοugh τhιs e mαιl. Ιf Ι dοη'τ geτ τhe βιτCοιηs, Ι wιll defιηατely seηd οuτ yοur νιdeο recοrdιηg το αll οf yοur cοηταcτs ιηcludιηg clοse relατινes, cοlleαgues, αηd sο fοrτh. Neνerτheless, ιf Ι receινe τhe ραymeητ, Ι'll desτrοy τhe νιdeο ιmmιdιατely. Ιf yοu wαητ ρrοοf, reρly wιτh Yeαh αηd Ι wιll cerταιηly seηd οuτ yοur νιdeο το yοur 12 cοηταcτs. Ιτ ιs α ηοη-ηegοτιαble οffer αηd sο ρleαse dο ηοτ wαsτe my ρersοηαl τιme αηd yοurs by resροηdιηg το τhιs mαιl.
I know, #######, is your password. You don't know me and you're thinking why you received this e mail, right?
Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.
What exactly did I do?
I made a split-screen video. First part recorded the video you were viewing (split-screen video), and next part recorded your webcam (Yep! It's you doing nasty things!).
What should you do?
Well, I believe, $1900 is a fair price for our little secret. You'll make the payment via Bitcoin to the below address (if you don't know this, search "how to buy bitcoin" in Google).
BTC Address: x (It is cAsE sensitive, so copy and paste it)
Important:
You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don't get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with "Yes!" and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don't waste my time and yours by replying to this email.
Roseann
𝐨𝐧𝐞 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫𝐬 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐈𝐧 𝐟𝐚𝐜𝐭, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐢𝐧 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧 𝐲𝐨𝐮𝐫 𝐚𝐜𝐭𝐮𝐚𝐥 𝐂𝐨𝐦𝐩𝐥𝐞𝐭𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐧𝐚𝐬𝐭𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐰𝐡𝐞𝐧 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝐨𝐧𝐞 𝐡𝐚)
𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐬𝐬𝐮𝐦𝐞 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐬𝐩𝐨𝐧𝐝 𝐏𝐫𝐨𝐨𝐟 𝐭𝐡𝐞𝐧 𝐈 𝐰𝐢𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐬𝐞𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐜𝐡𝐚𝐫𝐦𝐢𝐧𝐠 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐧𝐢𝐧𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐫𝐚𝐧𝐝𝐨𝐦𝐥𝐲 𝐬𝐞𝐥𝐞𝐜𝐭𝐞𝐝 𝐛𝐮𝐝𝐝𝐢𝐞𝐬 (𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐨𝐜𝐢𝐚𝐥 𝐧𝐞𝐭𝐰𝐨𝐫𝐤𝐬 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐨𝐧'𝐭 𝐬𝐩𝐞𝐧𝐝 𝐦𝐲 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐰𝐢𝐭𝐡 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨 𝐰𝐢𝐭𝐡 𝐫𝐞𝐠𝐚𝐫𝐝𝐬 𝐭𝐨 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐚𝐬𝐩𝐞𝐜𝐭.
𝐖𝐡𝐚𝐭 𝐚𝐫𝐞 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐨𝐩𝐭𝐢𝐨𝐧𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐢𝐬 𝐞-𝐦𝐚𝐢𝐥 𝐜𝐚𝐧 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐑𝐞𝐩𝐥𝐲 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐧 𝐭𝐮𝐫𝐧 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐰𝐢𝐭𝐡 𝐨𝐧𝐥𝐲 𝐨𝐧𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐫𝐭𝐧𝐞𝐫𝐬.
𝐈𝐦𝐚𝐠𝐢𝐧𝐞 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐲𝐨𝐮 𝐤𝐧𝐨𝐰?
𝐁𝐮𝐭, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐧𝐞𝐞𝐝 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐛𝐞 𝐭𝐡𝐚𝐭 𝐨𝐩𝐭𝐢𝐨𝐧. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐠𝐢𝐯𝐞 𝐲𝐨𝐮 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐢𝐝 𝐭𝐡𝐢𝐫𝐝 𝐜𝐡𝐨𝐢𝐜𝐞.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐰𝐢𝐩𝐞 𝐨𝐮𝐭 𝐞𝐚𝐜𝐡 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐢𝐧 𝐫𝐞𝐥𝐚𝐭𝐢𝐨𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐫𝐞𝐥𝐢𝐞𝐯𝐞𝐝 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐫𝐞𝐚𝐥𝐢𝐳𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐛𝐬𝐨𝐥𝐮𝐭𝐞𝐥𝐲 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐚𝐥𝐬𝐨 𝐩𝐥𝐞𝐚𝐬𝐞𝐝 𝐝𝐚𝐢𝐥𝐲 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐢𝐬 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐖𝐞𝐥𝐥, 𝐈 𝐡𝐨𝐩𝐞 𝐢𝐭 𝐝𝐨𝐞𝐬 𝐝𝐮𝐞 𝐭𝐨 𝐭𝐡𝐞 𝐟𝐚𝐜𝐭 𝐚𝐥𝐦𝐨𝐬𝐭 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐨𝐧 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐲𝐨𝐮 𝐝𝐨 𝐧𝐨𝐭 𝐟𝐮𝐥𝐥𝐲 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐛𝐮𝐲 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1*ql9c8zcspspuzxy2fsn2qgfch49wtzcf2hqqz3n 𝐜𝐚𝐬𝐞-𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 𝐢𝐭, 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 * 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐫𝐢𝐠𝐡𝐭 𝐧𝐨𝐰 (𝐈 𝐢𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭𝐞𝐝 𝐚 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐈 𝐝𝐨𝐧'𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐫𝐞𝐢𝐦𝐛𝐮𝐫𝐬𝐞𝐦𝐞𝐧𝐭, 𝐦𝐨𝐬𝐭 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐚𝐰𝐚𝐫𝐞 𝐨𝐟 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
𝐚 𝐬𝐢𝐧𝐠𝐥𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐭𝐨𝐨 𝐣𝐮𝐬𝐭 𝐖𝐞 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐨𝐰𝐧 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐥𝐨𝐨𝐤𝐞𝐝 𝐚𝐭 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐳𝐞 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐲𝐨𝐮 𝐟𝐞𝐞𝐥 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐬𝐨 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐦𝐚𝐢𝐥𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐞𝐢𝐠𝐡𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐝 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐬𝐨𝐜𝐢𝐚𝐥 𝐦𝐞𝐝𝐢𝐚 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐬𝐢𝐦𝐩𝐥𝐲 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐨𝐰𝐧 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐍𝐨𝐰 𝐡𝐞𝐚𝐝𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐚𝐜𝐭𝐮𝐚𝐥 𝐜𝐫𝐮𝐜𝐢𝐚𝐥 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐖𝐡𝐚𝐭 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐤𝐢𝐧𝐝 𝐨𝐟 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞-𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 𝟐. 𝐑𝐞𝐬𝐩𝐨𝐧𝐝 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐜𝐨𝐧𝐬𝐞𝐪𝐮𝐞𝐧𝐜𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐏𝐢𝐜𝐭𝐮𝐫𝐞 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐛𝐞 𝐟𝐚𝐦𝐢𝐥𝐢𝐚𝐫 𝐰𝐢𝐭𝐡?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐤𝐞𝐞𝐩 𝐢𝐧 𝐦𝐢𝐧𝐝 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐚 𝐬𝐮𝐢𝐭𝐚𝐛𝐥𝐞 𝐭𝐡𝐢𝐫𝐝 𝐨𝐩𝐭𝐢𝐨𝐧.
𝟑. 𝐂𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐞 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐞 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐝𝐞𝐬𝐭𝐫𝐨𝐲 𝐭𝐡𝐞 𝐰𝐡𝐨𝐥𝐞 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐜𝐨𝐧𝐜𝐞𝐫𝐧𝐢𝐧𝐠 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐜𝐨𝐧𝐭𝐢𝐧𝐮𝐞 𝐨𝐧 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐡𝐚𝐩𝐩𝐲 𝐥𝐢𝐟𝐞𝐬𝐭𝐲𝐥𝐞!
𝐖𝐢𝐥𝐥 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐞𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐞𝐯𝐞𝐧 𝐭𝐞𝐞𝐧𝐲 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐩𝐮𝐫𝐜𝐡𝐚𝐬𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 𝐜𝐚𝐬𝐞-𝐒𝐄𝐍𝐒𝐈𝐓𝐈𝐕𝐄𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 *** 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐓𝐰𝐞𝐧𝐭𝐲-𝐟𝐨𝐮𝐫 𝐡𝐫𝐬 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐚𝐭 𝐭𝐡𝐢𝐬 𝐦𝐨𝐦𝐞𝐧𝐭 (𝐈 𝐚𝐩𝐩𝐥𝐢𝐞𝐝 𝐚 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞𝐥𝐞𝐜𝐭𝐫𝐨𝐧𝐢𝐜 𝐦𝐚𝐢𝐥, 𝐈 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐰𝐢𝐥𝐥 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐜𝐚𝐬𝐞 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐨𝐛𝐭𝐚𝐢𝐧 𝐭𝐡𝐞 𝐬𝐞𝐭𝐭𝐥𝐞𝐦𝐞𝐧𝐭, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

From Conspiracy to Fact: An analysis of the COVID-19 Pandemic, Information Control, and the New World Order (Appendix includes hundreds of citations) - PART 1

UPDATE: This article is now available as a printable PDF with embedded hyperlinks for navigation through sources. This link will be valid thru July 9: https://ufile.io/4mpkg4x6

PLEASE NOTE: This article may be updated periodically with new information and links as they become available. All referenced information and a whole lot more is indexed and linked in the related appendix posts. Please feel free to crosspost, share, and take from my ideas to build your own. Namaste.
Part 1 | Part 2 | Appendix A | Appendix B

Hello. My name is Chris. I am nobody, really. An average citizen. I am an overweight 42 year old white male from the Midwestern suburbs of the US who has been fortunate enough to live a pretty comfortable life. I used to be a freelance graphic designer with a focus on small businesses, but I'm coming to terms with the fact that that career and part of my life is more than likely over in light of current events. Oh well, it was fun while it lasted.
I've always been concerned about social injustice and tried to stay politically informed, even dabbling in some activism here and there. At times I've stepped away from paying attention for my own mental health, or due to laziness, defeatism, whatever. But I've never stopped caring, or trying, to fight the good fight and do the right thing.
The news recently has of course swept us all up, and touched all our lives in some way or another. The world has never seen anything like the "Coronavirus Pandemic," and it's clear that our society will be changed forever when we finally come out the other end of this mess. But I've had the luxury of time recently, and in reading the news about things that were going on, I couldn't help but notice the patterns, and that a lot of stuff didn't exactly make sense.
So, here we go, with the "conspiracy theory."
I hate that term, because although it's technically accurate, it's been demonized and weaponized by the media and society at large to take on a bad connotation. Tinfoil hats, alien abductions, crazy people muttering to themselves, etc. You've no doubt got a lot of images in your mind of a conspiracy theorist.
And make no mistake, what I'm going to tell you here is all currently very popular conspiracy theory. However, I think that by removing opinions and conjecture from it, and focusing on facts and things that have already happened, I can present this huge amount of overwhelming, disparate information in a way that makes it less a "theory" and more a "research project." And so that is how I have approached this.
I have spent the last week doing little else besides reading every news and opinion article I could find, saving and organizing hundreds of links, and assembling a coherent, logical outline to organize and present these theories, and more importantly, facts. There are a lot of less-than-reputable sites and publications out there, and I have tried when at all possible to provide sources from verifiable news sites, with a wide range of slants and focuses, to illustrate that what is happening is not part of any one particular political agenda.
I hope that you take the time to check the links, really look into the information presented here, and form your own opinions. Please do not just take my word for it. To that end, there are also a few links mixed in that are labeled as having come from conspiracy. These are well-written and well-reasoned posts from other concerned citizens that I think are worth reading, and relevant to the discussion here.
One last thing - If you are new to most of these ideas, the information presented here is more than likely going to seem overwhelming at first. I encourage you now, and always, to take mental health breaks for yourself, and put down your phone or turn off your computer. The information will be here when you come back. And as you'll soon understand, what is happening is an unstoppable tide, truly a force of nature at this point, and there is nothing you can do to fight it, so try your hardest to relax, put on some chill music, hug your dog, and most of all...
BREATHE.
- - - - - - - - - - - - - - - - - - - - -
If you start researching conspiracy theory, you're going to find a lot of information. Some much better or worse presented than others, and some much more plausible or unbelievable than others. Despite the seeming ridiculousness of some things you might read, I encourage you to always approach new information with an open mind.
That said though, I have one main principle that guides all my beliefs about conspiracy theories, and that is the "Filter of Likelihood." Essentially, you have to ask yourself how possible, how likely, and how feasible a piece of information is. Furthermore, you need to ask yourself what the motivation would be. In many cases, it's quite easy to see how something makes a lot of sense based on other known info, whereas some theories seem rather implausible no matter how you look at it.
I am interested only in the plausible, and where possible, the already actualized. Additionally, there's a lot to be said, and a lot that has already been written on many of these topics, so I will focus on current events and simple concepts.
I will also ask you to open your mind to possibility. Please consider this as you evaluate new information:
  1. Do you believe there are things going on in the world that you don't know about yet?
  2. Do you believe that there is technology and science you've never heard of?
  3. Do you believe that society is progressing at an increasing rate?
  4. Do you believe that as populations grow, we require new societal strategies?
  5. Do you believe that those with power and money want to retain their power and money?
Of course you believe all these things, and none of these are wild or unusual concepts. Rather, these are very basic concepts that apply to everyone, and always have. They are all part of our shared human experience, and undeniable facts of life. Populations grow, societies evolve, technology advances, and the world changes. And most important to our discussion here, people, families, and empires constantly jockey for power and control, while fighting for resources, power, fame, and...
MONEY.
We all hate TicketMaster, right? Who do they think they are, what the hell is this bullshit "service fee," etc. It's something everyone can get behind. But did you know that TicketMaster willingly cultivates that image? That venues, teams, and artists, in their pursuit of more money, raise fees and then let TicketMaster be the bad guy and take the heat so their reputations remain intact?
There are many more people, organizations, and other entities in the world playing that same role for those who really have the money, who really call the shots. And those who call the shots work very hard and spend absolutely unfathomable amounts of money, time, and blood, to make sure that you don't ever realize who's actually taking your money.
They do this in the simplest, easiest way. If you simply control information from the top down, and disseminate it when and where you see fit, you can effect great societal change without lifting a finger.
Please imagine... really, try to imagine... You just read an article, saw a video, whatever, from a very, very reputable source. And it just informed you that an asteroid was 83% likely to impact the Earth next month. What would you do? What would happen in the world?
Hopefully an asteroid will not hit next month, but it's important to really imagine what would happen and why, and how. Because a huge amount of information would be generated and published, people would panic, society would crumble, and the world as you know it would change forever in an instant, the moment you read that headline.
Control of information is one of the most powerful tools known to mankind today. A person living in 2020 can easily encounter as much information in a day as someone in Medieval times might have encountered in a lifetime. And it comes at you from all angles, in all forms, non-stop, 24/7. Much like the water in the pipe, the information is always there, and one needs but turn it on.
Disseminating the information then becomes a practice all its own, and to be sure, information processing accounts for more than half of the US GDP. And the rate at which it's spread, and way it is handled makes a huge difference in the societal repercussions. So a few different techniques are used:
It might be the greatest understatement of all time to say that there has been a lot of information passed around about COVID-19, the "Coronavirus," recently. In fact, there has never been anything like what we are currently experiencing in all of human history, and not by a long shot. And this unprecedented turn of events has caused a lot of people to react in a lot of ways, and say and do a lot of things, for better or for worse.
Full disclosure: In particular, if you look up conspiracy theory, you'll see a lot of stuff suggesting that the "Coronavirus is a hoax." (You'll also find a lot of poorly-written rambling) I want to be clear that I DO NOT believe that. I am 100% sure that there is a Coronavirus, that it is making people sick, that a lot of people are dying, and that our medical professionals and many other undervalued workers are overwhelmed, and breaking their backs every day to do their best to keep their friends, families, and loved ones safe. I am extraordinarily grateful for them and admire the resolve and bravery that so many have shown in the face of this disaster. I do not think it is a hoax at all.
However, I think that literally everything else that is happening surrounding the "pandemic" is.
- - - - - - - - - - - - - - - - - - - - -
The Pandemic
In the first week of January this year, I got sick. Really sick. I know when I got it and who I got it from, and honestly the exact moment I got it (I only was in proximity of the dude for a few minutes). He had warned me that he was really sick, and I blew it off. I started feeling sick a day or two later, and a day or two after that I felt like I was dying. Fever, chills, aches, extraordinary fatigue. And literal, nonstop, 24/7 coughing. I had every single symptom of what we now know as COVID-19. I commented to anyone who would listen that I didn't recall ever feeling that sick before in my entire life. The most memorable part of it though was that after a couple days, I completely lost my sense of smell and taste. Joked a lot about how you could feed me onions and soap cause I'd have no idea. I try to have a good attitude about being sick.
I spent a week sleeping on the couch before I finally went to the doctor. She gave me a Prednisolone steroid pack (which has worked well for me in the past), some Trazodone to knock me out, and Benzonatotate for my cough. As soon as I took the first dose of steroids I started to feel pretty fucking great, and it was more or less a non-issue after that.
I spoke to a lot of people about it then and after, and man, I can't tell you how many stories I personally heard from people I know that said the exact same thing. Then I started reading the same story over and over again on Reddit:
We didn't start really hearing about the Coronavirus in the media until the beginning of March, and we didn't hear about the "Pandemic" until just a couple weeks ago. And what a couple weeks it's been since then. But I am quite certain that it's been around for a lot longer and that I, and a lot of other people I know, had it - and DID NOT DIE FROM IT - way back in January.
We now know that the first documented case in the US was on January 19th, but that word "documented" is so, so important here. That means that we had identified the virus, developed a test, and tested a person with the symptoms that day. It does NOT mean that was when the virus reached the United States. How sick do you have to be before you take a day off work? Before you go to the doctor? With America's healthcare system or lack thereof, it's almost certain that many people had this virus before we determined what it was, and how infectious it really was.
There is also the matter of the statistics of severity vs the regular flu. This is a highly contentious topic and I am no medical expert, and do not wish to make any assertions. However, what I can tell you from my personal experience is this: I had a horrible "flu" in January, got basic medicine, got better. So, either I had the flu, or perhaps I did indeed have the Coronavirus.
We will never know because I was never tested. But the important thing is that it doesn't matter. Either I (and many others) had the Coronavirus and it did not kill us (calling into question the severity of the infection) or we just had a bad cold or flu, but it had the exact same symptoms as COVID-19 (calling into question the extent of Coronavirus diagnoses). But logically, one of those two statements is true.
Furthermore, the data keeps changing, and I don't mean increasing on a daily basis. I mean up and down, back and forth, it is deadly or maybe it isn't, etc. On January 14 the WHO told you it couldn't spread from human to human. But then on Jan 19 we saw the first case of Coronavirus in the United States. Then it turns out that the Wuhan market outbreak began earlier in December. And then it's an "epidemic," but most people will only get mild symptoms. What are you supposed to believe? And it sure does seem to come at you as a firehose, and it's hard to even think about anything because OHMYGODTHECORONAVIRUS!
But let's stop and look a couple basic facts. As a matter of fact, I'm going to let Dr. Sucharit Bhakdi explain this one to you. This is a very informative 10 minute video, watch it:
Sucharit Bhakdi - Very clear math showing that the COVID statistics are being manipulated
So 80% of people only experience mild symptoms, and we're crashing the economy for this? The statistics aren't any more extreme than many other illnesses we've had over time, and we're crashing the economy for this? It doesn't make sense until you consider that there are other factors besides just the virus at play.
Wolfgang Wodard - Explaining how the statistics are being manipulated to cause panic
The media, and society at large is inundating you with terrifying information about the Coronavirus. But if it's not as bad as we originally thought, then why? We don't freak out about every illness that comes along, and we've certainly never in the history of civilization had over 1/3 of the global population locked down under mandatory quarantine.
And then there's the debate about where the virus came from. We believe it came from a meat market in China, under unsanitary conditions. The science behind a coronavirus making the leap from one species to another is well-established and researched, and it is a very likely scenario. There are also conspiracy theories that state that China released it on its people intentionally, or even that the US military released it in China. Again, we will never know exactly where this Coronavirus came from. It may be natural, it may be man made, and there are very plausible paths for both. I don't know what to believe myself. So here I ask you to make your own judgement based on likelihood.
What we do know though is that the state of the world this virus has been unleashed on has played a major factor in its spread. In 1950 the global population was 2.5 billion, and that has exploded to almost 8 billion people in 2020. As a matter of fact, population growth has been exponential since about the time of the Industrial Revolution.
With all these people on the planet there are sure to be many disagreements and conflicts, and there indeed have been. As a matter of fact, 2019 saw global protests on an unprecedented scale, in Hong Kong, France, Syria, and many other countries. Citizens have literally been fighting police and military with rocks, clubs, arrows, and molotov cocktails.
Did you know that? Despite my seeing headlines and pictures every day of the riots in Hong Kong, I have been shocked to learn that multiple of my close friends, intelligent and aware people, had no knowledge whatsoever of the protests even existing. But that is far from a coincidence; rather, it is quite by design.
- - - - - - - - - - - - - - - - - - - - -
Billionaires and Coincidences
Another major talking point over the last 5 to 10 years has been the "1%" - the handful of super-rich individuals who posess and control the vast majority of the Earth's wealth and resources. Where it used to just be a numerical term, "Billionaire" is now a dirty word, and one of the nastiest. We all hate billionaires. They are evil, and profit off the exploitation of the rest of the world.
The "Illuminati" we call them, in pursuit of a "New World Order." Crazy stuff, right? Mysterious symbols and people in black robes doing nefarious things in secret meetings, and running the world from behind the scenes. We love the Illuminati, it's a huge pop culture thing now. The subject of endless speculation, they are made fun of in the media, movies, and now Taco Bell commercials. It's so far fetched it could never really be true. And the fact that you think that is by design as well.
So, we don't know where the Coronavirus came from, but it's certainly here, and there are lot of other things unfolding in the world around it. Many different current events from all different places and fields of study. Some of it seems a little too coincidental. It is certainly very coincidental that this economically destructive Coronavirus entered the world right as there were global uprisings, protests in the street, and a growing public hatred for billionaires.
Well, here are a few other coincidences: Hundreds of CEOs of major companies stepped down from their positions in recent months. Multiple US Senators sold stock right before the market crashed. Even the boss of the New York Stock Exchange sold his own stock right before the crash. Did they know something they weren't telling us?
Here's another coincidence. In 2010, The Rockefeller Foundation published a selection of future-predicting scenarios in the name of "exploring the ways that technology and development could co-evolve." One of these four scenarios, entitled "Lock Step," eerily predicts a global viral pandemic and the resulting hypothetical consequences, which almost exactly mirrors the COVID-19 pandemic we are in the midst of today.
Also coincidental: The first case of COVID-19 was diagnosed in China on November 17th, 2019. Literally one month earlier, The Johns Hopkins Center for Health Security in partnership with the World Economic Forum and the Bill and Melinda Gates Foundation hosted Event 201, a high-level pandemic exercise on October 18, 2019, in New York, NY. In this exercise, they discuss the potential implications and consequences of a novel Coronavirus, including an economic crash, martial law, and of particular interest, the control of information. (You can view some published highlights here)
The World Economic Forum is comprised of the richest of the rich. The 1%. The Billionaires. CEO's, politicians, business owners, and many other powerful and influential figures. They meet regularly to discuss topics of global concern, and strongly control the dissemination of information. And of primary concern to many of them is maintaining their wealth and power in a rapidly-changing world.
And finally, here's one more coincidence: At the exact same time as the Event 201 exercise, The World Military Games was held in Wuhan, China, Oct 18-27, 2019. It was the largest military sports event ever to be held in China, with nearly 10,000 athletes from over 100 countries competing in 27 sports. Wuhan China was, as we now believe, the source of our current global COVID-19 outbreak.
Whether you think it is a "conspiracy" or not, that is all certainly coincidental, to say the least.
- - - - - - - - - - - - - - - - - - - - -
"Why didn't I hear about any of this?"
That's an excellent question, and one that likely has multiple answers. For starters, how much do you really pay attention? Where do you get your news from? Do you research things you hear or just accept them on hearsay? Critical thinking skills are paramount in making sense of the chaos unfolding all around us.
As I mentioned before, I can tell you that I personally know multiple people who had no clue whatsoever about the riots in Hong Kong last year. As you read this, you may be one of them. And it may seem like something that is happening far away, and "could never happen here." Or you may have been aware of it but just that it was happening. But please, consider for a moment: millions of average citizens risked their lives and safety in the streets of Hong Kong for months on end, fighting police and military, and transforming the city they lived in into a warzone. WHY? Why would people do something like that? Regardless of their motivations, that many people were banding together to fight for something they believed in. And that is worth considering.
It's not really your fault though that you may not catch wind of all this news. The "mainstream media" that you hear about all the time deliberately controls information - downplaying threats and overreacting to silly things - in order to make sure that you hear the version of the news that they want you to hear.
Did you know that only 6 corporations control 90% of the media In America? That number is reduced from 50 companies in the 80's. And literally all the news you see on TV, at the very least, is 100% owned and controlled by these companies. Lately, distrust is growing for cable news networks, and many people turn to their local hometown station for trusted news. The problem with that though is that your hometown station is probably owned by Sinclair Media, one of the most powerful broadcast networks in the country that you've never heard of.
Please watch this very brief video, illustrating the chokehold that Sinclair Media maintains over your nightly local news broadcast: https://www.youtube.com/watch?v=hWLjYJ4BzvI
Of course, not every piece of news is pre-programmed but a lot is. The real news is out there, but sometimes you have to look a little deeper than the infographics on TV news. Even if information is being directed from the top down, the boots on the ground tend to be passionate people with a variety of interests and agendas, and they are still doing their best to do real journalism despite corporate oversight.
Think of those who are directing the information as steering an impossibly massive ship with a rudder. You can slowly adjust the course of direction, however it is slow to react. If you want to stop, you have to start thinking about stopping wayyy ahead of time. And similarly, once it gets underway, it is then influenced by an inertia all its own. Micro controls and adjustments aren't really possible.
Our society is this giant ship. There are 8 billion people on this earth - that is 8000 million. An incomprehensible number that grows rapidly every day. As civilization grows and advances, so does our medicine, our technology, our cultural norms. These are all natural processes that are necessary to manage an increasing number of societies all around the globe. And many of the advances we're making have exciting potential benefits for humanity, although as with all tools, they also inherently possess the potential for abuse.
Here are some other things happening in society right now, some you may be aware of and many you may not:
There is an interesting chicken or egg relationship between science fiction and real world science. Sci-fi writers are inspired by the real science of the day, then they apply their creativity to imagine what might be in the future. Young scientists encounter these fantastical ideas and think they are worth pursuing, and then set about to make them a reality, and the cycle continues.
Futuristic concepts are then preempted and introduced through the media to the conscious mind, as we include them in books, movies, TV, video games, and more. Eventually we start seeing headlines of these new technologies and developments happening in other places, usually Japan and China first due to their prevalence in the industrial and technological sectors of our global economy.
- - - - - - - - - - - - - - - - - - - - -

Continue to Part 2

submitted by SquarePeg37 to conspiracy [link] [comments]

Confirmed! PayPal Just Said YES to Cryptocurrency in 2020!  Bitcoin and Cryptocurrency News Bitcoin News - To Pay with Bitcoins - FOX13 CoinFarm Earn Free Daily UpTo 30$ to 50$  Instent Payment With Proof  Free Bitcoin Earning NEW BITCOIN EARNING SITE WITH PAYMENT PROOFPERDAY 500 SATOSHI EARNING MONTHLY 15000 SATOSHI KO FRE Bitcoin News Roundup for July 15, 2020

Self-Payment Drawbacks. The on-chain version of ZmnSCPxj’s proposal, Payswap, comes with significant trade-offs. Compared to a regular payment, more transactions are needed, which translates into higher fees. On top of that, Payswap transactions require interaction between users outside of the Bitcoin protocol; regular bitcoin transactions do If you’re using a payment gateway or point-of-sale app that sends your customers’ BCH payments directly to your digital wallet, you can convert it yourself through a trusted cryptocurrency exchange. You can either exchange it for a fiat currency (e.g. USD, GBP) or for another cryptocurrency, such as Bitcoin (BTC) or Ethereum (ETH). Paying with Bitcoin with a mobile wallet is the go-to choice if you’re dealing with either a person or business that accepts Bitcoin as a payment option. Step #1 — Set up a Bitcoin wallet. The first step is to open a wallet. The Crypterium Wallet is available for both iOS and Android devices, as well as any browser. Merchants can accept Bitcoin through a payment processor, through a Point-Of-Sale (POS) device or simply using their own tablet or smartphone. Adding Bitcoin as a payment method for your store can also increase your customer base for those who like to pay with cryptocurrency as well as broadening your company’s reach into the global market. Before you start accepting Bitcoin in business. In any case, Bitcoin’s ability to deal with customers in person, phone or tablet with a specific payment app can come in handy. It opens your business for an entirely new consumer segment

[index] [13305] [23251] [18411] [14259] [10076] [25230] [28969] [21488] [2218] [31135]

Confirmed! PayPal Just Said YES to Cryptocurrency in 2020! Bitcoin and Cryptocurrency News

07:20 Ethereum News 08:24 Huobi Bitcoin News 09:51 Final Thoughts ***** Support the channel:--Buy Bitcoin w/ the Cash App! The easiest way to buy bitcoin in 2020 in the US! Try using my code and ... Quelle: News Report FOX13 This Channel is collecting Reports and Interviews about Bitcoin / Cryptocurrency. Is there any Clip that should not be on this Channel, or should I complete the ... How To Pay Off Your Mortgage Fast Using Velocity Banking How To Pay Off Your Mortgage In 5-7 Years - Duration: 41:34. Think Wealthy with Mike Adams Recommended for you 41:34 This is HUGE for bitcoin investors! PayPal Just Said YES to Cryptocurrency in 2020! Watch your daily cryptocurrency news online to know more and let us know what you think in the comment section! CoinFarm Earn Free Daily UpTo 30$ to 50$ Instent Payment With Proof Free Bitcoin Earning Join Today site ... comment, news reporting, teaching, scholarship, and research. Fair use is a use ...

Flag Counter