How to Fix: Hackers Hacked My Phone, Demand Bitcoin (Scam ...

DV/ABUSIVE COURT There's more to this Nightmare

their father worked for the local internet company decided to spy on me admitted it openly don't have perfect evidence of that at the moment either because I lost the online accounts it was saved on or impossible to connect to any printers. He later quit internet company and work for the electric company then Microsoft . Once he spied on me long enough he felt he had evidence and dirt on me enough to raise my child support to a very unreasonable amount when I already paid 100% for the children and paid a good amount of child support every month and had them 40% of the time . I could not afford to pay it he decided to kidnap my younger one during the times that I would have always have her. My children have been going through the domestic violence an abuse their entire life. the day of the trial hearing, I had denial of service attack. where I could not get Wi-Fi nor data on mobile. that I have always paid for. Which made it so my alarm did not go off and I was late for trail. yes the guardian of alliance said the children would be super with me if I was more stable. which was because online it says I have about 10 more addresses than I actually lived at. She said the kids were not safe with him and his wife. my son 17 yrs, went in courts filed for two restraining orders & provided proof of physical abuse and he was deneyed the judge did not seem to feel as if it was abuse . One day I received a call from my children's father. I was hoping you wanted to discuss the children but all I could hear on the other end Were sounds of computers, similar to a fax machine. Shortly after that I lost all my online accounts had a brute Force attack. My last pass and keeper did not help me either because I couldn't reach them or because they chose not to help. I noticed the last time I was able to access my passwords some of my accounts were changed to my social security number. Which I would never do. So my identity any form of privacy,all my work art an memories gone. my whole digital Life. My son who is in high school lost a lot of his hard work and the Mac, I recently purchased for. I could not access our router majority of the time. while my internet company where he used to work, lied to me and said there's no such thing as a network hack and we're not willing to help. I could not use our cellular data or Wi-Fi on my electronics but majority of the family still could use the internet on some of their mobile devices. I was panicking trying to reach my customers the company that I subcontracted for but unfortunately I was redirected to spammers. I ended up using all of our financial savings to pay rent and buy more mobile devices a new computer and any type of internet security I could possibly fine in a very small town. I could not buy anything else online I had too many online fraud charges that I was continuously fighting. I could not use the vpns I always would get a sever error and my antiviruses somehow were rerouted and I would continuously be locked out. Majority of the new electronics I bought would be compromised and controlled within minutes to a day or two, thanks to the Internet of things. My family can't even reach out for help with their hack devices services with the same local internet company. They are constantly being overcharged slow connection and additional charges like voice over IP . I've purchased at least 10 phones in the last year. My cell phone companies either have no clue or ignored me or treatme as If I was a terrorist, who was just begging to get help controling my data and my children's baby photos. I've gone through over a hundred emails since I kept losing access to them even though I had the password written down. I had DNS poisoning so majority of the websites. I still am I can't even get court forms sometimes server cant find & I can't seem to talk to a lawyer that I've been approved for multiple times through the Northwest Justice project. for my mobile phone will consistently hang up. I can't call the non emergency 911. My emails don't go through or are blocked. Many websites I visit seem to be cloned in insecure. JavaScript would not give me access to majority of the security settings in all my browsers. There is always new extensions and apps and open source license for untrustworthy certificate and cant reach the same security settings in my browsers. I cannot turn on or off like family sharing when I don't even have a family connected to that mobile device. Can't turn off USB tethering and Google pay and apple wallets has multiple transactions not by me. cannot turn them off or use them. for they are lightened out or I don't have access. Sim card & ip always changed. 5000 $ in extra international charges hit my credit report along with new numbers emails and new addresses. Cant reach for help when device have so much static and lose connection. If I try to connect my email account to a computer. It will say I need a physical key to access it. as if I set it up myself. when every computer I own now Is broke or has locked me out. I gave up but was sad for I could not keep tabs or communicate with my children. unless I borrowed a phone. They mapped out my family and contacts so if I were to borrow a phone and try to reach out for help I usually reached spam or foreign hotline or got disconnected. Then the locals were acting strange. Like sitting outside our house taking photos of us &things were stolen of property. When we were out of town. then the landlord had strange men over pretending to fix things that didn't need to be fixed installing pipes underground , laying down new soil& having some Wi-Fi farming company working in our yard 5:00 a.m. I also notice a few times the electric companies employees were messing with our power boxes, in the middle of the night . Then My photos came out extremely bright. the family videos look like we lived in a microwave oven. I know it's very strange! I do have evidence. If I would get a new router my children's father would come over take the children and their phones from them and install something on their device saying that he had to change the password on their Netflix account, so he needed to use their phone. When I would purposely break the router the electric company would show up before the internet cable company and be across the street fixing power lines. bought the children new phones and then he puts another restraining order on me and the children saying that I stole my daughters phone and won't allow her to use it. when she didn't want to use it for some reason she has on 5 gb and ends up with no data within a couple days and has to use Wi-Fi all the time. Apple finally told me they couldn't help me with iphone for it was a government issue. I thought that was hilarious for I didn't do anything wrong unless the person who was using my accounts did. I figured it would pass I mean if you're under an investigation. it would only be for a few months right ? Not two years ! well nothing happened I mean there was no reason for anything to happen. I did notice that police were driving by the house a lot. Then I thought maybe it must have been my roommate they might be after. Then why am I the one who lost everything and dealing with network abuse. My roommate was in a bad guy he did have a bit of a criminal history but nothing considered to be violent maybe just a couple drunken stupid events. Then during the process of moving my children and roommates out of the house.while drivin my car mysteriously blew up because of some electrical issue. Luckily the children were not in the car. There were no warnings & no issues with car. It took the fire department about two minutes find me but it was totaled. I could not afford to fix it or have a mechanic look at that time . Then somebody I did not no had it towed and I lost it. I was in the router that I can't get into majority of the time and saw a port forwarding to a local Bitcoin mining pool. Then it I received another server error . He continues to harass me and threaten me or he knows everything we do in our own privacy our own bedrooms where we're going who we're going with how much money says he's recording everything it seems to know everything before I can even share it with a girlfriend. He's throwing everything against me in The family Court and continues to commit perjury while I have proved him wrong multiple times but still aren't getting the protection and respect in this local small town courtroom I have currently moved to Spokane Washington to get away from it I do the traveling for the judge is now took my daughter from coming to Spokane Washington and requiring me to stay with my children at my parents home. When they are almost fully grown she is going to be 15 soon she should have a choice to bpick who she feel safe enough to live with. without him constantly tracking and destroying every electronic I have after calling my daughter then receive Non-Stop spam and scripts over SMS and once I go to my parents more and more viruses are downloaded. I've been told multiple times by a few computer companies and files that I have some sort of invisible beacon. How ? Seattle times has reported that the local electric company and crypto miners are being questioned for unauthorized usage of other families in the small town electricity for maximum power leaving us in a unsafe situation to build more cryptocurrency . Please I appreciate Any help and advice!
submitted by u-turnshe to FamilyLaw [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads:
Blackmail email scam thread:
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.


Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Cartel scam
You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
Craigslist Carfax/vehicle history scam
You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it.
Double dip/recovery scammers
This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam part 5:
PSA: you did not win a giftcard:
Sugar scams
Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on.
Google Hangouts
Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution.
Publishers Clearing House scams
PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH.
Pet scams
You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example)
If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down.
Thanks to djscsi for this entry.
Fake shipping company scams
These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible.
Chinese Upwork scam
Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people.
Quickbooks invoice scam
This is a fake check style scam that takes advantage of Quickbooks.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Digit wallet scam
A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

General resources

Site to report scams in the United Kingdom:
Site to report scams in the United States:
Site to report scams in Canada:
Site to report scams in Europe:
FTC scam alerts:
Microsoft's anti-scam guide:
submitted by EugeneBYMCMB to Scams [link] [comments]

I earned about 4000% more btc with my android tablet than with a $250 ASIC mini rig setup using GekkoScience Newpac USB miners!

1.) Android Device with access to Google Play Store. *I haven't tried yet but you may be able to use tis on Android TV devces as well by sideloading. If anyone has success before I try, let me know! -Note, I did this with a Samsung Galaxy Tab S6 so its a newer more powerful device. If your android is older, your profts will most likely be less than what I earned but to give a projected range I also tested on my Raspberry Pi 4 running a custom LineageOS rom that doesn't allow the OS to make full use of the Pi's specs and I still got 500 h/s on that with Cloud boost, so about 60% of what my Tab 6 with MUCH Higher Specs does.
**Hey guys. Before I get started i just wanted to be clear about one thing. Yes I have seen those scammy posts sharing "miracle" boosts and fixes. I have a hard time believing stuff online anymore. But this is honestly real. Ill attach photos and explain the whole story and process below. Thanks for taking the time to read and feel free to share any thoughts, concerns, tips, etc*
So last week I finally got started with my first mini rig type mining build. I started getting into crypto about a year ago and it has taken me a long time to even grasp half of the projects out there but its been fun thus far! Anyways my rig was 2 GekkoScience Newpac USB miners, a Moonlander USB miner to pair with an FPGA i already had mining, a 10 port 60W 3.0 USB hub and 2 usb fans. The Newpacs actually are hashing at a combined 280 g/s which is actually better than their reported max hash rate when overclocked. Pleasant surpise and they are simple!! I just wanted to get a moonlander because my fpga already mines on Odocrypt for DGB and I just wanted to experience Scrypt mining and help build the DGB project. The Newpacs are mining BTC though.
After I got everything up and running i checked my payout daily average after 1 week. I averaged .01 a day TOTAL between all three miners with them all perforing ABOVE SPEC!!! I had done research so i knew I wouldnt earn much. More than anything i just wanted to learn. But still. I was kinda surprised in a negative way. Yesterday I actually earned less than .01 Frustrated I went back to scouring the web for new ideas. About a year ago, when II was starting, I saw an app on my iphone called CryptoBrowser that claimed to mine btc on your phone without actually using phone resources using a method of cloud mining. I tried it for a week and quit because I earned like .03 after a ton of use and seemed scammy. Plus my iphone actually would get very hot when doing this so I quit using it as it seemed like a possible scam with all the cryptonight browser mining hacks and malware out there.
Anyways I was on my Galaxy Tab S6 and saw that CryptoBrowser released a "PRO" edition for 3.99 on Google Play. I bought it for Sh*ts and giggles and booted it up. It came with what they called "Cloud Boost" Essentially this is a button you press and it multiplys the estimated hashrate that it gives you device by the number shown on the boost button. (With the purchase of PRO you get one free x10 boost. You can purchase additional boosts to use with other android devices but those are actually pretty pricy. Another x10 boost was like $25 if i remember correctly).
I played with it for about an hour to see if it actually worked like it said it would this time. To my surprise, as i was browsing, my device didnt increase in temperature AT ALL!!!!! I checked my tast manager to confirm and it was indeed true, my memory and usage barely went up. it was giving me an estimated range of 80-105 on the hashrate. Once i pushed the x10 boost button, that went to 800-1150 h/s. I switched my screen to not go to sleep, plugged it to the charge and let it run on the browser page, hashing. When you push the boost button, it runs for 3 hours at the boosted speeds. After that it goes back to normal but if you press the button again, it boosts everything again. There is no limit to how many times you use it. After checking what I earned after 24 hours, I HAD MADE .40 in BTC!!!!! I JUST EARNED OVER 4000% MORE THAN MY $280 MINING RIG EARNED ME!!!! I was blown away. Maybe this was a fluke? I did it again next day. Every 3 hours or so I would push the button again but thats all. Sure enough, .35 that day. Also, it realy BTC. I requested a payout and although it took like 12 hours for them to send me an email stating they had just sent it, I actually did recieve the state amount of BTC within 24 hours in my personal wallet. The fees to send are SUPER LOW!. Like .01
Below I will list the steps I took, along with an explanation of thier "Mining" process on Androids. Reminder, this ONLY WORKS ON ANDROIDS. Also DO NOT use cryptobrowser on a physcal laptop or desktop. I ran it on an old laptop for three days last year and it fried it. It does actually use your hardware on those platforms to mine and it is not efficnet at all as I suspect they prob steal over half of your power for themselves using the REAL RandomX protocol via browser mining which is EXTREMELY INEFFICIENT DONT TRY IT!!
-----How To Do This Yourself:
Cryptotab Browser states the program works on Android devices by estimating what it thinks the hashrate would be for your device specs and siimulates what you would mine in a remote server however you still earn that estimated coin amount. It is not a SHA-256 process or coin that they say is mining, rather it is XMR and they swap that and pay it out to you in BTC Bitcoin. However I know damn well my Tab S6 doesnt hash 80-105 h/s on RandomX because I have done it with a moodified XMRig module i ported to Android. I got 5 h/s a sec if I was getting any hashes at all. But thats besides the point as I still was making money.
Now, when you press that cloud boost button it immediately boosts that hash rate it estimates by the number on the cloud boost. As stated above, you can purchase more boosts and gift them or use them on extra android devices that you may have. Again, they are pricey so I'm not doing that plus it would just mean that I have another device that I have to leave on and open. The boosts come in x2, x4, x6, x8 and x10 variants. Again, they have unlimited uses.
Here is the link to grab yourself CryptoBrowser Pro from CryptoTab. This IS A REFERRAL LINK! This is where I benefit from doing tis tutorial. Like i said, I want to be transparent as this is not a scam but I'm also not doing this out of the love of my heart. Their referral system works in that people that use the donwload the app using your link are your stage 1 referrals. Anytime they are mining, you earn a 15% bonus. So say they mine $.30 one day. You would get paid out an additional $.045 in your own balance (it does not come out of the referred user balance fyi so no worries). Then lets say that referred miner also gets their own referrals. I would get a 10% bonus on whatever THOSE people mine. This goes on and on for like 8 tiers. Each tier the bonus percntage essential halves. So again, I stand to benefit from this but it also is stupid to not make this visible as its WAY CHEAPER, EASIER AND MORE PROFITABLE TO GET BTC USING THIS METHOD THAN IT IS USING ASICS!! THIS EARNS ALMOST AS MUCH BTC AS AN ANTMINER S7 DOES RUNNING 24/7 ONLY WITHOUT THE HUGE ELLECTRICTY BILL AND COSTS!!!!)
Thats it. Again, if you have concerns, let me know or if you have suggestions, other tips, etc... mention those as well!!!
Links to Picture Proof
submitted by Afraid_Balance to earnbitcoin [link] [comments]

Mockingbird X.0

Imagine if there was one desk that all stories could cross so that, at 4am, a media plan could be decided upon and disseminated where all news outlets coordinated to set the goalposts of debate and hyper focused on specific issues to drive a narrative to control how you vote and how you spend money; where Internet shills were given marching orders in tandem to what was shown on television, printed in newspapers and spread throughout articles on the World Wide Web.
In the past, we had Operation Mockingbird, where the program was supremely confident that it could control stories around the world, even in instructions to cover up any story about a possible “Yeti” sighting, should it turn out they were real.
If, in 1959, the government was confident in its ability to control a story about a Yeti, then what is their level of confidence in controlling stories, today?
In fact, we have a recent example of a situation similar to the Yeti. When Bill Clinton and Loretta Lynch met on the TARMAC to spike the Hillary email investigation, the FBI was so confident it wasn’t them, that their entire focus was finding the leaker, starting with searching within the local PD. We have documentation that demonstrates the state of mind of the confidence the upper levels of the FBI have when dealing with the media.
The marriage between mainstream media and government is a literal one and this arrangement is perfectly legal.
But, this problem extends far beyond politics; the private sector, the scientific community, even advice forums are shilled heavily. People are paid to cause anxiety, recommend people break up and otherwise sow depression and nervousness. This is due to a correlating force that employs “systems psychodynamics”, focusing on “tension centered” strategies to create “organizational paradoxes” by targeting people’s basic assumptions about the world around them to create division and provide distraction.
In this day and age, it is even easier to manage these concepts and push a controlled narrative from a central figure than it has ever been. Allen & Co is a “boutique investment firm” that managed the merger between Disney and Fox and operates as an overseeing force for nearly all media and Internet shill armies, while having it’s fingers in sports, social media, video games, health insurance, etc.
Former director of the CIA and Paul Brennan’s former superior George Tenet, holds the reigns of Allen & Co. The cast of characters involves a lot of the usual suspects.
In 1973, Allen & Company bought a stake in Columbia Pictures. When the business was sold in 1982 to Coca-Cola, it netted a significant profit. Since then, Herbert Allen, Jr. has had a place on Coca-Cola's board of directors.
Since its founding in 1982, the Allen & Company Sun Valley Conference has regularly drawn high-profile attendees such as Bill Gates, Warren Buffett, Rupert Murdoch, Barry Diller, Michael Eisner, Oprah Winfrey, Robert Johnson, Andy Grove, Richard Parsons, and Donald Keough.
Allen & Co. was one of ten underwriters for the Google initial public offering in 2004. In 2007, Allen was sole advisor to Activision in its $18 billion merger with Vivendi Games. In 2011, the New York Mets hired Allen & Co. to sell a minority stake of the team. That deal later fell apart. In November 2013, Allen & Co. was one of seven underwriters on the initial public offering of Twitter. Allen & Co. was the adviser of Facebook in its $19 billion acquisition of WhatsApp in February 2014.
In 2015, Allen & Co. was the advisor to Time Warner in its $80 billion 2015 merger with Charter Communications, AOL in its acquisition by Verizon, Centene Corporation in its $6.8 billion acquisition of Health Net, and eBay in its separation from PayPal.
In 2016, Allen & Co was the lead advisor to Time Warner in its $108 billion acquisition by AT&T, LinkedIn for its merger talks with Microsoft, Walmart in its $3.3 billion purchase of, and Verizon in its $4.8 billion acquisition of Yahoo!. In 2017, Allen & Co. was the advisor to in PetSmart’s $3.35 billion purchase of the online retailer.
Allen & Co throws the Sun Valley Conference every year where you get a glimpse of who sows up. Harvey Weinstein, though a past visitor, was not invited last year.
Previous conference guests have included Bill and Melinda Gates, Warren and Susan Buffett, Tony Blair, Google founders Larry Page and Sergey Brin, Allen alumnus and former Philippine Senator Mar Roxas, Google Chairman Eric Schmidt, Quicken Loans Founder & Chairman Dan Gilbert, Yahoo! co-founder Jerry Yang, financier George Soros, Facebook founder Mark Zuckerberg, Media Mogul Rupert Murdoch, eBay CEO Meg Whitman, BET founder Robert Johnson, Time Warner Chairman Richard Parsons, Nike founder and chairman Phil Knight, Dell founder and CEO Michael Dell, NBA player LeBron James, Professor and Entrepreneur Sebastian Thrun, Governor Chris Christie, entertainer Dan Chandler, Katharine Graham of The Washington Post, Diane Sawyer, InterActiveCorp Chairman Barry Diller, Linkedin co-founder Reid Hoffman, entrepreneur Wences Casares, EXOR and FCA Chairman John Elkann, Sandro Salsano from Salsano Group, and Washington Post CEO Donald E. Graham, Ivanka Trump and Jared Kushner, and Oprah Winfrey.
George Tenet, with the reigns of Allen & Co in his hands, is able to single-handedly steer the entire Mockingbird apparatus from cable television to video games to Internet shills from a singular location determining the spectrum of allowable debate. Not only are they able to target people’s conscious psychology, they can target people’s endocrine systems with food and pornography; where people are unaware, on a conscious level, of how their moods and behavior are being manipulated.
"The problem with George Tenet is that he doesn't seem to care to get his facts straight. He is not meticulous. He is willing to make up stories that suit his purposes and to suppress information that does not."
"Sadly but fittingly, 'At the Center of the Storm' is likely to remind us that sometimes what lies at the center of a storm is a deafening silence."
Tenet joined President-elect Bill Clinton's national security transition team in November 1992. Clinton appointed Tenet Senior Director for Intelligence Programs at the National Security Council, where he served from 1993 to 1995. Tenet was appointed Deputy Director of Central Intelligence in July 1995. Tenet held the position as the DCI from July 1997 to July 2004. Citing "personal reasons," Tenet submitted his resignation to President Bush on June 3, 2004. Tenet said his resignation "was a personal decision and had only one basis—in fact, the well-being of my wonderful family—nothing more and nothing less. In February 2008, he became a managing director at investment bank Allen & Company.
We have the documentation that demonstrates what these people could possibly be doing with all of these tools of manipulation at their fingertips.
The term for it is “covert political action” for which all media put before your eyes is used to serve as a veneer… a reality TV show facade of a darker modus operandum.
It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.
Intelligence historian Jeffrey T. Richelson says the S.A. has covered a variety of missions. The group, which recently was reorganized, has had about 200 officers, divided among several groups: the Special Operations Group; the Foreign Training Group, which trains foreign police and intelligence officers; the Propaganda and Political Action Group, which handles disinformation; the Computer Operations Group, which handles information warfare; and the Proprietary Management Staff, which manages whatever companies the CIA sets up as covers for the S.A.
Scientology as a CIA Political Action Group – “It is a continuing arrangement…”:
…Those operations we inaugurated in the years 1955-7 are still secret, but, for present purposes, I can say all that’s worth saying about them in a few sentences – after, that is, I offer these few words of wisdom. The ‘perfect’ political action operation is, by definition, uneventful. Nothing ‘happens’ in it. It is a continuing arrangement, neither a process nor a series of actions proceeding at a starting point and ending with a conclusion.
CIA FBI NSA Personnel Active in Scientology:
When you consider the number of forces that can be contained within a single “political action group” in the form on a “boutique investment firm,” where all sides of political arguments are predetermined by a selected group of actors who have been planted, compromised or leveraged in some way in order to control the way they spin their message.
The evidence of this coordinated effort is overwhelming and the “consensus” that you see on TV, in sports, in Hollywood, in the news and on the Internet is fabricated.
Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.'
Thus the uninformed reader will most likely develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'
When you find yourself feeling like common sense and common courtesy aren’t as common as they ought to be, it is because there is a massive psychological operation controlled from the top down to ensure that as many people as possible are caught in a “tension based” mental loop that is inflicted on them by people acting with purpose to achieve goals that are not in the interest of the general population, but a method of operating in secret and corrupt manner without consequences.
Notice that Jeffrey Katzenberg, of Disney, who is intertwined with Allen & Co funds the Young Turks. He is the perfect example of the relationship between media and politics.
Katzenberg has also been involved in politics. With his active support of Hillary Clinton and Barack Obama, he was called "one of Hollywood's premier political kingmakers and one of the Democratic Party's top national fundraisers."
With cash from Jeffrey Katzenberg, The Young Turks looks to grow paid subscribers:
Last week, former DreamWorks Animation CEO Jeffrey Katzenberg’s new mobile entertainment company WndrCo was part of a $20 million funding round in TYT Network, which oversees 30 news and commentary shows covering politics, pop culture, sports and more. This includes the flagship “The Young Turks” program that streams live on YouTube every day. Other investors in the round included venture capital firms Greycroft Partners, and 3L Capital, which led the round. This brings total funding for Young Turks to $24 million.
How Hollywood's Political Donors Are Changing Strategies for the Trump Era:
Hollywood activism long has been depicted as a club controlled by a handful of powerful white men: Katzenberg, Spielberg, Lear, David Geffen, Haim Saban and Bob Iger are the names most often mentioned. But a new generation of power brokers is ascendant, including J.J. Abrams and his wife, Katie McGrath, cited for their personal donations and bundling skills; Shonda Rhimes, who held a get-out-the-vote rally at USC's Galen Center on Sept. 28 that drew 10,000 people; CAA's Darnell Strom, who has hosted events for Nevada congresswoman Jacky Rosen and Arizona congresswoman Kyrsten Sinema; and former Spotify executive Troy Carter, who held three fundraisers for Maryland gubernatorial candidate Ben Jealous (Carter also was a fundraiser for President Obama).
Soros Group Buys Viacom's DreamWorks Film Library:
Viacom, after splitting off from Les Moonves Les Moonves ' CBS , still holds Paramount Pictures, and that movie studio in December agreed to acquire DreamWorks SKG, the creative shop founded by the Hollywood triumvirate of Steven Spielberg, David Geffen and Jeffrey Katzenberg (a former exec at The Walt Disney Co.). DreamWorks Animation had been spun off into a separate company.
Now it's time for Freston to make back some money--and who better to do a little business with than George Soros? The billionaire financier leads a consortium of Soros Strategic Partners LP and Dune Entertainment II LLC, which together are buying the DreamWorks library--a collection of 59 flicks, including Saving Private Ryan, Gladiator, and American Beauty.
The money you spend on media and junk food and in taxes goes to these groups who then decide how best to market at you so that they decide how you vote by creating a fake consensus to trick into thinking that you want something other than what is best for you; but will inevitably result in more money being funneled to the top, creating further separation between the super rich and the average person. The goal will be to assert creeping authoritarianism by generating outrage against policies and issues they hate. Part of manipulating your basic assumptions is also to use schadenfreude (think canned laughter on TV) against characters who support the cause that might actually do you the most good (which reaffirms and strengthens your confirmation biased along predetermined political lines).
We have a population being taught to hate socialism and love capitalism when the truth is no country is practicing either. These terms are merely disguises for political oligarchies where the collection of wealth is less about getting themselves rich and more about keeping everyone else poor.
What can you guess about the world around you if it turned out that every consensus that was forced on you was fake?
How much money would it take to make it look like 51% of the Internet believed in completely idiotic ideas? Combine shill operations with automation and AI’s, and the cost becomes a good investment relative to the return when measured in political power.
Even the people who are well intentioned and very vocal do not have to consciously be aware that they are working for a political action group. A covert political group will always prefer an unwitting tool to help push their agenda, so that they can remain in the shadows.
FDA Admonishes Drug Maker Over Kim Kardashian Instagram Endorsement
The OSS files offer details about other agents than famous chef, Julia Child; including Supreme Court Justice Arthur Goldberg, major league catcher Moe Berg, historian Arthur Schlesinger Jr., and actor Sterling Hayden.
USA Today: Businesses and organizations may refer to it as a tool for competitive advantage and marketing; but make no mistake
Shareblue accounts caught in /politics posting links to Shareblue without disclosing their affiliation
Psy Group developed elaborate information operations for commercial clients and political candidates around the world
Top mod of /Mechanical_Gifs tries to sell subreddit on ebay for 999.00 dollars.
Shill posts picture of a dog in a hammock with the brand clearly visible without indicating that it's an ad in the title of the post
Arstechnica: GCHQs menu of tools spreads disinformation across Internet- “Effects capabilities” allow analysts to twist truth subtly or spam relentlessly.
Samsung Electronics Fined for Fake Online Comments
Discover Magazine: Researchers Uncover Twitter Bot Army That’s 350
Times of Israel - The internet: Israel’s new PR battlefield
Time: Social Media Manipulation? When “Indie” Bloggers and Businesses Get Cozy
Content-Driven Detection of Campaigns in Social Media [PDF]
the law preventing them from using this in America was repealed
Redditor who works for a potato mailing company admits to being a shill. He shows off his 27 thousand dollars he made in /pics
Screenshot of post since it was removed.
Just thought I'd contribute to this thread
CNN: A PR firm has revealed that it is behind two blogs that previously appeared to be created by independent supporters of Wal-Mart. The blogs Working Families for Wal-mart and subsidiary site Paid Critics are written by 3 employees of PR firm Edelman
Vice: Your Government Wants to Militarize Social Media to Influence Your Beliefs
BBC News: China's Internet spin doctors
BBC News: US plans to 'fight the net' revealed
Wall Street Journal: Turkey's Government Forms 6
Fake product reviews may be pervasive
USA Today: The co-owner of a major Pentagon propaganda contractor publicly admitted that he was behind a series of websites used in an attempt to discredit two USA TODAY journalists who had reported on the contractor.
ADWEEK: Marketing on Reddit Is Scary
BBC- How online chatbots are already tricking you- Intelligent machines that can pass for humans have long been dreamed of
BBC news: Amazon targets 1
BBC: More than four times as many tweets were made by automated accounts in favour of Donald Trump around the first US presidential debate as by those backing Hillary Clinton
Fake five-star reviews being bought and sold online - Fake online reviews are being openly traded on the internet
Bloomberg: How to Hack an Election [and influence voters with fake social media accounts]
"Internet Reputation Management
Buzzfeed: Documents Show How Russia’s Troll Army Hit America
The Rise of Social Bots
CBC News- Canadian government monitors online forums
Chicago Tribune: Nutrition for sale: How Kellogg worked with 'independent experts' to tout cereal
DailyKos: HBGary: Automated social media management
Meme Warfare Center
Shilling on Reddit is openly admitted to in this Forbes article
Forbes: From Tinder Bots To 'Cuban Twitter'
Huffington Post- Exposing Cyber Shills and Social Media's Underworld
The Independent: Massive British PR firm caught on video: "We've got all sorts of dark arts...The ambition is to drown that negative content and make sure that you have positive content online." They discuss techniques for managing reputations online and creating/maintaining 3rd-party blogs that seem independent.
New York Times: Lifestyle Lift
New York Times: Give Yourself 5 Stars? Online
NY Times- From a nondescript office building in St. Petersburg
NY Times: Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation
PBS Frontline Documentary - Generation Like
Gamers promote gaming-gambling site on youtube by pretending to hit jackpot without disclosing that they own the site. They tried to retroactively write a disclosure covering their tracks
Raw Story: CENTCOM engages bloggers
Raw Story: Air Force ordered software to manage army of fake virtual people
Salon: Why Reddit moderators are censoring Glenn Greenwald’s latest news story on shills
The Atlantic: Kim Kardashian was paid to post a selfie on Instagram and Twitter advertising a pharmaceutical product. Sent to 42 million followers on Instagram and 32 million on Twitter
The Guardian: Internet Astroturfing
The Guardian: Israel ups the stakes in the propaganda war
Operation Earnest Voice
The Guardian: British army creates team of Facebook warriors
The Guardian: US military studied how to influence Twitter [and Reddit] users in Darpa-funded research [2014]
The Guardian: Chinese officials flood the Chinese internet with positive social media posts to distract their population
Times of Israel: Israeli government paying bilingual students to spread propaganda online primarily to international communities without having to identify themselves as working for the government. "The [student] union will operate computer rooms for the was decided to establish a permanent structure of activity on the Internet through the students at academic institutions in the country."
USA Today: Lord & Taylor settles FTC charges over paid Instagram posts
Researcher's algorithm weeds out people using multiple online accounts to spread propaganda - Based on word choice
Wired: Powered by rapid advances in artificial intelligence
Wired: Clinton Staff and Volunteers Busted for Astroturfing [in 2007]
Wired: Pro-Government Twitter Bots Try to Hush Mexican Activists
Wired: Microsoft
Wired: Military Report: Secretly ‘Recruit or Hire Bloggers’
Wired: Air Force Releases ‘Counter-Blog’ Marching Orders
Reddit Secrets
Reddit Secrets
"Once we isolate key people
GCHQ has their own internet shilling program
US also operates in conjunction with the UK to collect and share intelligence data
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate
Glenn Greenwald: Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
Here is a direct link to your image for the benefit of mobile users
Reddit for iPhone
Why Satoshi Nakamoto Has Gone
What I learned selling my Reddit accounts
Artificial intelligence chatbots will overwhelm human speech online; the rise of MADCOMs
How Reddit Got Huge: Tons of Fake Accounts - According to Reddit cofounder Steve Huffman
Whistleblower and subsequent investigation: Paid trolls on /Bitcoin
Confession of Hillary Shill from /SandersForPresident
Why do I exist?
Already a direct link?
Here's the thread.
/netsec talks about gaming reddit via sockpuppets and how online discourse is (easily) manipulated.
Redditor comes clean about being paid to chat on Reddit. They work to promote a politician
Shill whistleblower
Russian bots were active on Reddit last year
The Bush and Gore campaigns of 2000 used methods similar to the Chinese government for conducting “guided discussions” in chatrooms designed to influence citizens
source paper.
or Click Here. Alleged paid shill leaks details of organization and actions.
Shill Confessions and Additional Information
Corporate and governmental manipulation of Wikipedia articles
Ex -MMA fighter and ex-police officer exposes corrupt police practices
User pushes InfoWars links on Reddit
Some websites use shill accounts to spam their competitor's articles
User posts video using GoPro
Fracking shill whistleblower spills the beans on Fracking Internet PR
Directorate of Operations
October 16, 1964
Subject: After action report of
Operation CUCKOO (TS)

1) Operation CUCKOO was part of the overall operation CLEANSWEEP, aimed at eliminating domestic opposition to activities undertaken by the Central Intelligence Agency's special activities division, in main regard to operation GUILLOTINE.

2) Operation CUCKOO was approved by the Joint Chiefs of Staff, Department of Defense and the office of The President of the United States as a covert domestic action to be under taken within the limits of Washington D.C as outlined by Secret Executive Order 37.

3) Following the publishing of the Warren Commission, former special agent Mary Pinchot Meyer (Operation MOCKINGBIRD, Operation SIREN) also was married to Cord Meyer (Operation MOCKINGBIRD, Operation GUILLOTINE) threatened to disclose the details of several Special Activities Divisions' operations, including but not limited to, Operation SIREN and GUILLOTENE.
4) It was deemed necessary by senior Directorate of Operations members to initiate Operation CUCKOO as an extension of Operation CLEANSWEEP on November 30th. After Mary Pinchot Meyer threatened to report her knowledge of Operation GUILLOTENE and the details of her work in Operation SIREN from her affair with the former President.

5) Special Activities Division was given the green light after briefing president Johnson on the situation. The situation report was forwarded to the Department of Defense and the Joint Chiefs of staff, who both approved of the parameters of the operation, as outlined under article C of secret executive order 37 (see attached copy of article).
6) 8 members of the special activities division handpicked by operation lead William King Harvey began planning for the operation on October 3rd, with planned execution before October 16th.

7) The (?) of the operation was set as the neighborhood of Georgetown along the Potomac river, where the operators would observe, take note on routines, and eventually carry the operation.

8) After nothing Meyer's routines, Edward "Eddy" Reid was picked as the operation point man who would intersect Meyer on her walk on October 12th, with lead William King Harvey providing long range support if necessary from across the Chesapeake and Ohio canal (see illustration A for detailed map).

9) Edward Reid was planned to be dressed in the manner of a homeless black man, due to his resemblances to local trash collector (later found out to be Raymond Crump) who inhabits the AO and the path that Reid was planned to intersect Meyer.
submitted by The_Web_Of_Slime to Intelligence [link] [comments]

Email hacked, dude wants lots of BTC in 48 hours - Should I pay?

TLDR: Old business email hacked, now I’m being black mailed and hacker scum wants lots of bitcoins in 48 hours. Lol
So I get an email from my old business email basically saying “give me $900 in bitcoin or we’ll send videos of you pleasuring yourself to some adult website you visited to all your contacts”
Also stuff like “you can change your password but my malware Trojan horse will give me your new password” also like “I’ve been watching you and have access to your mic and camera” - All my computers have tape over the cameras. We use iPhones also with camera blockers on the front. I’ve never made videos / if they did get any video from the back iPhone cameras, it was probably just a random dick if anything - no faces. (They said the video and link I “pleasured myself” to was included in the email. But there was no proof attached) Jokes on them, I’ll leak them my damn self if needed.
The email looks like it’s coming from our real email: [email protected] the password is probably correct too. I have not checked the email code headers or whatever so I guess there’s a chance it’s not from the real email. I never got super into that kinda stuff. Seems to be real, the password was pretty weak as well.
We have several computers, all have Norton Anti Virus, malware bytes that are run maybe once a month. We’re still really small company, so as far as I know no one is looking at adult sites on the computers. (Maybe one of the personal iPads?)
I can login to our web host and change the email password, delete all the contacts / emails, they’re all old so we don’t need them anymore.
I know not to pay these people bc they will milk you for everything you have. I’m not here to entertain digital terrorists.
Curious as to what my next move should be if anything. I don’t have any money anyways, I’ll mail em like $6 bucks and a half pack of gum at the most lol.
I almost want to email back after we’ve scanned the computers, changed passwords, etc and send them some funny meme or something or waste their time, but I assume that will piss them off and they can still send out some bullshit emails to our contacts & possibly phish some of our client emails, or look into me further and maybe retaliate? Idk
Thanks for the advice everyone.
submitted by devonthed00d to Bitcoin [link] [comments]

Anyone ever get their email hacked & black mailed for bitcoin money? Advice needed please

TLDR: Old business email hacked, now I’m being black mailed and hacker scum wants lots of bitcoins in 48 hours. Lol
So I get an email from my old business email basically saying “give me $900 in bitcoin or we’ll send videos of you pleasuring yourself to some adult website you visited to all your contacts”
Also stuff like “you can change your password but my malware Trojan horse will give me your new password” also like “I’ve been watching you and have access to your mic and camera” - All my computers have tape over the cameras. We use iPhones also with camera blockers on the front. I’ve never made videos / if they did get any video from the back iPhone cameras, it was probably just a random dick if anything - no faces. (They said the video and link I “pleasured myself” to was included in the email. But there was no proof attached)
The email looks like it’s coming from our real email: [email protected] the password is probably correct too. I have not checked the email code headers or whatever so I guess there’s a chance it’s not from the real email. I never got super into that kinda stuff. Seems to be real, the password was pretty weak as well.
We have several computers, all have Norton Anti Virus, malware bytes that are run maybe once a month. We’re still really small company, so as far as I know no one is looking at adult sites on the computers. (Maybe one of the personal iPads?)
I can login to our web host and change the email password, delete all the contacts / emails, they’re all old so we don’t need them anymore.
I know not to pay these people bc they will milk you for everything you have. I’m not here to entertain digital terrorists.
Curious as to what my next move should be if anything. I don’t have any money anyways, I’ll mail em like $6 bucks and a half pack of gum at the most lol.
I almost want to email back after we’ve scanned the computers, changed passwords, etc and send them some funny meme or something or waste their time, but I assume that will piss them off and they can still send out some bullshit emails to our contacts & possibly phish some of our client emails, or look into me further and maybe retaliate? Idk
Thanks for the advice everyone.
submitted by devonthed00d to smallbusiness [link] [comments]

Find my IPhone hacked into, they locked my MacBook with a 6 digit code.

Saturday night my Find My Iphone account was hacked into and now my MacBook Pro has a 6 digit code on it to unlock it. Also on the same screen it reads “write to email: [email protected]”. Wanting to know what the email was for, I emailed them and they responded with “Hello. Your device is locked. To activate the device. Pay 50$ to the Bitcoin Address: 19WEH5jNUA58m73wqvrX6t3CUQHfdzMyyw Buy Bitcoins: How to buy Bitcoins? After payment inform us and we will send your access code. Time for payment is 24 hours. If we do not receive payment from you within 24 hours, your device will be blocked.”
Knowing that it was hacked into I contacted Apple support team through the chat basically they told me to call the Contact Security team so today I did that. After 40 minutes on the phone the only solution they gave me was to take the MacBook into an Apple store to get it fixed, and all I needed is a proof of purchase. That is the problem that I have right now. I received it as a graduation present in 2015 from my aunt and she has no proof of purchase. The way I see it is basically I have no option to get my laptop fixed and now I’m screwed.
I’m reaching out to Reddit for some guidance on what I can do from here.
submitted by theerio to mac [link] [comments]

12-08 02:32 - 'Hack Facebook/WhatsappHack/track Phones and computers,Christmas shopping deals' (self.Bitcoin) by /u/yuuki00293 removed from /r/Bitcoin within 116-126min

Hack Facebook/WhatsappHack/track Phones and computers,Christmas shopping deals

Ethical Hacking like any other forensic science involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation/documentation of evidence, identification, extraction and the accuracy of results.
I head a team of veterans that have been able to provide our clients with computer Ethical Hacking exploits /investigations for a broad range of civil disputes & criminal cases. These include: Different Kinds of Dating Sites, Hack Facebook/Whatsapp/Email, Litigation,Fraud, Hack/track Phones and computers, Source for any evidence/proof, Cash projects/money deals(You offering or me), Intellectual Property, Website Hack & security, Unlock computer system, Spy bug(competitors,employees,children,lovers etc), Credit score upgrade, DUI/ Criminal records removal, Retrieve lost files/documents, content removal, Test score upgrade, Source for test questions,Get your acc Verified on TwitteInstagram, Tutorials and e-books & more with Patrick aka Lord Digital.

I major in...
Any Kinds of Countries Passport worldwide
Flight Ticket
Different Kinds of Games Hacking
Different Kinds of Dating Sites
Credit score increase and decrease
Upgrade University Grades
Facebook, Instagram, Twitter, WhatsApp, Line, Skype Hack
Delete unwanted online Pictures and Videos on any website
Remove Criminal Records
Tracing peoples background
Hack accounts
Apps hacking
Loading all MasterCrd, Accounts, PayPal, Bitcoin, WU, Money Gram with untraceable credit on it. etc.
We also develop hacked facebook, twitter, instagram, yahoo, gmail passwords etc.
Do you need to keep an eye on your spouse by gaining access to their emails?
As a parent do you want to know what your kids do on a daily basis on social networks.

Also introducing:

Introduction to Ethical Hacking,Different Kinds of Games and Software hacking,Gameså server files + database,Social Engineering,Scanning Networks,Evading IDS, Firewalls, and Honeypots,Sniffing,Hacking Mobile Platforms,Hacking Web Applications,Hacking Web servers,Hacking Wireless Networks
Cloud ñ Threats & Opportunities,Malware Threats,Session Hijacking,SQL Injection,Enumeration,Denial of Service,Footprinting and Reconnaissance,System Hacking.

- I'm is Professional seller,more than 6 years experience,i have sold c credit crd to many customers all over the world.I give proofs of jobs both past and presents and i also have 100% money return warranty.
- Selling , many country as: Canada,USA,Australia,UK...all And many country in Eåçurope: Fr,Ger,Spain,Ita...
- I hope we will work together for a long time.
- Different Kinds of Dating Sites
- Always sell quality with high balance.
- I have a website but if you want buy good price please contact me.
- , buy c, buy cc, buy login, buy logs, buy , buy dmps with pin, registration, all you need,
--To all Newbies,

The path to carding is a long one. You need to be determined and dedicated to your cause. I know its difficult but a good challange is always fun. So honestly if you serious to learn carding and need some guidance, am here to help. I also have on going carding classes and carding programs helping dertermined and focused [noobs.You]1 can always shoot questions at me and i will help with my best capablilities. As a matter of fact all the information you need to be successful at carding is out there but the problem is that its all scattered and i know how frustrating it can be cuz ive been there but you need to develop the love of solving puzzles and problems to truly thrive in this industry.

Also if you new at carding and worried about risk please quit becuase this is a risk based industry on only thing you can do is decrease your risk odds by being cautious and very observant. Non the less even the most cautious of us still get bitten once in a while but its mainly about your risk/profit ratio.

So my friends i wish you all the best in your carding experience, never give up and please treat carding seriously and you will be surely rewarded.

i also have available:

-Dell :25$ + Bin
-Nike : 15$ + Bin
-Walmart : 15$ + Bin
-Apple : 40$ + Bin
-Flight club : 45$
-Bestbuy : 25$ + Bin
-Target : 20 $ + Bin
-Macys : 25$ + Bin
-Finish Line : 20$
-Barneys New York : 40$
-Adidas : 15$
-Sears : 15$
-Neiman Marcus : 25 $
-Saks Fifth Avenue: 25$
-Bergoff Goodman : 25$
-Canadian Goose Method : 45$
-Cc to btc method 20$
-Cc to btc method via steam 25$
-Cc to btc via giftcard site 25$
-Hacked paypal cashout method 50$
-Paypal moneymaking method 25$
-Spamming tutorial (tools included) 50$
-Cracking tutorial (to get accounts and useful stuff) 120$
-Carding tutorial (safety while carding, some famous site methods) 100$
-Method to get free inbox mailer

Is almost Christmas let's make some extra bands for family


$300 - iPhone Xs+ (PRE-ORDER)
$250 - iPhone Xs (PRE-ORDER)
$200 - iPhone Xr (PRE-ORDER)
$170 - iPhone X
$160 - iPhone 8+
$155 - iPhone 8
$150 - iPhone 7+
$145 - iPhone 7
$130 - iPhone 6s+
$125 - iPhone 6s
$125 - iPad Pro
$100 - iPad Mini 4
$350 - Macbook Pro
$300 - Macbook Air
$100 - Apple Watch

$150 - Samsung Galaxy S9+
$145 - Samsung Galaxy S9
$140 - Samsung Galaxy S8+
$135 - Samsung Galaxy S8
$120 - Samsung Galaxy Note 8
$105 - Samsung Galaxy A8+

$150 - Xbox One
$150 - PlayStation 4

$200 - Guiseppes
$200 - Gucci
$175 - Balenciaga
$175 - Louboutins
$175 - Valentino

I run a legitimate business so people trying to waste my time please f*** off and to everybody else happy holiday
Here is how you can contact me:
* Skyp: robleonhack * ICQ: 745196122 * Discord : robleonhack#3698 * Whatsa: +1(813) 485-6822 * Telegram: +19078307328 * : [[email protected]]2
Hack Facebook/WhatsappHack/track Phones and computers,Christmas shopping deals
Go1dfish undelete link
unreddit undelete link
Author: yuuki00293
1: n*ob*.You 2: mailto:[email protected]
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

Steemit is probably control grid. The litmus tests are it's bitcoin basis, avaricious virality, people like WAC supporting it, and that they suppress 'conspiracy'

Steemit is based on bitcoin, they claim. That makes it censorship resistant, they say. We honestly don't know their backend, we have to trust that they aren't casting an illusion on us by publishing technical details of steemit's working that don't actually match reality. It would be trivial to spoof the alleged activity and mechanisms of bitcoin on steemit. If you don't get to see the backend, you just have to believe them. They use their own steemit currency also.
It does seem, however, to be legit if people are getting paid. But there are ways to spoof that could have an internal currency and 'curators' who decide what something is worth (see the 'bernie sanders scam dollarvigilante' post below).
For example, the US government has unlimited money ('QE') to spend on a successful propaganda campaign to destroy reddit. After all, knowledge is power and the total fucking distrust of the american people towards the government is priceless.
Secondly, if Bitcoin itself is a scam, then steemit is a scam too.
Bitcoin involves cracking a code. Who has the most / best equipment to crack codes? The NSA. They have a few trillion dollars invested in a whole building that is a computer. Because of US Military Intelligence's (USMI's) NSA PRISM, bitcoin is an Elitist system you no longer have access to. I'll expand.
You can no longer make money on it if you didn't get in on it from the get-go. It's a ponzi scheme. In order to mine for bitcoin, you have to have expensive equipment. You can't buy enough equipment now to make enough bitcoin to pay for it and make a narrow margin, because of the way the system has worked. In the beginning, mining was easy, but now it's all mined out and more computer power + time is needed to unlock harder puzzles. That's just how it works.
So to start now, you'd need an astronomical investment in computer equipment and lots of spare, discounted energy, like for example a solar farm. No one has that. It's inherently more elitist as time goes on. If you started now, with your computer, it would take over 20 yrs on average to get a bitcoin block, if you ever did get one--which you might not.
My point is that bitcoin has always been elitists, never democratic. It was never based on anything other than who has the most energy and technology. People who got started early have the equipment, so does the USMI. USMI also has unlimited power: they have excess coal reserves, some hydro, some solar and wind, and lots of natural gas and fracking petrol; they also have nukes, which means 'cheaper oil than everywhere else in the world....or else'.
Therefore, the people who will have the most bitcoin at the end of the day is the US military and the 1%, period.
It's also pretty clear the NSA are developing quantum computers. People have speculated that bitcoin at present does not use quantum safe algorithms, and therefore at some point the US Mil can steal all the bitcoin that hasn't been transferred into a paper wallet. That paper does no good either because the moment that bitcoin is put into a usable electronic wallet and a firewall opened, bam, it could be taken by an omnipresent AI agent that's running as several autonomous micro instances in your dishwasher, nest AC controller, your amazon dash button, your iphone, etc.
First they fight you, then they win
Only Governments engage in activities that involve inhibiting or threatening cryptocurrencies (and it's useful to mention they fight crypto tools generally...they fought pgp, they fought phpphone, they fought tor, they fought i2p, freenet, torrent, VPNs, they totally undermined SSL with heartbleed, etc).
Then the Silkroad busts. Other darknet sites. Hacks on bitcoin exchanges and banks. Threats of TOR being undermined, heartbleed SSL bug making everyone question everything's security.
Who ended up with that money? The 1%.. The NSA? <-- coin telegraph or cointel-egraph
You will notice the US Government fought bitcoin at first, trying to rope in the IRS, the SEC and trying to lawyer up on bitcoin, threatening everyone who was playing, and dissuading everyone from getting in on bitcoin. (interesting, eh?)
Until the moment they seized the 20M or so in bitcoin from silkroad. And that happened around the same time the exchanges were starting to be compromised and bitcoin stolen. Then suddenly, the US changed its tune and bitcoin is no longer a threat. Why is that? Think!
It's that now that bitcoin has value (ie: bitcoin now has the potential to be exchanged for goods and services because of the public's trust of the currency to have said value), and that if the US has the lion's share of bitcoin, well they wouldn't to go fighting against a currency because that would only destroy its value. They aren't going to destroy their own wealth, or act against it, in other words.
Avarice and SCAM
When I first went to Steemit, this article was prominent. Now you can't find it unless you search. Everyone should read, esp. about how Sanders is abusing the system.
Yet, it's now back up to 2k+ Which is good.
Also this user 'knows the CEO' and made 12k in one month, isn't that something. Too bad I don't know the CEO
and yet
Conspiracy tag suppression
WAC supports it, so it's control grid
Fluke, you are my faaather
But! Corbett supports it
I trust James Corbett, but I don't know why he's so quick to jump on steemit. Seems premature, especially since they clearly suppress the conspiracy tag.
And knowing the relationship of bitcoin to power (it's a petrol-backed currency!!!!!!!!!!!!!!), and given he's made a documentary based on the history of petrol, he should know better than to back a dubious cryptocurrency based on oil. Period.
Trust but verify
I'm ok with something new. In fact I tried Steemit and I like it. However, very few saw my post, nor will many. Because it was tagged conspiracy as primary, and conspiracy will not show up in lists. You have to get to conspiracy by gaming the url manually. That's lame.
No Response from Support I've told steemit about this, but I've not even gotten an email response to say, we'll respond when we can. It's literally gone into a black hole. Steemit also did not respond to another unrelated support question I sent days before the 'glitch' support email.
If you think I'm 'throwing shade' on steemit, I'm not. I'm asking valid questions and pointing out things you might have missed. Shill away if you must, but I'm pretty much convinced that Steemit is just control grid, designed to fragment the /conspiracy and other communities on reddit primarily (since it's an alternative to reddit). They tried this with voat and they are trying again by monetizing it. You see that's the killer app. Trying to tempt you with money. Only problem is, it's based on bitcoin and it pays out ... what if bitcoin falls it was designed to do....all along.
submitted by 911bodysnatchers322 to conspiracy [link] [comments]

Log of AMA with - @Steven Sprague (Steven Sprague), @AmyV (Amy Vernon) @Alex-Rivetz

Disclaimer: ARK is regularly hosting Ask-me-Anything's of upcoming and promising cryptocurrency projects. Other than being the host, there is no relation between ARK and the featured cryptocurrency in this AMA. Keep in mind that ARK has no competitors - only future partners.
Dr10 Let us all welcome the team from @Steven Sprague (Steven Sprague), @AmyV (Amy Vernon) @Alex-Rivetz) . You can all start asking them questions. I'd ask team from Rivetz to use @ username to the one they are responding to and I'd like to ask all the community to give them some time to catch up if too many questions in backlog, before asking more so questions don't get lost. Thank you!
Steven Sprague @dr10 Thanks
AmyV hai Posted using /giphy (1 MB)
Alex-Rivetz Hello everyone! Pleasure to be here.
bohemiangreco :excellent:
breastjar Hi @Steven Sprague
dr10 Welcome :wave: Lets start with question number one: How would you sum-up the use-case of Rivetz short and easy? (edited)
M N ^ what problem(s) are you trying to solve?
tranzer What is Rivetz and its main purpose? Will you have your own blockchain or ERC20 token?
breastjar Looking at your product, you are aiming for businesses. Are there any partnerships yet?
Steven Sprague Rivetz Provides protection of the private keys and the formation of instructions using the isolated execution of the processor hardware that has been standardized by global platform and trusted computing standards. The goal is to provide a hardware quality of protection in the device you already own.
Steven Sprague @breastjar Yes the product will begin commercial distribution in Q1 and there are partners from ICO's to Telefonica that have been announced
breastjar So rivetz has to be implemented into the hardware?
bohemiangreco Why do you think there is a need for your "Hardware quality of protection"?
Steven Sprague Rivetz leverages the ARM truszone hardware already in your main processor the technology is deployed over the air and is a trustlette that is deployed in the measured Isolated execution.
Steven Sprague @bohemiangreco Because it is way to easy to steal access to keys and accounts from simple 2FA to full private key protection.
breastjar If you already deploy commercial distribution why do you need an ICO? 1 reply 7 hours ago View thread
dr10 Rivetz ICO is already over. They are traded already afaik. 1 reply 7 hours ago View thread
tranzer So are you your own blockchain or only providing solutions and have ERC20 tokens for investors? 1 reply 7 hours ago View thread
M N @Steven Sprague how does your system know what needs to be divided and secured... apps vs operating system vs. passwords and sensitive information? (edited)
AmyV @breastjar -> FYI, this is our partnership page: Rivetz Partnerships - Rivetz Rivetz is pleased to partner with a host of innovative companies in security, blockchain, mobile and other technology industries to offer stronger, simpler security for everyone! (27 kB)
tranzer Put Ark logo there it will look better :trollface:
Steven Sprague We chose to abandon a Venture backed round and pursue a stronger token model. Our original ideas in the space where written up in 2014 and it becam clear that an attestation Coin (2014) could become the Rivetz Cybersecurity Token RvT (2017) Decentralized security is key for all blockchain projects to assure that the data written to the Chain is provably intended.
breastjar @AmyV Thx :+1::skin-tone-2:
Lohis Has rivetz something to do with ark? Sorry i am new here @Steven Sprague
AmyV @Lohis - just friends of ARK. Your folks thought you might be interested in getting to chat with @Steven Sprague some :slightly_smiling_face:
Steven Sprague @bohemiangreco My team has a strong backgroung in running a Nasdaq Company in trusted computing and the Token market is the new model for software economics. Every porject using a blockchain needs to begin to consider how the actual Decentralized security will operate to assure the instruction sent to the chain or the contract is the instruction intended.
breastjar It is! @AmyV
Steven Sprague @Lohis Happy to discuss the application to ARK as well.
M N @Lohis Ark hosts AMA's for all types of different coins to learn about them.... they typically don't have anything specific to do with Ark, but there are usually a lot of potential use cases and future partnerships that could come out of them :slightly_smiling_face:
M N @Steven Sprague how does your system know what needs to be divided and secured... apps vs operating system vs. passwords and sensitive information?
Leon Is there discussion with the ARK team to embed RVT in the ARK mobile wallets?
dr10 No there is nothing yet, but its more like a meet and greet now. Getting to know Rivetz :wink:
Steven Sprague @M N We provide a developer tool kit so the android app developer can determine the components that should execute within the Isolated execution environment
sleepdeficit @Steven Sprague Will/Does Rivetz have other development APIs and wrappers available, and are you fully open-source?
M N @Steven Sprague so do you have to trust the developer to not put "backdoor" types of allowances or do you have guardrails in place to make sure they can't do that? 2 replies Last reply 7 hours ago View thread
Steven Sprague @Leon It is also interesting to note that it will be possible to Integrate attestation into the Chain as well so that validation of the health and integrity of a device that requests a transaction can be assured for the owner of the device enabling proof a transaction on a chain was done by a known device in a known condition with known controls for the owner of the device.
bobdigital @Steven Sprague - you mentioned having a product, is there a vid or a demo so we can see it in action?
AmyV @bobdigital -> I have been promised a narrated video of the beta we’re releasing this month. I should have it in the next few days (early next week at the latest). The current one is un-narrated. :slightly_smiling_face:
Leon At the token sale a lot of tokens were left unsold. These are currently vested by the company. Can you elaborate what will happen with those remaining tokens in the future? @Steven Sprague
bobdigital @AmyV - thanks, can we see the un-narrated? Please? :grin:
breastjar How will the blockchain add any value to your solution? I’m missing something
breastjar Or are the tokens more like shares?
Steven Sprague @M N The heart of the system is to prove attribution to the developer there is no anonymous code in the Rivetz Core if a back door where ever to be discovered it is possible to verify the source of that code. accidents can happen but what is important is to assure they are not repeated. the system also undergoes strong review and certifications at a number of levels from hardware on up.
AmyV @bobdigital - let me see if I can pry it out of their hands. :slightly_smiling_face:
Steven Sprague The purpose of the tokenis to both operate and monitize the system.
Shane It always sucks being the new guy, but new to crypto and Ark. Sounds like an amazing team, monetary potential is awesome, but even more interested in getting as far away from the central banking system as possible. Any advice on where to start or point me in the right direction?
Steven Sprague The integrity of the Chain is used to assure that Referance integrity measurements and policies are not altered. This is how a device can have automatic money that has policy so it can only be spent on specific utilities and not easily stolen by malware.
dr10 Not sure if I'm right, but I think "Sirin Labs" are working on a similar product like Rivetz. If you know them, what is the difference between Rivetz and Sirin Labs?
AmyV @dr10 -> They’re building their own hardware. Our product can be used with most hardware.
Steven Sprague @Shane Think of the model as living outside of the geospacial controlled systems. The Identity based models of blockchain are not bound by location. Just a network of secure devices and messages. Rivetz helps with the secure devices part. Tokens operate chains. Secure devices (Rivetz) operate tokens.
Steven Sprague Dr10 Rivetz will provide you with secure display and trusted input and Isolated measured execution in a Samsung S6 you already have.
djselery Pretty sure you just confused the new guy that doesn't know this is a live ama right now haha
Steven Sprague @djselery Just trying to help. :slightly_smiling_face:
Shane @Steven Sprague thank you man, i am trying to wrap my brain around the full scope and that helps!
dr10 It's all good :thumbsup:
M N @Steven Sprague this isnt' a tech question -- but what happened to your market cap here?
Leon Inflated futures price at HITBtc prior to token release
Steven Sprague @M N There was very early trading before the end of the ICO with 0 volume. As the company gets closer to delivering product and clearly showing the strength and potential of a few hundred million hardware wallets we think the market will understand what Drives Value.
sleepdeficit Sure... confused just the new guy... :stuck_out_tongue_winking_eye::
sleepdeficit @Steven Sprague So, basically use different metrics--like messages/device-associations/etc--to help authenticate? Like merkle tree of associations?
Shane haha pretty much but thats ok
Steven Sprague @sleepdeficit Yes Both internal and External measurements can be included prior to the release of a Private Key for 2FA, BTC, or secure messaging. The tech can be applied to blockchain but can be also used with Gmail or other services.
Shane thats why i'm here, to learn shit I don't know, no shame in that
JayCrypto Welcommen to ark
bobdigital So basically, Rivetz would turn my cell phone into a LedgeTrezor?
Steven Sprague We store a reference signature of the internal and external measurments and then assure that the same Reference is matched in realtime as a policy enforcement point on a decentralized basis.
Steven Sprague @bobdigital YES with benefit of realtime attestation that the gode is what you expect and the ability to add external controls like location or time of day.
clarissa- Turning my phone into a ledgetrezor, now that’s interesting.
M N @Steven Sprague are you PoW or PoS based? (edited)
clarissa- Interesting AND useful
breastjar So @Steven Sprague Does your app also work when my phone is offline
Steven Sprague You can think of Trusted execution as a Private smart contract running in your device to assure the policy you set is securely followed without sharing data to the public network. For example access to my 2FA is only possible if I am in my house to connect to my bank and I do not have to tell my bank I require it.
Steven Sprague @breastjar Yes,
dr10 What kind of ideas or use-cases do you see for IoT-devices and the internet of things in general?
mike does rivetz have a github repository available to look at?
dr10 With rivetz in use
sleepdeficit @mike GitHub Rivetz GitHub is where people build software. More than 26 million people use GitHub to discover, fork, and contribute to over 73 million projects.
1somad BRB, need to buy some RVT
mike can we add rivetz to a mobile wallet?
Steven Sprague @dr10 All of IoT is based on sending secure instruction very much like a wallet does for BTC. Rivetz provides the tools to hold you hotel Key securely or your Aston Martin keys. All of IOT needs data integrity as part of the model and Rivetz enables those capabilities. When you mix IOTA and RvT you can deliver end to end security. This will be more and more critical as people expect automated IOT operations.
bobdigital @Steven Sprague - RvT is currently an ERC20 coin. Are their plans to use the same tech on other chains?
dr10 Where is Rivetz based or where are your headquarters/offices?
tranzer Wasn't IOTA just announced as shit for IOT? 1 reply 7 hours ago View thread
sleepdeficit @Steven Sprague Can haz C++ libs?
Steven Sprague @mike Yes We are already engaged with a number of wallet providers and hope to add more.
Steven Sprague @sleepdeficit We will be providing the full tools and libraries in January Including support for C++
AmyV Steven didn’t say this! - @mike Yes We are already engaged with a number of wallet providers and hope to add more.
:wink: No announcements until the partnerships are official.
Steven Sprague @bobdigital The ERC20 Token is used today as the primary store of value for RvT the secondary store will be a utility account on a device that is funded and refunded by the EFC20 token We expect there to be multiple chains supported by RvT
moonman So the token is useless?
breastjar Will your product be available to both iOS and Android
clarissa- What I would really love to see one day is having a secure wallet (using rivetz tech) which can link up with tenx (or similar crypto to $) and work seamlessly with Google pay/Apple pay type of “pay wave” technology
clarissa- That’ll really go full circle
Shane So basically I can use a wallet, use/trade tokens through a smart phone and be safe and secure due to being backed by Rivetz, correct?
Steven Sprague @moonman The token is used to carry the attesation assurance between devices and services and to act as a source of Funds it is a utility token required to enable and operate the Rivetz hardware assurance capabilities.
moonman Why do you need that instead of a plain smart contract, except for artificial vendor lockdown?
numba1enigma alot of people giving thumbs up totally layed into me when asking about rivitz back when they were doing thier ico.
Auph What are the tangible assets of Rivetz at the moment?
Steven Sprague @Shane That is our goal to provide you with a safer and simpler experieince on 10's of millions of existing devices. Secure messaging will also assure that the data transmitted can be proven to come from a known source.
Steven Sprague @moonman The problem is if I steal your key or modify the data you send to a smart contract then it can not be proven. The integration of Trusted Execution to enhance the quality and provability of the instructions is key to the future of blockchain.
moonman How does the token help with that? It's not related to being an ERC20 token.
Steven Sprague @ auph approximately 26 Million dollars
Candler @Steven Sprague did you mean to type IOTA or did you mean IOT generally?
Auph How are they being valuated?
moonman Rivetz just sounds like a glorified VPN wrapped in an ERC20 token for the purpose of getting on on the ICO bubble.
moonman Explain how it isn't?
Steven Sprague @Candler I meant both. IOTA is an example of interesting tech but suffers form if I steal the private key you know nothing.
Candler ah I see, and rvt would shore up that problem for iota
arno What exactly is Trusted Execution?
Steven Sprague @moonman Rivetz leverage the 30 Billion investment in Isolated execution within the hardware processor of your Smart phone to execute Measured Isolated Code to assure the protection of your private key and the formation of an assured and provable instruction. It also can leverage realtime attestation to assure the measured Isolated enviroment is in the condition you expect and verify both Internal assurance controls and any External cloud controls or enterpise security and bind it into a digital proof of the transaction formation. Your private keys if stolen can not be detected. This how decentralized security needs to be built. Blockchain is by its nature can not be secured by classic enterpise network security tools.
moonman Can I get that without the buzzwords? VPN software can already utilize hardware to isolate execution.
whyfhy so can a tor node
whyfhy aka verge mining
moonman And if the phone has no way to execute in isolation your software wouldn't help. Are you also providing a hardware product?
Steven Sprague @arno Trusted Execution is a set of standards developed by the Trustedcomputing and and provide a measured and isolated execution within the chips on most modern processors.
ark__life :cold_sweat:
Delegate40 Why not just make a dapp and use Eth rather than your own token?
whyfhy :confused:
moonman If you're not providing a specific hardware product, then as I said you're just wrapping low level VPN-esque software in an ERC20 token and cashing in on the ICO bubble.
moonman What makes you different?
Steven Sprague @ moonman we only support Phones that have the embedded security Aproximately 1 billion have shipped in the last 4 years.
moonman Ok so you have no hardware product. You're a "VPN" with an ERC20 token then?
moonman Why use you over any other software that can utilize iPhone's embedded security?
sleepdeficit @moonman If Ark couldn't pay people to develop Ark, there wouldn't be much of a way to pay for Ark being developed.
Candler @Steven Sprague What are your thoughts on proof of stake model with Rivetz?
moonman @sleepdeficit Did companies not exist before cryptos? :hmmm:
sleepdeficit @moonman Of course they did, and new business models are always emerging.
Steven Sprague @moonman no a VPN is a connections based model and would not apply to a decentralized system as you can't "VPN"to bitcoin. the blockchain already uses secure messaging we ar emaking the formation of messages SAFE.
Auph iphone's embedded security is local, and it's not 100% safe. It can be hacked locally
moonman Hence why I put "VPN" in quotes. It's the same concept but different protocol/model.
moonman My question is why you need an ERC20 token to do this when there are no features that are gained by doing so other than vendor lockdown.
Steven Sprague @chandler Proof of stake is an interesting model with and proof of stake with Rivetz could be a very interesting way to build new models for Chains.
moonman I understand paying for software, I'm asking why an ERC20 token that ultimately is just an extension of ETH and ETH can do whatever you want to accomplish via smart contract (see: cryptokitties for proper use of dapps on the chain without tokens). (edited)
dr10 OK, we are approaching the 60 minutes mark. Any last questions for Rivetz team? Anything the team would like to add or tell - feel free to do.
Steven Sprague @moonman Have a look we did a cutome verion of a chain a year ago with fully embedded attestation so the nodes are policy enforement points We will transition in this direction as development matures.
moonman You're not answering my question though.
moonman So you intend to have your own chain?
moonman Why the ERC20 token then?
moonman Just to have an IOU for later?
numba1enigma civic has iou no
Steven Sprague @moonman We will use the ERC20 and our own chain in the long term We expect them to interact closely.
bobdigital @numba1enigma - yes they do. Others do too...
moonman Why are you using ERC20 instead of just ETH.
moonman It's a direct question.
moonman You don't need ERC20 to use smart contracts.
moonman Or for identification/auth/anything else you're doing.
sleepdeficit @moonman Is this different than crowdfunding, and is development into a sole platform a bad thing? (edited)
moonman Having a separate platform is good.
Steven Sprague @moonman We felt ERC20 was a good fit for us at the time
moonman The ERC20 token is what makes no sense.
moonman My question is why @Steven Sprague
moonman For crowdfunding exclusively then?
sleepdeficit @moonman Not speaking for them, but I'm sure different things became more obvious as development matured.
Steven Sprague Crowdfunding was a good fit for ERC20 The builiding of the token market is anew model for everyone.
breastjar If only ark had the “one-click” blockchain option finished
breastjar :trollbounce:
dr10 Okay, seems we're approached the end. Thank you Steven, Amy and Alex for taking the time to do this AMA! All the best with the project and you are always welcome to hang around our Slack.
P.S.: Feel free to share your website and social media pages. :thumbsup:
AmyV Thanks, @dr10 and to everyone for the excellent questions.
I think there were a few questions missed in the fray, and I’ll work with Steven to get them answered and share them with you. :slightly_smiling_face:
SuperCool :clapping:
whyfhy i know right ark has such a bright future , to bad 1 click blockchain didnt happen during ico bubble (i think its over imo i mean are you guys buying icos")
Endeby nice AMA!
Steven Sprague Thanks everyone for your time
submitted by Dr10tv to ArkEcosystem [link] [comments]

Izumi Archives

Self-Driving Cars Will Kill People. Who Decides Who Dies? by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
I agree. I'm fervently hoping it will be that way, but human psychology being what it is, it will be a tough case to make. What we need is a leap of faith to move into a better future. And I can only speak for myself, but I'm willing to bet myself on such a sure thing. Also in a post-scarcity AI economy, we need to remove the necessity of insurance. Also also in that future other elements will come together so that humans probably won't need to be transported nearly as much as today.
permalinksavecontextfull comments (10)editdelete
Self-Driving Cars Will Kill People. Who Decides Who Dies? by izumi3682 in Futurology

[–]izumi3682[S] 3 points 7 months ago
Two thoughts on this.
First, this is a failure to understand what an electric, level 5 autonomy SDV actually is. This is about AI and mapping and tracking. I don't think there will be any deaths if everything is working correctly. If there are imperfections in the system that does result in an injury or death of a human, we shall quickly fix that so it never happens again. The combination of AI, mapping, tracking and intervehicle communication would ensure that a "trolley problem" would never arise. But on an unrelated note, I'd wonder what else that kind of AI would be capable of.
This second observation is more about human psychology. Well right now about 32,000 US citizens die in human error caused MVAs each year. And probably a lot more injured or shook up too I bet. When any US citizen gets behind the wheel, he or she believes all will be well and he or she will not make any kind of error, even if they are getting into a car when intoxicated.
But the statistics bear out the fallacy of such logic. Tons of US citizens are being killed, injured or shook up despite believing that they can drive just fine or their fellow drivers can drive just fine.
Here's the rub though. I think it is not unreasonable to assume that level 5 autonomy vehicles with all that technology I described earlier will kill perhaps, ohhh, theoretically 10 US citizens each year due to errors intrinsic to AI or something improbable like being successfully hacked. That's a lot less than 32,000 a year. But what would be the acceptable threshold of casualties if such a vast number of US citizens could be transported so safely. I can tell you the answer to that. Less than 1. That's because humans don't want to feel that they have lost control.
If the number of SDV fatalities would be say 5000 a year, humans would say; "No thanks, we shall continue to control our vehicles and keep killing five or six times that number each year, because we are better at this than AI. The litigation alone would kill the technology.
Me, I'd trust the AI. And I will jump into a level 5 autonomy SDV as soon as earthly possible when they become available to me, hopefully on a super cheap subscription. I would totally sign an agreement saying I would not sue the renting company if an MVA happened to me in an electric, level 5 autonomy SDV that was struck by another SDV of similar capabilities, and that I would accept legal liability if my SDV ran into someone or something. My faith in the flawlessness of the AI and related technologies would be that strong.
permalinksavecontextfull comments (10)editdelete
Virtual reality tool developed to untangle genes by izumi3682 in Futurology

[–]izumi3682[S] 3 points 7 months ago
Now there is an interesting convergence of technologies. VR is going to help us figure out a lot of things that are difficult to spatially or topographically understand without the insight provided by VR. Like standing "inside" of an object as it rotates around you.
permalinksavecontextfull comments (1)editdelete
Scientist Predicts a Sixth Mass Extinction in 2100 by izumi3682 in Futurology

[–]izumi3682[S] 6 points 7 months ago
The difference in the human race between now (2017) and the year 2100 CE is going to be more vast than the difference between the human race in the year 1000 CE and today (2017). Things that we regard as serious problems today, will no longer exist as perceivable problems by that point. We may have new issues that are unimaginable today however.
Personally I doubt that humans or whatever derives will still be biological by the year 2100. What we think of as "VR" today will evolve to become the reality of 2100. And of course whatever the AI develops into as well.
permalinksavecontextfull comments (6)editdelete
Patreon, one of the most interesting media startups of the last few years, has raised $60 million by izumi3682 in Futurology

[–]izumi3682[S] 5 points 7 months ago
I started noticing an odd or perhaps interesting thing on Youtube about maybe 5 or 6 months ago. All my subscribing channels like "Ask a Mortician" and "Fatboss" began to have a large "Patreon" screen at the end of the video. I see now that a new entity has risen. I'm not sure where "Patreon" is going with this, but I bet I am witnessing the birth of a new Google or Facebook type of enterprise. Can I invest yet?
permalinksavecontextfull comments (5)editdelete
A Five-Year Basic Income Experiment is Finally Happening in the US: $2,000 a Month by izumi3682 in Futurology

[–]izumi3682[S] 7 points 7 months ago
More like "augmented" income. I would still totally have to work full-time. 4,000 dollars a month would be the absolute lowest acceptable amount that would enable me not to have to work full-time. And 4,000 a month ain't much money, but I would probably be able to live within my means. My tastes are pretty pedestrian. And I probably would be able to save some of that too.
What would I do instead of working? Well at first I would play videogames all the time and sleep. But I suppose I would eventually want to enhance my education. Part of my problem is that I'm 57 and after almost 38 years of working, I'm just starting to think that retirement is looking good. I'm getting tired of working. :P
The thing is, as long as there are enough gainfully employable occupations/vocations for humans to do work for money that allows them to have the best lifestyle that they can swing, UBI is just not possible. But. When the AI, automation and robotics cause our unemployment rate to reach a certain threshold, then UBI or some other kind of "post-scarcity" economy would become essential to further survival of our way of life.
I just don't see UBI ever being a realistic eventuality for the USA before that day. But it would sure be nice to "augment" my current salary with that extra 2k a month.
permalinksavecontextfull comments (16)editdelete
Spacex will call global internet satellite network Starlink by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
Because calling it "Skynet" would be too egregiously obvious.
permalinksavecontextfull comments (220)editdelete
Robots can hitch-hike on sharks thanks to ultrastrong sucker - Underwater robots could soon hitch rides on sharks and whales thanks to a fish-inspired suction cup that clamps on to shark skin and other surfaces. by bobcobble in Futurology

[–]izumi3682 2 points 7 months ago
One step closer to "sharks with frickin' laser beams attached to their heads!" Awesome future incoming!
permalinksavecontextfull comments (1)editdelete
The “Science Will Not Defeat Aging in my Lifetime so Why Bother?” Argument, and Why We Should be More Optimistic | by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
A human turning 100 years old today has a better than average chance of living for 20 more years. And that is just based on existing medical technology and the blessings of that individual's genetics. Between today and 20 years I bet we make some significant advances in interventional aging reversal technology.
I prophesy that the first person to be 1000 years old is turning 100 years old today. If you have not been following the medical advances in aging reversal technology, this claim sounds like the wildest fantasy, but you are the one ill-informed.
Senescent cell clearing technology alone will cause a 100 year old to potentially live until 130. Regenerative medicine will be beyond our wildest dreams in 30 years. Age related sarcopenia has officially been classified as a pathology (M62.84 ICD 10). Five years ago there was no such classification. Age related sarcopenia was simply regarded as a "natural aspect of aging". And this is not even counting advances in nano-tech, which is the true wildcard in all of this.
As it is, I see most super centenarians (those over the age of 110) living for the most part to the age of about 117. Emma Morano recently died at the age of 117. The next three oldest humans are all over the age of 114. And this cohort of people living over the age of 110 has increased dramatically.
The upshot of all of this is scientific immortality for me. And I am 57 years old. Sure I could get cancer in ten years or get hit by a truck tomorrow, but I think my chances are good. I will be 100 in 2060, but youthful as a 21 year old. (And probably crazy nano-augmented to boot.)
Unfortunately the "bean counters" realize this as well. So I think the odds of me being mandatorily worked until age 70 are also good. No more retirement at age 65. Now since this is futurology, perhaps something nice like UBI or the AI taking over or something will let me still retire relatively early.
Record to beat is Jeanne Calment who passed away in 1997 at the age of 122.
permalinksavecontextfull comments (1)editdelete
Future Cities, Built for People and Not Cars, Could Look Like This - more likely to resemble a medieval hill town in Italy than the soaring skyscrapers of Blade Runner: 'Technology’s end-goal is to be invisible.' by mvea in Futurology

[–]izumi3682 -2 points 7 months ago
lol! VR, AI and total self sufficiency will eliminate any desire to be in a big city. The Earth will rapidly return for the most part to wonderful untouched nature. Our virtual universes will exceed anything that reality today can produce. If you thought "The Matrix" was advanced, you ain't seen nothin' yet! You will get your "cities" I promise. But imagine sipping wine and smoking a lovely rich gauloises at an outdoor café on a lovely spring day in 1937 Paris and discussing with your compatriots (who think they are real) the worrisome developments in Germany, but you are the god(dess) in this simulation. Will you self limit and let your world's events take their course and observe history unfold or shall you intervene to see what happens? The power is in your hands.
permalinksavecontextfull comments (34)editdelete
Future Cities, Built for People and Not Cars, Could Look Like This - more likely to resemble a medieval hill town in Italy than the soaring skyscrapers of Blade Runner: 'Technology’s end-goal is to be invisible.' by mvea in Futurology

[–]izumi3682 1 point 7 months ago
Ohh! I so wish that was me... I could "exist" just fine I'm sure. I mean if I had lots of money and stuff.
permalinksavecontextfull comments (34)editdelete
Researchers Show How A.I. is the End of Passwords as We Know Them by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
I think the solution is facial scanning and recognition technology. Samsung showed it was possible and Apple is going to show how we have now nailed that technology. Doesn't seem like a terrible engineering problem to add a dinky pinhole size facial scanner to any given monitor manufactured from now on.
I mean the cat is out of the bag. Facial scanning/recognition technology is utterly unstoppable, so why not exploit it to the best effect.
permalinksavecontextfull comments (2)editdelete
The new $999 iPhone X proves 2 important things about the future of technology by izumi3682 in Futurology

[–]izumi3682[S] 2 points 7 months ago
What really has me excited about the progress of this tech is that say 2 years from now, the nearly obsolete IPhone X will be dirt cheap, about 200 dollars tops. There might even be plastic versions!
But just imagine what a top of the line mobile will be like then! Unimaginable things like 16K VR capability. It fills me with such optimism for our incredible future.
Yes 16K is a thing:
BTW have you downloaded and played with "Sketchfab" on your mobile yet? It's pretty keen and just one of the reasons that mobiles are so important to our daily lives now.
permalinksavecontextfull comments (4)editdelete
Future Cities, Built for People and Not Cars, Could Look Like This - more likely to resemble a medieval hill town in Italy than the soaring skyscrapers of Blade Runner: 'Technology’s end-goal is to be invisible.' by mvea in Futurology

[–]izumi3682 1 point 7 months ago
Time going forward, humans, individual humans will find it easier and easier to live comfortably "off the grid". Technological advances, particularly that of solar in concert with powerful, capacious energy storage batteries, will make it possible to basically produce your own energy. Once a human can produce his or her own energy, everything else falls into place such as water purification.
VR, yet in it's infancy is not going to go away. It is going to evolve and grow into a new medium so powerful and overwhelming, that I don't discount the possibility that humans will engineer our minds away from the needs of biology to fully exploit this technology. Not today maybe or next month, but in less than 100 years, oh yeah.
And nothing happens in a vacuum. All during this time, I'm confident we shall learn how to effectively interact with our AI through what we think of today as the BMI (Brain-Machine-Interface). Humans will no longer be the same. We shall be for lack of a better term, "as gods". If not omniscient, right close. Almost certainly a desirable "hive-mind" will evolve.
I'll be able to do all this in my little apartment, my universal 3D printer providing all I need from a nano-assembler that can draw raw materials out of the air! Well I may have overreached a bit just then. But I wonder that money or personal wealth may even matter, when we reach that level of self-sufficiency.
I believe we shall spend an awful lot of time in shared VR. VR worlds that exceed the wildest most beautiful natural places on Earth. Because that's what humans do. We take nature and improve on it exponentially once we figure it out. And believe me, even today in 2017 we are doing a phenomenal job of imitating/simulating physics, thus nature on computers.
Oh! I almost forgot about cars!
What would you need a car for? :P
permalinksavecontextfull comments (34)editdelete
Chinese Smartphone Maker Promises to Outdo Apple With "The Real AI Phone" by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
The proof is in the pudding. We'll see what they come up with. I don't discount what China has to say out of hand. The absolutely staggering amount of technological progress that China has achieved within the last 10 years alone gives me pause. And yes I know they did that by hook or by crook, but the fact remains that China is rapidly equaling and/or exceeding pretty much any technological advance being made by the USA. I also see evidence that China's AI efforts for general consumer use exceed that of the West as well.
But we shall also see what the Apple IPhone X has to offer as well. In any event I see that human civilization is going to make a substantial leap forward in AI and mobile computer processing power going forward from here. A much higher bar has been set. Also while I have this forum, I'd like to pass on this message... PLEASE turn your phone sideways to record stuff--Thank you! --"The rest of the world".
permalinksavecontextfull comments (1)editdelete
Superpower India to Replace China as Growth Engine by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
Yes, I said that in my second paragraph.
permalinksavecontextfull comments (4)editdelete
Move Over Millennials, Here Comes 'iGen' ... Or Maybe Not by izumi3682 in Futurology

[–]izumi3682[S] 3 points 7 months ago
If you think the so-called "iGen" is crazy, just wait until the children that are now 3 and 4 grow up in a world where they have always known mobiles, VAR and AI. AI in everything, from no more driving lessons to AI assistants to boss around with loud impatient voices.
permalinksavecontextfull comments (1)editdelete
Virtual reality breathes new life into African fossils, art and artefacts by izumi3682 in Futurology

[–]izumi3682[S] 2 points 7 months ago
Oh! Try this out! I can't get it to work on my work pc, but that's because it's a work pc. On my home pc and my iphone 7 it works just fine.
This is just 2D on a screen. The future of VR is going to be absolutely insane. Beyond anything we can imagine.
(I recommend just downloading "Sketchfab" on any pc or mobile you have. An incredible combination of computer processing power and narrow AI.)
permalinksavecontextfull comments (3)editdelete
In the Future, Pop Hits Will Be Made by Machines by izumi3682 in Futurology

[–]izumi3682[S] 3 points 7 months ago
For the person, that sounds like a pretty good deal.
permalinksavecontextfull comments (19)editdelete
Deep Learning Could Finally Make Robots Useful by izumi3682 in Futurology

[–]izumi3682[S] 2 points 7 months ago
In what year will I see a humanoid robot like say, "Sophia" from Hanson Robotics mixed with a deep learning ability. Oh, and then that "Sophia" robot could have these new-fangled "soft" muscles that are all the news today as well. That would be quite an accomplishment.
But why stop there. How soon until we can use narrow AI and new robotics technology to allow humanoid robots to walk the streets with humans. Would that be OK with everybody? What year will I see that I wonder.
I bet it's all gonna happen in about 20 years or less. So I'll be about 77 years chronologically. I wonder if I'll have a little age-reversing on me by then.
permalinksavecontextfull comments (4)editdelete
Make a 3D model of your face from a single photo with this AI tool by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
Could we make motion pictures of anybody in history that was photographed? Imagine, genuine motion picture images of Abraham Lincoln or, ...well I'm sure there are other famous people from after photography's invention, but before motion pictures. But mainly it was Lincoln who popped into my imagination.
permalinksavecontextfull comments (3)editdelete
Massive demand will see 5G phones arrive in 2019 says Qualcomm by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
Yeah, that's my point. Apple "steals" everyone else's ideas and perfects them to the point that they are irresistible somehow. That's what Apple does. I'm not saying it's good or bad. I'm saying that's why I trust Apple for my mobile.
permalinksavecontextfull comments (24)editdelete
In the Future, Pop Hits Will Be Made by Machines by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
What I am about to state was 10 years ago, wildest fantasy. How times have changed.
It's quite simple actually. Our computers can now process stupendous, colossal amounts of "big data". Literally more data than you can imagine or even hold in your physical brain if you could. Among that data are our likes and dislikes. Also what all of our songs sound like, what all of our art looks like, how all of our motion pictures and plays and performances are accomplished. Pretty much everything we have written down. And probably tons of other data I can't recall offhand. Also screamingly funny cat videos.
Now the computers that we have use a multitude of clever human ideas like machine learning, convolutional neural networks, and I'm certain some other marvelous methods of collating, analyzing and deconstructing all that data for actionable information. This involves things like identifying edges and light and shadow, word patterns and lots of confusing criss-crossy lines in the diagrams I look at. But I'm pretty sure it knows what it is doing.
Then our computers can use "predictive analysis" to develop models of varying degrees of confidence that are constantly tested against a sort of intrinsic "critic" that says thumbs up or thumbs down based on all that big data and that collating and whatnot.
Then it spits out the "highest confidence" result. Humans experience whatever it is and send their own feedback into the computer, which assimilates any novel data from that human feedback and tweaks its models to eventually precisely push the emotional buttons that make a song "haunting" an art piece "compelling" or videos "screamingly funny".
The AI is not going to get worse at "creativity". It's going to surpass human efforts in short order. Humans will come to prefer AI art to that of inferior "human" art. What kind of world will that be? And that is just in art and stuff. The AI will dominate everything else as well. And believe it or not that is still "narrow" AI. Just wait until we successfully develop artificial general intelligence (AGI). Then we either adapt or die. And in that meantime...
"Humans Need Not Apply".
Here is a computer algorithm using narrow AI-big data-CNN-predictive analysis to model human faces that don't exist in real life. They don't look too bad today. Yes, they need work. But in about 5 years--wow! OMG!
(Run your mouse cursor over the face to really get creeped out. Click the black space on either side to see others.)
permalinksavecontextfull comments (19)editdelete
True, Bitcoin May Become Corrupt. But Banks Already Are. by izumi3682 in Futurology

[–]izumi3682[S] 1 point 7 months ago
I thought we were trying to move away from this mess. I thought the goal was the dream of Peter Diamandis' "Post-Scarcity" society. But instead we just seem to be adding more confusing layers of crap that enables those in the know to make massive amounts of money on the backs of those not as clever. The 1% persists, the 99% persists to fail.
I certainly look forward to the day when we can put AI inside of our minds and no one can be fooled or tricked or deceived any longer. I bet a lot of people think that making all humans super intelligent would not be such a good idea. It would definitely "upset the apple cart" of business as usual.
But who am I kidding. The 1% will get that AI inside of their minds and the rest of us will be their willing slaves or simply exterminated to get rid of the "surplus population" and make the Earth a nicer place to live for the 1%.
permalinksavecontextfull comments (1)editdelete
A billion new low-cost employees from china didn't cause unemployment. Why should some puny robots scare us ? by furyfairy in Futurology

[–]izumi3682 1 point 7 months ago
I think I can sum it up fairly succinctly. The industrial revolution replaced human (and horse) (and oxen) muscle. The AI revolution will replace the human mind. Watch this space in 10 years.
submitted by izumi3682 to u/izumi3682 [link] [comments]

Hack Free 1 Bitcoin on Android Iphone with Proof Working Review✅ Bitcoin hacker exposed with Proof! How my channel got ... How to hack bitcoin mining app and get 0.8 bitcoin everyday 600$ BTC HACK  SEE MY PAYMENT PROOF  100% WORKING METHOD Win Up To 9 Bitcoin Hack Payment proof 2019

Infopackets Reader Nathan J. writes: " Dear Dennis, I recently received an email stating that hackers have hacked my phone. As proof of their hack, they gave me the last 2 digits of my phone number. They claim to have uploaded spying software on my phone and have supposedly 'caught me' visiting raunchy websites. To keep this quiet, they are demanding bitcoin payment of $800 Almost every version of Apple's iPhone operating system — from iOS 10 through to the latest version of iOS 12 — was vulnerable, he said. Still, it's unclear how many users might have been ... By: Kevin Helms Mobile cybersecurity firm Sikur has unveiled "the first fully encrypted, hack-proof smartphone that can safely store cryptocurrencies." The phone's hardware and software were built from the ground up with a dedicated bitcoin wallet and a custom app store for high-security apps. Sikur unveiled a new, security-centric smartphone this week at Mobile World Congress in Barcelona, Spain. This bitcoin wallet claims to be hack-proof. Share on Facebook. Share on Twitter . Michelle Yan almost 3 years ago The HooFoo wallet claims it can keep all your cryptocurrencies safe from hackers ... 12 ways to hack-proof your smartphone Protect your privacy, your data and your peace of mind with this guide to beating thieves, whether they’re online or on the street Darien Graham-Smith

[index] [3506] [9540] [30636] [46028] [36205] [49829] [32849] [40801] [12687] [10286]

Hack Free 1 Bitcoin on Android Iphone with Proof Working Review✅

How I Made My Own iPhone - in China - Duration: 23 ... 100% Working FREE Bitcoin Hack! - Video Proof! (Android/iOS) - Duration: 4:14. Android Squad 93,017 views. 4:14. How to Buy Cryptocurrency ... Jeff Bezos & Amazon Live, Bitcoin BTC, Worldwide Crisis Amazon Live 14,823 watching Live now North Korea / The Lies and Truth of Kim Jong Un / How People Live (2019) - Duration: 52:48. ANDROID PHONE MINING APP MINE 0.05BTC in 2 Minutes with an Android phone - Duration: 6:54. Bitcoin Hack 68,814 views. 6:54. Free Live Withdraw Proof -Hashrapid.Io 100 % free withdraw no need any ... (2019) 100% Working FREE Bitcoin Hack! - Video Proof! (Android/iOS) Hey Guyz In this video i will show you how to hack Bitcoins and earn unlimited bitcoins D... Hey guys BioBoy here Today I uploaded how my channel got hacked Hacker exposed 100% True Hackers channel-It is plz l...