Bitcoin's Price History - Investopedia

https://en.wikipedia.org/wiki/History_of_bitcoin#Prices_and_value_history /r/Bitcoin

https://en.wikipedia.org/wiki/History_of_bitcoin#Prices_and_value_history /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

https://en.wikipedia.org/wiki/History_of_bitcoin#Prices_and_value_history

From the History of Bitcoin on Wikipedia
25 November 2017 $9,000 Bitcoin surpasses the $9,000 mark for the first time.
28 November 2017 $10,000 Bitcoin surpasses $10,000 for the first time.
29 November 2017 $11,000 Bitcoin surpasses $11,000 for the first time.
5 December 2017 $12,000 Bitcoin surpasses $12,000 for the first time.
6 December 2017 $13,000 Bitcoin surpasses $13,000 for the first time.
7 December 2017 $14,000 Bitcoin surpasses $14,000 for the first time.
8 December 2017 $15,000 Bitcoin surpasses $15,000 for the first time.
submitted by Syndweller to Bitcoin [link] [comments]

Prepping for a Financial crisis / hyperinflation.

So what can we do about it? Any ideas are welcome.
It has a lot of "what if's"... It depends how tax and law play out with it.Historically speaking:
  1. -I stock bulk diesel for my cars while following historical averages to buy cheap.
  2. -Rotating food stock
  3. -Extra maintenance items, including the big things like a roof on your home if its coming time. Not joking I have a spare water heater and backup heating options, along with minor parts and filters to fix them. Same with cars and engines, (spark plugs, filters (all different filters), oil, cheap sensors that usually go bad and are only 4-10$ each, 1-2 extra alternator per vehicle, belts, mowing belts, bearings, grease, ... and I've literally had to use everything on that list and reorder.)
  1. -Security, Locks, Alarms, Cameras, people steal.
  2. A deep freezer for instance can stock food you use and buy on sale.
  3. Solar energy and solar heating supplements energy you use anyways
  4. Rainwater can be collected and used rather than buying from a source.
  5. A cooking gadget vs eating out.
  6. Tools and learning to fix things vs hire.
  7. House insulation.-Better insulative windows, and sealing.
  8. Geo-Thermal
  9. Gardening
  10. Bidet on toilet (lol serious though...)
  11. Backup power
  12. Your education can be a huge one, not just for prepping but also in your work.
  13. Things that prevent rot, fire, flood / humidity, or failure. Humidity is a silent killer to many preps. (water sump pumps, dehumidifiers, leak prevention, fire extinguishers / sprinklers, )
submitted by AntiSonOfBitchamajig to preppers [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5//
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

Top-5 Ways To Buy Bitcoin Instantly

The choice of the optimal ways to buy Bitcoin depends on three factors: how much information you want to disclose, what is the amount of the transaction and what level of security you require. However, it is almost impossible to comply with all 3 factors. So, what is the best way to buy Bitcoin?

1. Stock exchange

The best way to buy crypto is to use an exchange (Binance, Coinbase Pro, Huobi Global), where one can sell and buy digital currency from other investors. The price is set manually. In this case, the commission charged by the intermediary will not exceed 1%. The exchange provides anonymity since you don’t need to provide your ID in most exchanges. There are several options for transactions:
If you want to know how to begin investing in Bitcoin, start studying stock exchanges.

Pros:

Cons:

2. Exchanger

A crypto exchanger (Localbitcoins, Lykke, F-change) allows exchanging fiat or other tokens for BTC according to a fixed rate. It is probably the easiest way to buy crypto. The service adds a commission higher than that on the stock exchange.

Pros:

Cons:

3. ATMs for BTC

ATMs for Bitcoins only enter the market. It is enough to have the necessary amount of cash to be able to exchange it for the equivalent in BTC. Such a transaction is instant and does not require registration or other formalities. There are now over 8500 BTC ATMs around the world.

4. For cash with individuals

A hand-to-hand sale is the most private and most insecure way to buy cryptocurrency. It is lucky if you know reliable miners or crypto businessmen. Rent, salary, taxes – all this requires ordinary money, so they constantly have a need to sell mined or earned cryptocurrency. Pros – maximum anonymity of transactions. Cons – risks from dishonest partners.

5. Telegram bots

Telegram bot is an automatic script based on the search for offers and counteroffers. If someone wants to sell BTC, they send a request to the bot and it looks for a counter offer. As soon as someone sends a request for the purchase of Bitcoin, the bot will complete a transaction between these two users.

Pros:

Cons:

Disclaimer

While talking about the ways to buy Bitcoin, it is important to mention that this article doesn’t provide any advice and directions regarding the investments in particular cryptocurrencies and pursues only informative purposes.
submitted by CoinjoyAssistant to btc [link] [comments]

Crypto-Powered - The Most Promising Use-Cases of Decentralized Finance (DeFi)

Crypto-Powered - The Most Promising Use-Cases of Decentralized Finance (DeFi)
A whirlwind tour of Defi, paying close attention to protocols that we’re leveraging at Genesis Block.
https://reddit.com/link/hrrt21/video/cvjh5rrh12b51/player
This is the third post of Crypto-Powered — a new series that examines what it means for Genesis Block to be a digital bank that’s powered by crypto, blockchain, and decentralized protocols.
Last week we explored how building on legacy finance is a fool’s errand. The future of money belongs to those who build with crypto and blockchain at their core. We also started down the crypto rabbit hole, introducing Bitcoin, Ethereum, and DeFi (decentralized finance). That post is required reading if you hope to glean any value from the rest of this series.
97% of all activity on Ethereum in the last quarter has been DeFi-related. The total value sitting inside DeFi protocols is roughly $2B — double what it was a month ago. The explosive growth cannot be ignored. All signs suggest that Ethereum & DeFi are a Match Made in Heaven, and both on their way to finding strong product/market fit.
So in this post, we’re doing a whirlwind tour of DeFi. We look at specific examples and use-cases already in the wild and seeing strong growth. And we pay close attention to protocols that Genesis Block is integrating with. Alright, let’s dive in.

Stablecoins

Stablecoins are exactly what they sound like: cryptocurrencies that are stable. They are not meant to be volatile (like Bitcoin). These assets attempt to peg their price to some external reference (eg. USD or Gold). A non-volatile crypto asset can be incredibly useful for things like merchant payments, cross-border transfers, or storing wealth — becoming your own bank but without the stress of constant price volatility.
There are major governments and central banks that are experimenting with or soon launching their own stablecoins like China with their digital yuan and the US Federal Reserve with their digital dollar. There are also major corporations working in this area like JP Morgan with their JPM Coin, and of course Facebook with their Libra Project.
Stablecoin activity has grown 800% in the last year, with $290B of transaction volume (funds moving on-chain).
The most popular USD-pegged stablecoins include:
  1. Tether ($10B): It’s especially popular in Asia. It’s backed by USD in a bank account. But given their lack of transparency and past controversies, they generally aren’t trusted as much in the West.
  2. USDC ($1B): This is the most reputable USD-backed stablecoin, at least in the West. It was created by Coinbase & Circle, both well-regarded crypto companies. They’ve been very open and transparent with their audits and bank records.
  3. DAI ($189M): This is backed by other crypto assets — not USD in a bank account. This was arguably the first true DeFi protocol. The big benefit is that it’s more decentralized — it’s not controlled by any single organization. The downside is that the assets backing it can be volatile crypto assets (though it has mechanisms in place to mitigate that risk).
Other notable USD-backed stablecoins include PAX, TrueUSD, Binance USD, and Gemini Dollar.
tablecoins are playing an increasingly important role in the world of DeFi. In a way, they serve as common pipes & bridges between the various protocols.
https://preview.redd.it/v9ki2qro12b51.png?width=700&format=png&auto=webp&s=dbf591b122fc4b3d83b381389145b88e2505b51d

Lending & Borrowing

Three of the top five DeFi protocols relate to lending & borrowing. These popular lending protocols look very similar to traditional money markets. Users who want to earn interest/yield can deposit (lend) their funds into a pool of liquidity. Because it behaves similarly to traditional money markets, their funds are not locked, they can withdraw at any time. It’s highly liquid.
Borrowers can tap into this pool of liquidity and take out loans. Interest rates depend on the utilization rate of the pool — how much of the deposits in the pool have already been borrowed. Supply & demand. Thus, interest rates are variable and borrowers can pay their loans back at any time.
So, who decides how much a borrower can take? What’s the process like? Are there credit checks? How is credit-worthiness determined?
These protocols are decentralized, borderless, permissionless. The people participating in these markets are from all over the world. There is no simple way to verify identity or check credit history. So none of that happens.
Credit-worthiness is determined simply by how much crypto collateral the borrower puts into the protocol. For example, if a user wants to borrow $5k of USDC, then they’ll need to deposit $10k of BTC or ETH. The exact amount of collateral depends on the rules of the protocol — usually the more liquid the collateral asset, the more borrowing power the user can receive.
The most prominent lending protocols include Compound, Aave, Maker, and Atomic Loans. Recently, Compound has seen meteoric growth with the introduction of their COMP token — a token used to incentivize and reward participants of the protocol. There’s almost $1B in outstanding debt in the Compound protocol. Mainframe is also working on an exciting protocol in this area and the latest iteration of their white paper should be coming out soon.
There is very little economic risk to these protocols because all loans are overcollateralized.
I repeat, all loans are overcollateralized. If the value of the collateral depreciates significantly due to price volatility, there are sophisticated liquidation systems to ensure the loan always gets paid back.
https://preview.redd.it/rru5fykv12b51.png?width=700&format=png&auto=webp&s=620679dd84fca098a042051c7e7e1697be8dd259

Investments

Buying, selling, and trading crypto assets is certainly one form of investing (though not for the faint of heart). But there are now DeFi protocols to facilitate making and managing traditional-style investments.
Through DeFi, you can invest in Gold. You can invest in stocks like Amazon and Apple. You can short Tesla. You can access the S&P 500. This is done through crypto-based synthetics — which gives users exposure to assets without needing to hold or own the underlying asset. This is all possible with protocols like UMA, Synthetix, or Market protocol.
Maybe your style of investing is more passive. With PoolTogether , you can participate in a no-loss lottery.
Maybe you’re an advanced trader and want to trade options or futures. You can do that with DeFi protocols like Convexity, Futureswap, and dYdX. Maybe you live on the wild side and trade on margin or leverage, you can do that with protocols like Fulcrum, Nuo, and DDEX. Or maybe you’re a degenerate gambler and want to bet against Trump in the upcoming election, you can do that on Augur.
And there are plenty of DeFi protocols to help with crypto investing. You could use Set Protocol if you need automated trading strategies. You could use Melonport if you’re an asset manager. You could use Balancer to automatically rebalance your portfolio.
With as little as $1, people all over the world can have access to the same investment opportunities and tools that used to be reserved for only the wealthy, or those lucky enough to be born in the right country.
You can start to imagine how services like Etrade, TD Ameritrade, Schwab, and even Robinhood could be massively disrupted by a crypto-native company that builds with these types of protocols at their foundation.
https://preview.redd.it/agco8msx12b51.png?width=700&format=png&auto=webp&s=3bbb595f9ecc84758d276dbf82bc5ddd9e329ff8

Insurance

As mentioned in our previous post, there are near-infinite applications one can build on Ethereum. As a result, sometimes the code doesn’t work as expected. Bugs get through, it breaks. We’re still early in our industry. The tools, frameworks, and best practices are all still being established. Things can go wrong.
Sometimes the application just gets in a weird or bad state where funds can’t be recovered — like with what happened with Parity where $280M got frozen (yes, I lost some money in that). Sometimes, there are hackers who discover a vulnerability in the code and maliciously steal funds — like how dForce lost $25M a few months ago, or how The DAO lost $50M a few years ago. And sometimes the system works as designed, but the economic model behind it is flawed, so a clever user takes advantage of the system— like what recently happened with Balancer where they lost $500k.
There are a lot of risks when interacting with smart contracts and decentralized applications — especially for ones that haven’t stood the test of time. This is why insurance is such an important development in DeFi.
Insurance will be an essential component in helping this technology reach the masses.
Two protocols that are leading the way on DeFi insurance are Nexus Mutual and Opyn. Though they are both still just getting started, many people are already using them. And we’re excited to start working with them at Genesis Block.
https://preview.redd.it/wf1xvq3z12b51.png?width=700&format=png&auto=webp&s=70db1e9587f57d0c470a4f9f4523c216929e1876

Exchanges & Liquidity

Decentralized Exchanges (DEX) were one of the first and most developed categories in DeFi. A DEX allows a user to easily exchange one crypto asset for another crypto asset — but without needing to sign up for an account, verify identity, etc. It’s all via decentralized protocols.
Within the first 5 months of 2020, the top 7 DEX already achieved the 2019 trading volume. That was $2.5B. DeFi is fueling a lot of this growth.
https://preview.redd.it/1dwvq4e022b51.png?width=700&format=png&auto=webp&s=97a3d756f60239cd147031eb95fc2a981db55943
There are many different flavors of DEX. Some of the early ones included 0x, IDEX, and EtherDelta — all of which had a traditional order book model where buyers are matched with sellers.
Another flavor is the pooled liquidity approach where the price is determined algorithmically based on how much liquidity there is and how much the user wants to buy. This is known as an AMM (Automated Market Maker) — Uniswap and Bancor were early leaders here. Though lately, Balancer has seen incredible growth due mostly to their strong incentives for participation — similar to Compound.
There are some DEXs that are more specialized — for example, Curve and mStable focus mostly only stablecoins. Because of the proliferation of these decentralized exchanges, there are now aggregators that combine and connect the liquidity of many sources. Those include Kyber, Totle, 1Inch, and Dex.ag.
These decentralized exchanges are becoming more and more connected to DeFi because they provide an opportunity for yield and earning interest.
Users can earn passive income by supplying liquidity to these markets. It usually comes in the form of sharing transaction fee revenue (Uniswap) or token rewards (Balancer).
https://preview.redd.it/wrug6lg222b51.png?width=700&format=png&auto=webp&s=9c47a3f2e01426ca87d84b92c1e914db39ff773f

Payments

As it relates to making payments, much of the world is still stuck on plastic cards. We’re grateful to partner with Visa and launch the Genesis Block debit card… but we still don’t believe that's the future of payments. We see that as an important bridge between the past (legacy finance) and the future (crypto).
Our first post in this series shared more on why legacy finance is broken. We talked about the countless unnecessary middle-men on every card swipe (merchant, acquiring bank, processor, card network, issuing bank). We talked about the slow settlement times.
The future of payments will be much better. Yes, it’ll be from a mobile phone and the user experience will be similar to ApplePay (NFC) or WePay (QR Code).
But more importantly, the underlying assets being moved/exchanged will all be crypto — digital, permissionless, and open source.
Someone making a payment at the grocery store check-out line will be able to open up Genesis Block, use contactless tech or scan a QR code, and instantly pay for their goods. All using crypto. Likely a stablecoin. Settlement will be instant. All the middlemen getting their pound of flesh will be disintermediated. The merchant can make more and the user can spend less. Blockchain FTW!
Now let’s talk about a few projects working in this area. The xDai Burner Wallet experience was incredible at the ETHDenver event a few years ago, but that speed came at the expense of full decentralization (can it be censored or shut down?). Of course, Facebook’s Libra wants to become the new standard for global payments, but many are afraid to give Facebook that much control (newsflash: it isn’t very decentralized).
Bitcoin is decentralized… but it’s slow and volatile. There are strong projects like Lightning Network (Zap example) that are still trying to make it happen. Projects like Connext and OmiseGo are trying to help bring payments to Ethereum. The Flexa project is leveraging the gift card rails, which is a nice hack to leverage existing pipes. And if ETH 2.0 is as fast as they say it will be, then the future of payments could just be a stablecoin like DAI (a token on Ethereum).
In a way, being able to spend crypto on daily expenses is the holy grail of use-cases. It’s still early. It hasn’t yet been solved. But once we achieve this, then we can ultimately and finally say goodbye to the legacy banking & finance world. Employees can be paid in crypto. Employees can spend in crypto. It changes everything.
Legacy finance is hanging on by a thread, and it’s this use-case that they are still clinging to. Once solved, DeFi domination will be complete.
https://preview.redd.it/svft1ce422b51.png?width=700&format=png&auto=webp&s=9a6afc9e9339a3fec29ee2ae743c07c3042ea4ce

Impact on Genesis Block

At Genesis Block, we’re excited to leverage these protocols and take this incredible technology to the world. Many of these protocols are already deeply integrated with our product. In fact, many are essential. The masses won’t know (or care about) what Tether, USDC, or DAI is. They think in dollars, euros, pounds and pesos. So while the user sees their local currency in the app, the underlying technology is all leveraging stablecoins. It’s all on “crypto rails.”
https://preview.redd.it/jajzttr622b51.png?width=700&format=png&auto=webp&s=fcf55cea1216a1d2fcc3bf327858b009965f9bf8
When users deposit assets into their Genesis Block account, they expect to earn interest. They expect that money to grow. We leverage many of these low-risk lending/exchange DeFi protocols. We lend into decentralized money markets like Compound — where all loans are overcollateralized. Or we supply liquidity to AMM exchanges like Balancer. This allows us to earn interest and generate yield for our depositors. We’re the experts so our users don’t need to be.
We haven’t yet integrated with any of the insurance or investment protocols — but we certainly plan on it. Our infrastructure is built with blockchain technology at the heart and our system is extensible — we’re ready to add assets and protocols when we feel they are ready, safe, secure, and stable. Many of these protocols are still in the experimental phase. It’s still early.
At Genesis Block we’re excited to continue to be at the frontlines of this incredible, innovative, technological revolution called DeFi.
---
None of these powerful DeFi protocols will be replacing Robinhood, SoFi, or Venmo anytime soon. They never will. They aren’t meant to! We’ve discussed this before, these are low-level protocols that need killer applications, like Genesis Block.
So now that we’ve gone a little deeper down the rabbit hole and we’ve done this whirlwind tour of DeFi, the natural next question is: why?
Why does any of it matter?
Most of these financial services that DeFi offers already exist in the real world. So why does it need to be on a blockchain? Why does it need to be decentralized? What new value is unlocked? Next post, we answer these important questions.
To look at more projects in DeFi, check out DeFi Prime, DeFi Pulse, or Consensys.
------
Other Ways to Consume Today's Episode:
Follow our social channels:https://genesisblock.com/follow/
Download the app. We're a digital bank that's powered by crypto:https://genesisblock.com/download
submitted by mickhagen to genesisblockhq [link] [comments]

"In a world that craves new safe assets, there may be a growing role for Bitcoin." - Paul Tudor Jones

Read the letter Paul Jones sent his investors here (PDF). He manages over $7B in funds. The entire letter is worth a read, but here's an interesting excerpt:
________
The most compelling argument for owning Bitcoin is the coming digitization of currency everywhere, accelerated by COVID-19. Bull markets are built on an ever-expanding universe of buyers. Central to the price of Bitcoin is how many more (or less) owners of Bitcoin will there be beyond the 60 million who currently own it? The probable introduction of Facebook’s Libra (whose value will be pegged to the US dollar and will not be a store of value in that sense) as well as China’s DCEP, also tied to the yuan, will make virtual digital wallets a commonplace tool for the world. It will make the understanding, utility, and ease of ownership of Bitcoin a much more commonplace option than it is today.
Owning Bitcoin is a great way to defend oneself against the GMI (The Great Monetary Inflation), given the current fact set. As Satoshi Nakamoto, the anonymous creator of Bitcoin, stated in an online forum around the time he launched Bitcoin, "the root problem with conventional currency is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust." I am not an advocate of Bitcoin ownership in isolation, but do recognize its potential in a period when we have the most unorthodox economic policies in modern history. So, we need to adapt our investment strategy. We have updated the Tudor BVI offering memoranda to disclose that we may trade Bitcoin futures for Tudor BVI. We have set the initial maximum exposure guideline for purchasing Bitcoin futures to a low single digit exposure percentage of Tudor BVI’s net assets, which seems prudent. We will review this exposure guideline regularly.
________
Regarding Paul Tudor Jones:
Investment philosophy
As reported in Market Wizards and the press, Jones futures trading style and beliefs are as follows:[24]
Jones's global macro trading style is based primarily on technical analysis, as opposed to value investing, with an emphasis momentum factors driving markets. In a 2000 interview, he suggested however he regretted not being more involved with venture investing in technology firms during the 1990s.
________
This is institutional money we're talking about, confirming Bitcoin as a financial asset and reassuring the theory presented by Plan B regarding Bitcoin Narratives:
  1. BTC “Proof of concept” (S2F 1.3 and market value $1M)
  2. BTC “Payments” (S2F 3.3 and market value $58M)
  3. BTC “E-Gold” (S2F 10.2 and market value $5.6B)
  4. BTC “Financial asset” (S2F 25.1 and market value $114B)
  5. ... ?
"The S2FX model offers a new way of thinking about BTC transitioning into the fifth phase."
_______
I expect plenty of your to completely dismiss this post, not read anything, and say 'but he's doing futures.' Yes, he'll be trading futures because we do, afterall, honor contracts in this country. This is in no way an invalidation of his strategy, so please refrain from mentioning this as an argument against whatever you want to argue about. Whether governments will come in and start regulating Bitcoin once it reaches a market cap to rival Gold's, well... that's a whole other topic for another post. Yes yes, not your keys, not your Bitcoin.
_______
I highly recommend you listen to Chris Cole from Artemis Capital talk about volatility as a long term hedge strategy: https://www.youtube.com/watch?v=ywelSxtcrKE
submitted by GoKone to Bitcoin [link] [comments]

A Brief History of BitCoin

A Brief History of BitCoin


What is Bitcoin? | How It Work?

A Brief History of BitCoin

The virtual currency was intended to develop peer-to-peer transactions; it doesn’t need a go-between, the exchange of private information, or transaction fees.

What is Bitcoin?

Bitcoin is virtual money or cryptocurrency, that’s measured by a decentralized network of operators and isn’t straight subject to the impulses of central banking decisions or national governments. There are hundreds of cryptocurrencies in lively use today, Bitcoin is through far the most general and widely used – the nearby cryptocurrency equal to traditional, state-minted coins.

How Bitcoin Works

Bitcoin is a cryptocurrency since it’s supported by source code that customs highly composite procedures to prevent illegal duplication or creation of Bitcoin elements. The code’s fundamental principles, known as cryptography, are based on innovative scientific and computer engineering values. It’s practically impossible to stop Bitcoin’s source code and operate the currency’s supply.
Though it was headed by other virtual coins, Bitcoin is identified as the first modern cryptocurrency. That’s since Bitcoin is the initial to blend some key structures shared by most after created cryptocurrencies.

User Anonymity

Intense privacy safeties are seared into Bitcoin’s source code. The method is intended to openly record Bitcoin dealings and other related data without revealing the individuality of the groups involved. As a substitute, Bitcoin users are recognized by public keys or numerical codes that find them to additional users, and occasionally pseudonymous handles or usernames.

Bitcoin Exchanges

Bitcoin exchanges permit users to change Bitcoin parts for authorization currencies, such as the U.S. dollar and euro, at flexible exchange charges. Many Bitcoin relations also exchange Bitcoin components for other cryptocurrencies, with less popular substitutes that can’t straight be replaced for fiat coins. Most Bitcoin exchanges take a cut, naturally less than 1%, of each deal’s value.
Bitcoin exchanges certify that the Bitcoin market leftovers liquid, set their value qualified to traditional money – and allowing pouches to profit from the assumption on variations in that value.

BlockChain

Bitcoin’s blockchain is dynamic to its function. The blockchain is a public, spread record of all prior Bitcoin communications, which are kept in collections known as blocks. Each node of Bitcoin’s network – the server farms and positions, run by individuals or sets known as miners, whose hard work to produce new Bitcoin elements product in the recording and verification of Bitcoin dealings, and the episodic creation of new blocks – holds an identical record of Bitcoin’s blockchain.
Private Keys
Every Bitcoin handler has at smallest one private key, which is an entire number between 1 and 78 numbers in length. Separate users can have many unnamed handles, each with its private key. Private keys approve their owners’ characters and permit them to occupy or receive Bitcoin. Without them, handlers can’t whole transactions – they can’t access their properties until they improve the matching key. When a key is misplaced for good, the matching holdings change into a sort of everlasting limbo and can’t be improved.

Wallets

Real Bitcoin units are kept in “wallets” – secure cloud storing locations with superior information approving their owners (Bitcoin users) as the protectors of the Bitcoin units controlled within. However wallets like Coinbase, in theory, defend against the stealing of Bitcoin elements that aren’t currently being used, they’re exposed to hacking – mainly public wallets used by Bitcoin connections, online marketplaces, and specific websites that occur exclusively to store Bitcoin wallets known as “wallet services.”
Miners
Miners play an important role in the Bitcoin environment. As guards of the blockchain, they save the entire Bitcoin community truthful and indirectly provide the currency’s value. Miners are entities or cooperative governments with access to influential computers, often kept at remote, secretly owned “farms.” They do incredibly complex scientific tasks to new Bitcoin, which they then keep or change for fiat currency.

Modes of Bitcoin

  • Theft Private Keys.
  • Misusing Wallet Vulnerabilities
  • Functioning Fraudulent Exchanges and Savings Funds.
  • Attacking Authentic Exchanges Directly.
  • Aggressive Dark Web Marketplaces.

How to Get Bitcoin

There are three key ways people get Bitcoins.
  • You can purchase Bitcoins using ‘real’ money.
  • You can retail things and let persons pay with Bitcoins.
  • Developed using a computer.

Advantages of Using Bitcoin

  • Better Fluidity Comparative to Other currencies
  • Increasing the payment method
  • Worldwide Transactions Easier Than Even Currencies
  • Usually Lower Transaction Charges
  • Secrecy and Privacy Relative to Old Currencies
  • Individuality from Politically aware Agents and Creators
  • In-built Shortage

Disadvantages of Using Bitcoin

  • Exposure to Bitcoin-specific Tricks and Fraud
  • Black Market Motion May Damage Repute and Usefulness
  • Vulnerable to High Price Instability
  • No Chargebacks or Repayments
  • Possible to Be Replaced by Greater Cryptocurrency
  • Environmental Ills of Bitcoin Mining
submitted by Satawareus to u/Satawareus [link] [comments]

The Blackmail Email Scam (part 4)

THIS THREAD IS NOW ARCHIVED, THE LATEST THREAD CAN BE FOUND HERE: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

TEXT, PHONE CALL, AND PHYSICAL MAIL VARIANTS ARE COVERED IN THE LATEST THREAD.

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

FIRST THREAD: https://www.reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://www.reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/###

THIRD THREAD: https://old.reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. In al cases, the threats are lies and you do not have anything to worry about. In many cases, the emails will contain information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
Your computer device was attacked by the malicious app . Whats the trouble? I placed my malicious agent on a erotica portal, you clicked on this data and promptly adjusted the malware to your computer . The hostile program made your selfie-camera shooting and I enjoy the videotape with you dash your doodle. In next 5 hours this hostile program copied all your contacts. Right now, I receive your all your contact information and video with you masturbating, and now if you wish me to destroy all the data affect payment 350 $USD in BTC digital currency. Other way I want forward that this record to all your contacts . I forward you my Bitcoin wallet - XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You possess 27 hours after reading. In a case if I possess transaction I am going to undo that this record once for all. I beg pardon for my mistakes- I live in China . P.S. this postal address, I have thieved it
Good day,
If you had been more careful while caressing yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all your colleagues, relatives and friends get a video recording of it - it is definitely bad for you.
I placed malicious software on a website for adults (with porn) which was visited by you. When the target taps on a play button, your device starts recording the screen and all cameras on your device begin to work.
Moreover, my program allows a remote desktop connection with keylogger function from the device, so I could collect all contacts from your e-mail, messengers and other social networks. I'm writing on this e-mail cuz it's your working address, so you must check it.
I suppose that three hundred twenty usd is good enough for this little misstep. I made a split screen video (recorded from your screen (u have interesting tastes ) and camera ooooooh... its awful AF)
So it's your choice. If you want me to erase this compromising evidence, use my Bitcoin wallet address: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX You have one day after opening my message; I put a special tracking pixel in it, so when you will open it I will see. If you want me to show you the proofs, reply to this message and I will send my creation to five contacts that I got from your contacts.
P.S. You can try to complain to the police, but I don't think that they can help, the investigation will last for 5 month- I'm from Ukraine - so I dgf lmao
Hey there
So I am the hacker who cracked your email address and device a few weeks back.
You typed in your pwd on one of the sites you visited, and I intercepted that.
Here is your password from (redacted) upon time of compromise: (redacted)
Obviously you can can change it, or even already changed it.
However it won't really matter, my malware modified it every time.
Do not really try to contact me personally or find me.
Via your email, I uploaded harmful code to your Operation System.
I saved your entire contacts together with buddies, fellow workers, loved ones along with a entire history of visits to the World wide web resources.
Also I set up a Virus on your system.
You aren't my only target, I generally lock computers and ask for a ransom.
But I was hit by the web pages of romantic material that you normally stop by.
I am in shock of your own fantasies! I have never ever noticed anything at all like this!
Consequently, when you had enjoyment on piquant web-sites (you know what I am talking about!) I made screenshot with utilizing my program from your camera of yours device.
There after, I put together them to the content of the currently viewed site.
There will certainly be giggling when I send these pics to your connections!
Nevertheless I am certain you do not need this.
Therefore, I expect to have payment from you for my silence.
I feel $859 is an satisfactory price for this!
Pay with Bitcoin.
My Bitcoin wallet is xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you do not really understand how to do this - submit in to Google 'how to transfer money to the bitcoin wallet'. It is easy.
Immediately after getting the given amount, all your files will be right away destroyed automatically. My computer virus will also get rid of itself through your operating-system.
My Trojan viruses have auto alert, so I know when this specific e mail is read.
I give you 2 days (48 hours) to make a payment.
If this does not occur - just about all your associates will get outrageous pictures from your darkish secret life and your system will be blocked as well after two days.
Do not end up being foolish!
Police or buddies won't support you for sure ...
P.S I can provide you with recommendation for the future. Do not type in your security passwords on risky web pages.
I wish for your wisdom.
Bon voyage.
I Have YOUR code. I rule phone xxxx
I SENT this newsletter from YOUR ACCOUNT.
I look your device.
I am in daze of your sex act fantasies!
I made backup your contacts and files. I made screenshots from your digital camera of yours device.
I want 888 $ to my (Bitcoin
My )Bitcoin currency
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If YOU don't transaction )Bitcoin. I share my quake of your golden age of porn fantasies with your contacts!
If you do not know how to do this - enter into Google/
=how to transfer money to a Bitcoin& wallet-
Time 30 hours.
This excellent post as Subway & Dairy Queen.
Hello!
I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it.
Of course you can will change your password, or already made it. But it doesn't matter, my rat software update it every time.
Please don't try to contact me or find me, it is impossible, since I sent you an email from your email account.
Through your e-mail, I uploaded malicious code to your Operation System. I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources. Also I installed a rat software on your device and long tome spying for you.
You are not my only victim, I usually lock devices and ask for a ransom. But I was struck by the sites of intimate content that you very often visit.
I am in shock of your reach fantasies! Wow! I've never seen anything like this! I did not even know that SUCH content could be so exciting!
So, when you had fun on intime sites (you know what I mean!) I made screenshot with using my program from your camera of yours device. After that, I jointed them to the content of the currently viewed site.
Will be funny when I send these photos to your contacts! And if your relatives see it? BUT I'm sure you don't want it. I definitely would not want to ...
I will not do this if you pay me a little amount. I think $877 is a nice price for it!
I accept only Bitcoins. My BTC wallet: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
If you have difficulty with this - Ask Google "how to make a payment on a bitcoin wallet". It's easy. After receiving the above amount, all your data will be immediately removed automatically. My virus will also will be destroy itself from your operating system.
My Trojan have auto alert, after this email is looked, I will be know it!
You have 2 days (48 hours) for make a payment. If this does not happen - all your contacts will get crazy shots with your dirty life! And so that you do not obstruct me, your device will be locked (also after 48 hours)
Do not take this frivolously! This is the last warning! Various security services or antiviruses won't help you for sure (I have already collected all your data).
Here are the recommendations of a professional: Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!
I hope you will be prudent. Bye.
Same as before but they increased the amount
I got an order from someone to kill you and your family
but I am far from your house
if you still love your family, I ask you to transfer 0.1 BTC to me.
If you report this email, I will immediately kill your family.
FORWARD THIS MAIL TO WHOEVER IS IMPORTANT IN YOUR COMPANY AND CAN MAKE DECISION!
We Hacked network. We Caught Communications. We Backuped DATA And DOCUMENTS. We send this mail to you in YOUR account.
After analyzing documents. We found Illegal activity - HIDING TAXES.
That we want?
I want two (2) Bitcoin To wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
That we do if you don't pay bitcoin?
We send these Documents and Proofs to your Tax Department.
And in this time Your network will be DDoS. Read that in this link https://en.wikipedia.org/wiki/Denial-of-service\_attack
We are locking your operation system. Our friends, WannaCry, ready start and waiting command. Read that in this link https://en.wikipedia.org/wiki/WannaCry\_ransomware\_attack
This is our guarantee, that you don't clean evidence and building a protection policy.
If you don't pay by in 7 days, attack will start.
Attack including.
1.DDOS 2.Locking operation system 3.Sending all documents in Tax Departament
Yours service going down permanently and price to stop will increase to Four (4) BTC, Price will go up one (1) BTC for every day of the attack.
This is not a joke.
Our attacks are extremely powerful - sometimes over 1 Tbps per second. And we pass CloudFlare and others remote protections! So, no cheap protection will help.
Prevent this problem all with just Two (2) BTC Pay to our wallet Bitcoin. 1Dz7DbQmE7SNm3C5mb9syPcctgZECcCEbL
AND YOU WILL NEVER AGAIN HEAR FROM US!
If you read, hear fake-experts and assure yourself that this is not true. Remember that they are not responsible and your life don't important him. Their business is to speak and make money. Your business to do and make money and stay freedom.
All mistakes in text we do specily.
Bitcoin is anonymous, nobody will ever know you cooperated.
Time started after open this mail. To track the reading of a message and the actions in it, I use the facebook pixel. Read that in this link
Hello!
I am a hacker who has access to your operating system.
I also have full access to your account.
I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this,
transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin").
My bitcoin address (BTC Wallet) is: x
After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Best regards.
Hey, I know your password is:
Your computer was infected with my malware, RAT (Remote Administration Tool), your browser wasn't updated / patched, in such case it's enough to just visit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".
My malware gave me full access and control over your computer, meaning, I got access to all your accounts (see password above) and I can see everything on your screen, turn on your camera or microphone and you won't even notice about it.
I collected all your private data and I was spying on you, I RECORDED (through your webcam) embarrassing moments of you, you know what I mean!
After that I removed my malware to not leave any traces.
I can publish all your private data everywhere and I can send the videos to all your contacts, post it on social network, publish it on the whole web, including the darknet, where the sick people are!
Only you can prevent me from doing this and only I can help you out in this situation.
Transfer exactly 1200$ with the current bitcoin (BTC) price to my bitcoin address.
It's a very good offer, compared to all that horrible shit that will happen if I publish everything!
You can easily buy bitcoin here: www.paxful.com , www.coingate.com , www.coinbase.com , or check for bitcoin ATM near you, or Google for other exchanger. You can send the bitcoin directly to my address, or create your own wallet first here: www.login.blockchain.com/en/#/signup/ , then receive and send to mine.
My bitcoin address is:
Copy and paste my address, it's (cAsE-sEnSEtiVE)
I give you 3 days time to transfer the bitcoin!
As I got access to this email account, I will know if this email has already been read. If you get this email multiple times, it's to make sure you read it and after payment you can ignore it. After receiving the payment, I will remove everything and you can life your live in peace like before.
Next time update your browser before browsing the web!
НЕLLО!
I’m going to cut to thе chӓsе.I know ӓbout thе sеcrеt you ӓrе kееping from your wifе.Morе importӓntly,I hӓvе еvidеncе of whӓt you hӓvе bееn hiding.I won’t go into thе spеcifics hеrе in cӓsе your wifе intеrcеpts this,but you know whӓt I ӓm tӓlking ӓbout.
You don’t know mе pеrsonӓlly ӓnd nobody hirеd mе to look into you.Nor did I go out looking to burn you.It’s just your bӓd luck thӓt I stumblеd ӓcross your misӓdvеnturеs whilе.I thеn put in morе timе thӓn I probӓbly should hӓvе looking into your lifе.Frӓnkly,I ӓm rеӓdy to forgеt ӓll ӓbout you ӓnd lеt you gеt on with your lifе.And I ӓm going to givе you two options thӓt will ӓccomplish thӓt vеry thing.Thosе two options ӓrе to еithеr ignorе this lеttеr,or simply pӓy mе $822.Lеt’s еxӓminе thosе two options in morе dеtӓil.
Option 1 is to ignorе this lеttеr.Lеt mе tеll you whӓt will hӓppеn if you chosе this pӓth.I will tӓkе this еvidеncе ӓnd sеnd it to your wifе. And ӓs insurӓncе ӓgӓinst you intеrcеpting it bеforе your wifе gеts it,I will ӓlso sеnd copiеs to hеr friеnds ӓnd fӓmily.So,Evеn if you dеcidе to comе clеӓn with your wifе,it won’t protеct hеr from thе humiliӓtion shе will fееl whеn hеr friеnds ӓnd fӓmily find out your sordid dеtӓils from mе.
Option 2 is to pӓy mе $822.Wе’ll cӓll this my ‘confidеntiӓlity fее.’Now lеt mе tеll you whӓt hӓppеns if you choosе this pӓth.Your sеcrеt rеmӓins your sеcrеt.You go on with your lifе ӓs though nonе of this еvеr hӓppеnеd.Though you mӓy wӓnt to do ӓ bеttеr job ӓt kееping your misdееds sеcrеt in thе futurе.
At this point you mӓy bе thinking,‘I’ll just go to thе cops.’Which is why I hӓvе tӓkеn stеps to еnsurе this lеttеr cӓnnot bе trӓcеd bӓck to mе.So thӓt won’t hеlp,ӓnd it won’t stop thе еvidеncе from dеstroying your lifе.I’m not looking to brеӓk your bӓnk.I just wӓnt to bе compеnsӓtеd for thе timе I put into invеstigӓting you. $822 will closе thе books on thӓt.
Lеt’s ӓssumе you hӓvе dеcidеd to mӓkе ӓll this go ӓwӓy ӓnd pӓy mе thе confidеntiӓlity fее.In kееping with my strӓtеgy to not go to jӓil,wе will not mееt in pеrson ӓnd thеrе will bе no physicӓl еxchӓngе of cӓsh.You will pӓy mе ӓnonymously using bitcoin.If you wӓnt to kееp your sеcrеt thеn sеnd $822 in bitcoin to thе Rеcеiving Bitcoin Addrеss listеd bеlow.Pӓymеnt must bе rеcеivеd within 1 dӓys of thе post.
You should mӓkе ӓ trӓnsӓction of using bitcoins (cryptocurrеnsy): x
[Bitcoin dеtӓils]
Tеll no onе whӓt you will bе using thе bitcoin for or thеy mӓy not givе it to you.Thе procеdurе to obtӓin bitcoin cӓn tӓkе ӓ dӓy or two so do not put it off.Agӓin pӓymеnt must bе rеcеivеd within 1 dӓys of this lеttеr’s post mӓrkеd dӓtе.If I don’t rеcеivе thе bitcoin by thе dеӓdlinе,I will go ӓhеӓd ӓnd rеlеӓsе thе еvidеncе to еvеryonе.If you go thӓt routе,thеn thе lеӓst you could do is tеll your wifе so shе cӓn comе up with ӓn еxcusе to prеpӓrе hеr friеnds ӓnd fӓmily bеforе thеy find out.Thе clock is ticking.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material"
submitted by EugeneBYMCMB to Scams [link] [comments]

Bitcoin Historical prices

Hello guys , do you know if there are trace about the price of bitcoin before the age of exchanges ?
I know the first public price is that On May 17, 2010.
Wikipedia gives some prices, but it strangely has few of
sources https://en.wikipedia.org/wiki/History_of_bitcoin
submitted by MiraiKonan to Bitcoin [link] [comments]

On Netscape Moments and the Journey to Hawaii

Disclaimer: I'm an online rando, not a licensed financial advisor. DYODD. This is an update to a post from six months ago.
The mood feels frothier than it's been for some time.
Our community has been buoyed by a maelstrom of DeFi activity, progress on Ethereum's economic policies, a path to 2.0 which seems less meandering than ever before and, let's not be shy about this, a few weeks of solidly green cucumbers.
It's lovely, overdue & well-deserved.
Between the memes & generally festive dailies, I like to hit pause, zoom out and offer some reflections on where un-permissioned blockchain--and Ethereum, as the most successful to date implementation thereof--is.
The web took a long time to grow up.
1980 through 1990: Invention, experimentation & backbone. MUDs & BBSs dominated. In 1990, a version of HTML that can be approximately called "usable" becomes available.
1990 through 1994: Early adoption, basic protocols & functionality. The first real web browser, Mosaic, launches. Significant web presence from universities, research institutions and large media entities or businesses. "Online for dummies" portals like AOL, Compuserve & Prodigy become common-place. Bryant Gumbel's infamous "What is Internet, anyway" moment turns out to be a seminal point of inflection for popular perception of web use & the utility of being online.
1994 through 1998: Consolidation, increased adoption, commercialization, disruption. Home & workplace use, ISPs & online purchases all show exponential growth. People joke around water coolers about using AOL trial CDs as coasters. Netscape makes web browsing more intuitive & integrates protocols (http, ftp, gopher, usenet, smtp/pop) into a single program, removing most of the friction involved in casual daily use. "You've got mail" segues from niche nerd activity into pop culture phenom. Edge technologies like peer-to-peer sharing become existential threats to decade-old business models, with significant legal and political implications. Online presence becomes mandatory for most businesses. Future giants like Google, Amazon & Ebay/PayPal explore & expand new ways of monetizing online space.
1998 through 2003: Commoditization, dot.com boom & bust cycle. Large proliferation of risky or poorly thought-out ventures, violent subsequent contraction. Pets.com happens a thousand times over. Teens begin to tune into proto-social media: Friendster, Hotornot, ICQ/Aim, Myspace, Xanga. Popular culture becomes permeated by all things Internet, with signs of exhaustion due to overexposure. Through peaks & valleys, Fortune 100 players, old & new, scramble to firm up their respective beach-heads into cyberspace, praise be upon our once & future prophet, William Gibson.
2003 through 2007: Ubiquity. Internet is now an inextricable part of the desktop experience. Venture capital is in a perpetual arms race to fund "Web 2.0," a more accessible, secure & well-integrated way of experiencing online activity. Network advantages displace also-rans, with Google, Amazon and Facebook increasingly dominating "mind-share." Internationally, online conglomerates graduate into billion-dollar businesses. New business models crop up online. YouTube, 4chan, SomethingAwful, DeviantArt, Tumblr are now foundational growing up experiences for millions of teens.
2007 through present: Ubiquity, cubed. Internet becomes hyper-accessible & necessary to key aspects of contemporary life. Law, medicine, finance and governance become dependent, to a large degree, on online activity. With smart phones available for price points below $30, a significant majority of human beings on the planet can interact with the most powerful & immediate way of accessing information we've ever built on a mass scale. Content consumption and creation explodes. Instant messaging, video-conferencing, geo-location sevices & flexible payment models become trivial aspects of every-day life.
That's three decades for the Internet & its main interface, the web, to reach maturity.
Blockchain was initially parameterized in 1991.
Bitcoin began in 2008.
Ethereum was proposed in 2013.
If we compare blockchain in general & Ethereum in particular to the development and eventual domination of the Internet, we're barely making headway through the second phase: early adoption, basic protocols & functionality.
My first point:
It's early on in the journey.
In some ways, blockchain & Ethereum are like the Internet, in that they represent transformative technologies.
In some ways, blockchain & Ethereum are unlike the Internet.
Thin protocols like http, ftp, email, etc, move data around. Value is captured by entities which acquire data and transact it: Google, Amazon, Ebay, Microsoft, Facebook, Twitter.
Fat protocols like blockchains both move data around AND store it. Value is captured in the protocol itself.
My second point:
Based on objective data such as network use and development activity, Ethereum is the clear front-runner when it comes to public, un-permissioned blockchains.
We remain in the "overestimating early adoption/change" phase of blockchain & cyrpto-currency. Multiple projects in the top 25 by marketcap metric are of dubious technical & financial value. Some exchanges engage in market-distorting practices. Fraudulent "personalities" in the space still command significant attention. There's material risk to involvement in the early stages of any venture, blockchain & Ethereum included.
But: The flip to "overestimating early adoption/change" is "underestimating long term adoption/change."
And here is where I'd like to draw attention to the title of this post:
Netscape moments.
  • On the browser side, Brave has removed most of the complexity in privacy and blockchain-based, fairly distributed incentives. The growth is astounding & shows no sign of relenting. When Bill Burr does ad reads, it's safe to say that we're no longer looking at an obscure or arcane product.
  • On the wallet side, Argent has abstracted, as ethical-trade well put it,"most of the complexity that currently slows down onboarding on Ethereum and defi." Early response seems to have been overwhelming.
Netscape represented a dramatic turning point in Internet & web growth precisely because it consolidated and simplified a large number of complex and powerful technologies.
My third point:
We could be witnessing a number of similar flash-points which will be in retrospect acknowledged as fundamental pivots to parabolic growth--and they're happening on Ethereum.
A summary:
  • It's early on in the journey.
  • Based on objective data such as network use and development activity, Ethereum is the run-away front-runner when it comes to public, un-permissioned blockchains.
  • We seem to be witnessing parabolic growth "Netscape moments," and they're happening on Ethereum.
If 2020 is to crypto what 1994 was to the Internet, we can barely imagine the degree to which the world will run on blockchain in 2030.
If you're reading this, you're part of the 0.001% smart or lucky enough to understand what future is being built on, the same way that my father knew how the Internet will shape these last three decades.
You have a one-in-a-lifetime opportunity. Things like the BTC/ETH ratio & 35% fiat valuation drops or rises represent trivial noise in a broader landscape defined by tectonic realignments in technology, finance and politics.
I have a single question on those who have read this far:
On what kind of a time scale are you a bull on, and what are you doing about it?
I know what my answer is.
I wish all of you, /ethfinance brothers & sisters, good fortune and good health through the promise of these beautiful days to come.
submitted by thrw2534122019 to ethfinance [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

BITCOIN Price Movement 2009 to 2017 Bitcoin Price Prediction 2020 The WORST price prediction in Bitcoin history! bitcoin historical price action is pure art 2x speed Bitcoin Price History 2010 to 2020 Hindi

Bitcoin was the first cryptocurrency to successfully record transactions on a secure, decentralized blockchain-based network. Launched in early 2009 by its pseudonymous creator Satoshi Nakamoto Bitcoin Historical Price Chart Tuesday, 21 July 2020. Bitcoin halving 2020 btc mining block bitcoin historical price chart history of bitcoin wikipedia bitcoin price history chart 2009 2018 1 simple bitcoin price history chart. Bitcoin history. Bitcoin is the first example of decentralized digital money established in 2008 by a person or a group of people under the pseudonym of Satoshi Nakamoto. This account of bitcoin history resumes the first ten-years (2008 - 2019) of the cryptocurrency. Bitcoin price since 2009 to 2019. Bitcoin price charts. Bitcoin BTC price graph info 24 hours, 7 day, 1 month, 3 month, 6 month, 1 year. Prices denoted in BTC, USD, EUR, CNY, RUR, GBP. History of Bitcoin cryptocurrency.Bitcoin is a decentralized cryptocurrency created in 2008 by the pseudonymous Satoshi Nakamoto.This account resumes the whole history of Bitcoin since 2008 to 2017 and 2018.. On 18 August 2008, the domain name bitcoin.org was registered.. Later that year on October 31st, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic

[index] [25485] [6802] [13633] [2099] [29185] [25940] [30656] [7795] [14212] [12164]

BITCOIN Price Movement 2009 to 2017

Bitcoin first launched on bitcoin.com exchange on February 6, 2010 at the price of $0.003. Bitcoin price has seen many ups and down during the period of 10 years. This video is about 10 years ... The Bitcoin Chart That Has Been Telling The Future! #Btc #BCH #Ltc - Duration: 6:01. MacMac007 Cali 1,048 views Bitcoin Price History - Crypthony Coin 2012 = $10 2016 = $1000 2017, 2018, 2019 = $20000 - $10000 2020 = $10000 ++ If you buy 100 Bitcoin in 2012 for $1000, and you sell it today 2020, you will ... Short Bitcoin at $447.49 May 25 ,2016 Price goes up 45x in 19 months.to $20,000 Dec 17,2017 http://HEX.win Claim free HEX tokens! Get rich in 2020! The crypt... This is a simple explanation of the bitcoin halving event that will happen in May of 2020. ♦ Receive $10 of FREE BITCOIN when you use this link to sign up for Coinbase and invest $100 - https ...

Flag Counter