How to compile and install Bitcoin Core on Debian - Gamuza ...

Electrum forces users to upgrade clients to prevent phishing messages

Electrum forces users to upgrade clients to prevent phishing messages submitted by Rattlesnake_Mullet to Bitcoin [link] [comments]

Best Dedicated Server in Miami

https://hostingultraso.com/dedicated-serveMiami

Business and Technology around Miami

This is the city in Florida and the main economical and financial hub. It has emerged as one of the strongest international business community. The leading business trend makes it so special and popular among other countries in the South USA. The technology is too sound to suit the business culture and modern lifestyle here.
Hosting Ultraso is looking to provide a best-dedicated server hosting service to enhance the performance of business websites in a more convincing way.
Our long tail of dedicated servers spread everywhere across the globe including more than 119 countries.

Why do you need a Dedicated Server in Miami?

As your business expands more with higher traffic each day, it unfolds the demand for a dedicated hosting. A dedicated server can make your website continue to grow with more clients engagement and have a huge success.
Our dedicated server in Miami is so way configured that it can easily meet your business plans and ideas. We are providing ample hardware resources with our dedicated server in Miami and a smarter CPanel loaded with advance software packages and tools which are fully customizable.
We are providing the finest security management technology with our dedicated server in Miami to protect all resources from intrinsic cyber-attacks and the dedicated IP address keeps the website free from SEO issues. The latest IPMI or Intelligent Platform Monitoring Interface monitors the server’s physical health frequently.
Our assurance is for the lowest latency rate and high-speed rendering. Our data centers are effectively managing the load balancing.
We have an expert technical team well trained and skilled to help you in your problems and without any delay serve you all 24/7.

Different Operating Systems that we provide in Miami

What are the different Dedicated Servers we provide in Miami?

We are mainly providing unmanaged dedicated servers that needed to be self-managed and on some special business needs, we do provide a managed dedicated server.
We have demand for our Linux dedicated server, Windows dedicated server, and an Unmetered dedicated server. We are here to make you avail a cheap dedicated server as well.

Configurations of our Dedicated Servers

Our dedicated server in Miami has smart and super-fast Intel Xeon E5 processors with a 1 Gbps 10 TB bandwidth capacity. There are RAMs with 16 to 128 GB capacities. The hard drives are SSD SATA based on several storage capacities. For more details, you can check the configuration server link on our website.
We are providing an extra free IP address with the chargeless installation. We do support both IPV4 and IPV6 address formats. We are providing the option for the clustering of servers.

The benefits you get from Hosting Ultraso with our Dedicated Server in Miami

Buy a dedicated server from us and become the lucky getter of amazing benefits with an affordable dedicated hosting plan.
submitted by Hosting_Ultraso1 to u/Hosting_Ultraso1 [link] [comments]

⟳ 870 apps added, 78 updated at f-droid.org

Notice: this update is spurious, and the issue is being looked at.
⟳ f-droid.org from Wed, 26 Feb 2020 20:21:50 GMT updated on Sun, 01 Mar 2020 05:23:29 GMT contains 2962 apps.
Added (870)
Updated (78)
2020-03-01T05:53:18Z
submitted by BrainstormBot to FDroidUpdates [link] [comments]

Just a warning about the electrum bitcoin wallet on debian sid

I installed electrum from the repository today and when I tried to send some bitcoin I received an extremely convincing pop-up in the client with pictures and everything saying that my client was out of date and that I needed to visit the site to update. Of course the site linked was electrum.la as opposed to the official electrum.org. Luckily I noticed this pretty fast, but this is definitely one of the most advanced phishing schemes I have seen to date. The electrum package seriously needs updating, I even found a bug report about it from 3 months that hasn't been resolved. Over $3m has been stolen using this phishing scheme and that number is increasing every day.
tl;dr install electrum from source on the official site, do NOT use the package right now
submitted by voidsource0 to debian [link] [comments]

Ethereum on ARM. Geth and Parity clients update. Status.im, IPFS and Swarm packages. Raiden Network and Trinity client installers.

EthArmbian [1] is a custom Linux image for the NanoPC-T4 ARM SoC [2] that runs Geth or Parity Ethereum clients as a boot service and automatically turns the device into a full Ethereum node.
Once powered up, the image takes care of all steps, from setting up the environment to running the Ethereum client and synchronizing the blockchain.
Edit: Images links are now Ready for Constantinople and Petersburg Hardforks. You can update Geth to 1.8.22 and Parity to 2.2.9 from these images by running:
update-ethereum
This is a new release of the EthArmbian image for the NanoPC-T4 ARM board. Ethereum is evolving quickly so it is time to include some other interesting pieces of the ecosystem. Changelog:

Download links

Armbian_5.74_Nanopct4_Ubuntu_bionic_default_4.4.172-1-geth.img.zip
Armbian_5.74_Nanopct4_Ubuntu_bionic_default_4.4.172-1-parity.img.zip
Note: The only difference between both images is the default client that runs at boot time. You can switch between Geth or Parity at anytime.
For further info regarding installation and usage please visit Github README [1]

Status.im, IPFS and Swarm

Status [5] is a decentralized messaging & browsing app (using the Whisper protocol). And as any P2P system, it needs… peers. So if you want to support it, status is now included as a systemd service, configured in whisper and mailserver mode.
You need to start it manually as it doesn’t run by default:
sudo systemctl start status.im
And, if you want it to get started on boot you need:
sudo systemctl enable status.im
Configuration options are located in /etc/ethereum/status.im.json.
Why run a Status node? (from their FAQ):
Currently, we don’t provide any incentives for running Status Nodes. We are working hard to solve this problem. Our intent is to increase the size of the Whisper network, thereby improving how “decentralized” and safe our platform is.
Another reason is privacy. In the current setup, nodes that are running as Mail Servers are trusted. This means that such a node can communicate directly with the Status app using a p2p connection and some metadata might leak. If one wants to avoid that, the best option is to run a Mail Server on your own and configure it in the Status app.
Another important piece of the so called web 3 is decentralized storage. The most mature option available is IPFS [6] which is now included as a systemd service as well. You need to start it manually as it doesn’t run for default:
sudo systemctl start ipfs
If you want IPFS to get started on boot you need to enable it by running:
sudo systemctl enable ipfs
You can tweak config options in /home/ethereum/.ipfs/config file (particularly, you may want to adjust the StorageMax parameter).
Swarm [7] (Ethereum decentralized storage solution) is available as a binary. You may want to take a look at the official docs to start testing it.
You can run these clients along with Geth or Parity client with no performance issues.

Raiden and Trinity

As you may know, Raiden Network [8] is a Layer 2 scalability solution (similar to Bitcoin's Lightning Network). Trinity [9] is a new Ethereum client developed entirely in Python (and already working on the beacon chain).
You can install both clients by running its corresponding bash script. Take into account that both are in alpha stage so expect some trouble and give back feedback to developers, if possible. They are not properly packaged yet so the script installs them directly from Github (it takes a while).
Installation: Type (as ethereum user):
install-trinity
install-raiden
You can now run "trinity" or "raiden" commands.
Note on Trinity: If you experience this issue: “trinity: error: Timed out waiting for database start”, try to increase wait_for_ipc() “timeout” value in /uslocal/lib/python3.6/dist-packages/trinity/utils/ipc.py [10]

Ethereum nodes FUD

We’ve been seeing lately a lot of misinformation about Ethereum blockchain size and other kind of FUD.
Stick to the facts. With Parity, it just takes several hours to get a full node up and running and you need about 140 GB of SSD disk size (2-3 days with Geth and 150GB of disk size). So, you could run a full node for several months even with a 256GB SSD unit. Don’t listen to this kind of nonsense. Plain and simple: they are wrong.
This "guy" knows [11]

References

[1] https://github.com/diglos/userpatches
[2] https://www.friendlyarm.com/index.php?route=product/product&product_id=225
[3] https://github.com/ethereum/go-ethereum/releases/tag/v1.8.21
[4] https://github.com/paritytech/parity-ethereum/releases/tag/v2.2.7
[5] https://status.im/
[6] https://ipfs.io/
[7] https://swarm-guide.readthedocs.io/en/latest/introduction.html
[8] https://raiden.network/
[9] https://trinity.ethereum.org/
[10] https://github.com/ethereum/trinity/issues/182
https://github.com/ethereum/trinity/pull/192/commits/e19326689cbb08fd81c1827a7a3ab41200bbbeff
[11] https://twitter.com/ethnodesize
submitted by diglos76 to ethereum [link] [comments]

Problems checking wallet, bitcoin core on another server

So my setup is that currently Bitcoin core is running on a Windows server, and joinmarket is a fresh install on debian. Bitcoin core is a full node, no pruning, fully synced. I had some problems opening up RPC but I think that part works now (no longer getting timeouts).
But instead this happens:
[email protected]:/home/johan/joinmarket-0.2.3# python wallet-tool.py wallet.json 2019-08-22 12:12:57,613 [MainThread ] [INFO ] hello joinmarket 2019-08-22 12:12:57,613 [MainThread ] [INFO ] Joinmarket directory is: /home/johan/joinmarket-0.2.3 Enter wallet decryption passphrase: 2019-08-22 12:13:07,323 [MainThread ] [INFO ] requesting detailed wallet history from Bitcoin Core client Traceback (most recent call last): File "wallet-tool.py", line 126, in  sync_wallet(wallet, fast=options.fastsync) File "/home/johan/joinmarket-0.2.3/joinmarket/blockchaininterface.py", line 79, in sync_wallet jm_single().bc_interface.sync_wallet(wallet) File "/home/johan/joinmarket-0.2.3/joinmarket/blockchaininterface.py", line 959, in sync_wallet super(BitcoinCoreInterface, self).sync_wallet(wallet) File "/home/johan/joinmarket-0.2.3/joinmarket/blockchaininterface.py", line 88, in sync_wallet self.sync_addresses(wallet) File "/home/johan/joinmarket-0.2.3/joinmarket/blockchaininterface.py", line 1065, in sync_addresses imported_addr_set = set(self.rpc('getaddressesbyaccount', [wallet_name])) File "/home/johan/joinmarket-0.2.3/joinmarket/blockchaininterface.py", line 935, in rpc res = self.jsonRpc.call(method, args) File "/home/johan/joinmarket-0.2.3/joinmarket/jsonrpc.py", line 117, in call raise JsonRpcError(response["error"]) joinmarket.jsonrpc.JsonRpcError [email protected]:/home/johan/joinmarket-0.2.3# 
Any idea what could be wrong? I am stuck....
submitted by hides_dirty_secrets to joinmarket [link] [comments]

Vertnode - An automated solution for installing Vertcoin node(s) on Single Board Computers

Hello Vertcoin Community,
Eager to contribute to the Vertcoin Community I began creating step by step walkthrough guides on how to get a Vertcoin node up and running on a Raspberry Pi, Raspberry Pi Zero and Intel NUC. Along with information to get a Vertcoin node up and running was also optional steps to install p2pool-vtc.
I decided that while this step by step guide might be helpful to a few, a setup script may prove to be useful to a wider range of people. I have this script to a point where I think it may be productive to share with a bigger audience, for those who are brave and have this hardware sitting around or like to tinker with projects; I invite you to test this setup script if you are interested, if you run into errors any sort of verbose console output of the error proves to be extremely helpful in troubleshooting.
The script was designed to produce a “headless” server... meaning we will not be using a GUI to configure Vertcoin or check to see how things are running. In fact, once the server is set up, you will only interact with it using command line calls over SSH. The idea is to have this full node be simple, low-power, with optimized memory usage and something that “just runs” in your basement, closet, etc.
Why run a headless node on a Single Board Computer?
The idea is to have this full node be simple, low-power, with optimized memory usage and something that “just runs” in your basement, closet, etc.
Required: USB Flash Drive 6GB - 32GB
Please note that the script was designed for Single Board Computers first and looks for an accessible USB Flash Drive to use for storing the blockchain and swap file, as constant writing to a microSD can degrade the health of the microSD.
Supports

Hardware

All of the hardware listed above is hardware that I have personally tested / am testing on myself. The plan is to continue expanding my arsenal of single board computers and continue to add support for more hardware to ensure as much compatibility as possible.
Functionality
It is worth noting that LIT can be ran with multiple configurations, the ones displayed in the Post Installation Report reflect values that run LIT with the Vertcoin Mainnet. Please be aware that the Vertcoin Testnet chain has not been mined 100% of the time in the past, if you make transactions on the Vertcoin testnet that do not go through it is likely because the chain has stopped being mined.
BE CAREFUL WITH YOUR COINS, ONLY TEST WITH WHAT YOU ARE OKAY WITH LOSING IF YOU USE THE MAINNET.

Vertcoin Testnet Coins

https://tvtc.blkidx.org/faucet/
I've included some documentation on LIT I created which includes information I found to be useful: https://github.com/e-corp-sam-sepiol/vertnode/blob/mastedocs/lit.md
Please visit the mit-dci/lit github repository for the most up to date information on lit: https://github.com/mit-dci/lit

Vertnode | Automated Vertcoin Node Installation Script

https://github.com/e-corp-sam-sepiol/vertnode

Recommended: Use Etcher to install the chosen OS to your microSD card / USB flash drive.

If you intend on installing Ubuntu Server 16.04 to your Intel NUC please use Etcher to install the .iso to your USB flash drive.
https://etcher.io/
PLEASE NOTE THIS SCRIPT MAY GIVE AN ERROR. THIS IS THE NATURE OF TESTING. PLEASE REPORT YOUR ERRORS IF YOU WANT THEM TO BE FIXED/RESOLVED. THANK YOU FOR BETTERING THE DEVELOPMENT OF THIS SCRIPT.

Ubuntu Server 16.04 Setup Details

You can use different clients to ssh into your node. One option is using PuTTY or Git Bash on Windows which is included in the desktop version of Git. If you are using Linux you can simply open a new terminal window and ssh to the IP address of your node (hardware you intend installing the Vertcoin node on).
You will need to know the IP address of your node, this can be found on your router page.
ssh 192.168.1.5 -l pi For example, this command uses ssh to login to 192.168.1.5 using the -l login name of pi. The IP address of your node will likely be different for you, in this example I am logging into a Raspberry Pi which has a default login name of pi.
A brief list of commands that can be used to check on the Vertcoin node status:
vertcoin-cli getblockchaininfo | Grab information about your blockchain
vertcoin-cli getblockcount | Grab the current count of blocks on your node
vertcoin-cli getconnectioncount | Grab the current count of connections to your node. A number of connections larger than 8 means that you have incoming connections to your node. The default settings are to make 8 outgoing connections. If you want incoming connections please port forward your Raspberry Pi in your Router settings page.
vertcoin-cli getpeerinfo | Grab the information about the peers you have connected to / are connected to
vertcoin-cli getnettotals | Grab network data, how much downloaded/upload displayed in bytes
tail -f ~/.vertcoin/debug.log | Output the latest lines in the Vertcoin debug.log to see verbose information about the Vertcoin daemon (ctrl+c to stop)
Thank you to all who have helped me and inspired me thus far, @b17z, @jamesl22, @vertcoinmarketingteam, @canen, @flakfired, @etang600, @BDF, @tucker178, @Xer0
This work is dedicated to the users of Vertcoin, thank you for making this possible.
7/20/2018 Thank you @CommodoreAmiga for the incredibly generous tip <3
You can reach me @Sam Sepiol#3396 on the Vertcoin Discord, here on reddit or @ [email protected]
submitted by ecorp-sam-sepiol to vertcoin [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to C_S_T [link] [comments]

Atomic Wallet - The Best Universal Litecoin Wallet!

Atomic Wallet - The Best Universal Litecoin Wallet!
Atomic Wallet - The Best Universal Litecoin Wallet!
Hello, valuable crypto money followers. In this article, I would like to talk to you about the Atomic Wallet project.
Just as we all know that the cryptocurrency industry have gotten to a level where it can’t be stopped any-longer, we should also remember that this technology is still being faced with the challenge of fiat to crypto exchange because several individuals that are interested in purchasing and investing in cryptocurrencies do not have a good platform to easily convert their local currencies to bitcoin or other crypto assets.
Atomic wallet team have recognised this cogent issue and as such, they have come up with the great solution of integrating Simplex which is the largest licensed card processing company in the European Union.
Atomic wallet as we all know is a multi-feature wallet which affords its users the ability to store and manage 300+ cryptocurrencies, exchange their cryptocurrencies assets easily into other cryptocurrencies, monitor the current price of the supported cryptocurrencies among other features.

What Does the Project Promise?
Indeed the task is focused; to deal with our crypto cash resources dependably and to work through a progressively secure framework. So how is this going to be? A standout amongst the most critical issues that separates the Atomic Wallet venture from different activities is; rather than crypto trades on this stage, rather than keeping all crypto keys on the stock trades, they keep this data on clients’ gadgets. The clarification is that; We are never again ready to take our private keys and we are exceptionally protected. This is a great improvement …

What are the exceptional features of this wallet

· Ability to control your private keys by yourself only
· Private and anonymous transactions which prevents you from being hacked
· Easy to use built in cryptocurrency exchange
· Excellent user interface
· Always active customer support
· Reliable security measures which ensures the safety of users’ funds
· Very cheap and affordable transaction fees

What is Litecoin wallet?

You need to use a program to manage your Litecoins, it will keep your private keys and provide additional functions such as sending, receiving, exchanging, and more. With these programs, you’re able to manage and control your funds.

Signs of a good Litecoin Wallet

1. Security. Wallet security means the way your Litecoins and other cryptos are protected from frauds and hacking, how you manage private keys and what security technologies a particular wallet supports.
2. Accessibility. This feature implies simplicity in use and the ability to withdraw your funds from the wallet. A friendly user interface is a vital point for new users. When choosing a litecoin wallet, pay attention to its interface and the amounts you are able to operate with.
3. Functionality. If you want to choose a good LTC wallet, check it for additional services support, such as an ability to exchange cryptocurrency or buy crypto with a bank-card/paypal, etc.) In some wallets, like Atomic or Exodus, it’s possible to exchange Litecoin right in the application without visiting third party websites. Cryptocurrency will be transferred directly on your address after the exchange.

How does the framework work?
A standout amongst the most loved pieces of the stage is; individuals can make their very own requests for the trade between digital currencies, and they can be incorporated into the change orders made by others, this is extremely extraordinary …
To clarify this with a precedent; Let’s say I have a tad of Litecoin. I would prefer not to transform this Litecoini into dollars or Btc. So I need to get Lost with Ltc straightforwardly. You can change over Ltc to Iost by means of Exchange over the stage. You can even enter the sum physically in the event that you need. Right now you endorse the Exchange procedure, the Atomic Wallet begins the procedure to compute the most fitting commission and exchange the token at the greatest rate with the base expense. In this manner, as in the Ethereum framework, the cost of Gas isn’t given to the reasons, for example, the low token isn’t sent tokenize.
The Atomic Wallet application has been deliberately arranged to be utilized on each stage to contact all crowds. These stages; MacOS, Windows, Ubuntu, Debian and Fedora.
4. Customer Support. This is a vitally important to receive a fast reply on users concerns and help with troubleshooting. Good customer care is a sign of a good product. How fast will the support team help you, if you have any troubles? Crypto market is too volatile to wait days/weeks till someone will the issue. It is a good practice to reply within 24 hours.
How to setup Litecoin Wallet
Manage your Litecoin wisely! Learn how to setup Atomic Wallet to send, receive, exchange and buy LTC.
Buy Litecoin in a secure way
Install Atomic Wallet
Download the app. Atomic is a free and secure place to manage Bitcoin, Ethereum, XRP and more than 300+ assets.
Verify your Identity
Verification is required to prevent identity theft or fraud. Photo ID is required to make sure it's really you.
Get Litecoin
Start with $50 and up to $20,000 daily. Receive crypto on your wallet. Credit/Debit cards accepted. Get Wallet
Buy Litecoin with Credit Card
There are many ways to buy Litecoin (exchanges, hot wallets), but one of the most secure way to buy LTC is to use Atomic Wallet. With Atomic, you can easily purchase LTC, BTC, ETH, XRP, BCH and hold 300+ coins and tokens in one place where only you control your funds. Hold them and manage with comfortable interface.

You can buy Litecoin with VISA/MasterCard right in the interface of Atomic Walletand convert your USD or EUR to LTC.

Even if you have a JPY, CAD or any other currency card, those currencies are automatically converted to either EUR or USD, depending on your choice. It’s quite easy to use and doesn’t require specific tech skills.

Rates and Security

The fees are fixed at 7%. Each operation is fully conducted by Simplex, an EU licensed card processing company. You choose an amount and currency to buy and verify your ID. Then your bank holds funds until Simplex approves the request and makes an exchange. As a rule, you receive crypto in 24 hours.
As a result, the creation of an appropriate application will undoubtedly increase the use of the Atom Wallet for some customers. According to the designers, more than 100,000 people have downloaded the Atom Wallet since the effort was disbanded. Most people use the wallet routinely. This is an approved sign of trust in the wallet! I'm sure that the full delivery of compact apps on Android and iOS will be another upgrade to attract new customers.
This review is the author's personal opinion, based on information from public sources and is certainly not a trade or investment advice.

For more information about the project:

Author: hussnill
BitcoinTalk Profil: https://bitcointalk.org/index.php?action=profile;u=2392652
submitted by hussnill to ico [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracy [link] [comments]

Homelab collective ressources post!

Hey guys!
I'm fairly new to this sub and to having a home lab in general and I found this community to be so kind and helping, I wanted to give back what I've learned. I'm seeing a lot of questions asked around on improvements and on what to do with x extra hardware so I thought it would be nice to have a thread to regroup that.
 
I'll put here some stuff I gathered and the most common questions I've seen, feel free to contribute and i'll update the post along.
 
Latest Additions
 
Homelab Dashboard
Posts about dashboards have been growing lately and here are some of the best that were kind enough to provide us with their sources.
User Screenshot Source
yours truly http://imgur.com/a/GhCNH https://github.com/Gabisonfire/dashboard-q
lastditchefrt http://i.imgur.com/5zQdao4.png https://github.com/d4rk22/Network-Status-Page
_SleepingBag_ http://i.imgur.com/Ql9ZM4W.png https://github.com/jsank/homelabdash
NiknakSi https://niknak.org/extras/sysinfo TBA
DainBramaged http://imgur.com/jYNlUEQ https://github.com/gordonturneBigBoard
michaelh4u https://i.imgur.com/XkZwMKj.png https://github.com/michaelh4u/homelabfrontpage
spigotx http://imgur.com/a/1zMht https://github.com/spigotx/HomeLab2
SirMaster https://nicko88.com/ https://github.com/dashbad/plex-server-status
yourofl10 http://imgur.com/a/AyROa TBA
TheBobWiley http://imgur.com/a/oU6d3 https://github.com/TheBobWiley/ManageThis-LandingPages
0110010001100010 http://i.imgur.com/iwtQcsL.jpg https://github.com/danodemano/monitoring-scripts
mescon & SyNiK4L https://i.imgur.com/gqdVM6p.jpg https://github.com/mescon/Muximux
ak_rex http://i.imgur.com/a/RJkrT https://github.com/ak-rex/homelab-dashboard
 
Or build yours from scratch: PRTG API, ELK, Grafana, freeboard, JumpSquares
 
Some other resources: Custom Monitoring Scripts by 0110010001100010
 
Credits to apt64 for his original post
= Pi specific =
 
= Download Automation =
 
= Virtualization =
 
= Monitoring =
 
= Media Center =
 
= Remote access =
 
= VOIP =
 
= Networking =
 
= File Servers/Storage/RAID =
 
= Cameras =
 
= Documentation =
 
= Dynamic DNS =
 
= Backup =
 
= Creating network diagrams =
 
= Guides =
 
= Misc =
 
That's all I could come up with on top of my head + some research, passing over to you guys so we can get a nice complete list!
 
Let's try and stick with free(or mostly) softwares, let me know if you guys feel otherwise.
submitted by Gabisonfire to homelab [link] [comments]

Dogecoin on Linux - The Complete Beginner's Guide

I'm writing this because I couldn't find a single condensed guide on compiling the wallet and running mining software on linux, specficially Ubuntu/Linux Mint. I combed Bitcoin and Litecoin forums for similar problems I was running into and eventually got everything nailed down, so here it is in one place, for new Shibes.
If you want to make a Dogecoin directory in your downloads folder to keep things organized, you will need to modify these commands to refelct the change. So instead of going to ~/Downloads/ you will need to go to ~/Downloads/Dogecoin and be sure to put the zipped files there when you download them, but the commands will be the same otherwise.
cwayne18 put in the work to make a PPA for the QT client here.
Ubunutu/Mint/Debian users should be able to install the client with the following commands:
sudo add-apt-repository ppa:cwayne18/doge sudo apt-get update && sudo apt-get install dogecoin-qt 
To update using this method, run
sudo apt-get update && sudo apt-get upgrade dogecoin-qt 
Compiling the Wallet Manually
I suggest using the PPA above, but if you want to compile manually, here you go.
1)Download the newest source from here. If you want to check out the Github page, click here
2)Unzip the package with the native client OR, navigate to your downloads and unzip
cd ~/Downloads unzip dogecoin-master.zip 
3)Now it's time to compile. You will need to install the dependencies, just copy and paste the following code. It will be a fairly large download and could take some time. It is always important to update before installing any new software, so we'll do that first and then install the dependencies.
sudo apt-get update sudo apt-get upgrade sudo apt-get install libssl-dev libdb-dev libdb++-dev libqrencode-dev qt4-qmake libqtgui4 libqt4-dev sudo apt-get install libminiupnpc-dev libminiupnpc8 libboost-all-dev build-essential git libboost1.53-all-dev 
4)Once that is done, go to the doge-coin master directory and compile:
cd ~/Downloads/dogecoin-maste sed -i 's/-mgw46-mt-sd-1_53//g' dogecoin-qt.pro qmake USE_UPNP=- USE_QRCODE=0 USE_IPV6=0 make -j3 
After running the qmake command you will likely see some text similar to
Project MESSAGE: Building without UPNP support Project MESSAGE: Building with UPNP supportRemoved plural forms as the target language has less forms. If this sounds wrong, possibly the target language is not set or recognized. 
It's perfectly normal, so don't worry about that.
Your Dogewallet is ready to go! The executable is in ~/Downloads/dogecoin-maste and called dogecoin-qt. Your wallet information is in ~/.dogecoin. You can run the wallet at any time by opening terminal and typing
cd ~/Downloads/dogecoin-maste ./dogecoin-qt 
Future upgrades to dogewallet are easy. Back up your wallet.dat, and simply follow the same directions above, but you'll be unzipping and building the newer version. You will likely need to rename the old dogecoin-master directory in ~/Downloads before unzipping the newest version and building. Also, it is likely that you will not need to install the dependencies again.
Alternate Method For Installing Dogecoin Wallet from Nicebreakfast
After installing the dependencies listed in step 3, open terminal, then navigate to where you want Dogecoin Wallet stored and run:
git clone https://github.com/dogecoin/dogecoin ./autogen.sh ./configure make 
then when the wallet is updated just run
git pull 
from the dogecoin directory.
GPU Mining
GPU mining requires CGminer. My suggestion is to get the executable already built. The creator of cgminer has removed the built file from his website, but I've uploaded it here
sudo apt-get install pkg-config opencl-dev libcurl4-openssl-dev autoconf libtool automake m4 ncurses-dev cd ~/Downloads tar -xvf cgminer-3.7.2-x86_64-built.tar.bz2 
Don't use anything newer than 3.7.2. The newer versions of CGMiner don't support GPU mining.
That's it! You have cgminer ready to go! You will run cgminer with the following syntax
cd ~/Downloads/cgminer-3.7.2-x86_64-built/ ./cgminer --scrypt -o stratum+tcp://SERVERNAME:PORT -u WORKER.ID -p PASS 
A good guide for fine tuning cgminer can be found here; follow the litecoin example.
EDIT
I had trouble getting cgminer running with a single line command, but running it via an executable .sh file works. This is covered in the cgminer setup guide I posted above but I'll put it here too. In the same directory that has the cgminer executable, you need to make a file called cgminer.sh and make it executable. It should contain the follwing:
export GPU_USE_SYNC_OBJECTS=1 export GPU_MAX_ALLOC_PERCENT=100 export DISPLAY=:0 find *.bin -delete sleep 5 ./cgminer 
Then you can call cgminer in terminal by doing ./cgminer.sh You will need a cgminer.conf file containing all your options. All of this is covered in the guide that is linked above.
A quick note about AMD drivers: They used to be a huge PITA to install and get working, but the newest Catalyst drivers are great. There's a GUI installer, everything works out of the box, and there is a lot of documentation. You can download them here: AMD Catalyst 14.6 Beta Linux
CPU Mining
For CPU mining I use minerd because it doesn't require any work to get running, simply download it and get to work. Download the built file for your machine 32-bit or 64-bit, and then unzip it and you're ready to go!
cd ~/Downloads tar -xvf pooler-cpuminer-2.3.2-linux-x86.tar.gz 
The executable is called minerd and it will be in ~/Downloads but you can move it to wherever you like. To run it, pull up terminal and do
cd ~/Downloads minerd --url=stratum+tcp://SERVER:PORT --userpass=USERNAME.WORKERNAME:WORKERPASSWORD 
You're done! Happy mining!
Common Issues
I ran into this and I've seen others with this problem as well. Everything installs fine but there is a shared library file that isn't where it should be. In fact, it isn't there at all.
 libudev.so.1: cannot open shared object file: No such file or directory 
In terminal, do
sudo updatedb locate libudev.so.0.13.0 
And it will probably return a path /lib/x86_64-linux-gnu. Inside that directory there's a library file called libudev.so.0.13.0. You'll need to make a symlink (aka shortcut) that links libudev.so.1 to libudev.so.0.13.0 So, assuming you're working with libudev.so.0.13.0 do this
cd /lib/x86_64-linux-gnu sudo ln -s libudev.so.0.13.0 libudev.so.1 
Now if you do
ln -l 
You should see
libudev.so.1 -> ./libudev.so.0.13.0 
Meaning you've made the symlink. Also, the text for libudev.so.1 will be blue.
submitted by Boozybrain to dogecoin [link] [comments]

Let's build an army of Ethereum nodes!

Hi everyone!
I ran into Ethereum several months ago while reading about bitcoin and the blockchain and was quite impressed by some videos explaining the project (most of them by Vitalik himself). During this time I've tried to educate myself on this breakthrough technology. And at this point, I'd like to get a little more involved. I think that one easy way to contribute to this fascinating project is by running a full Ethereum node, so let me share some stuff of my experience of setting up an Ethereum node on Raspberry Pi 3.
While doing some research about the best Ethereum client for my raspberry Pi 3 I realized that pretty much there are no ARM nodes on the network (according to ethernodes.org). Shouldn't be precisely the opposite? ARM devices such as Raspberry Pi have a good performance, are cheap and power-efficient.
I looked into "EthEmbedded" [1] (great project, by the way) but it is mainly focused on Geth and Eth clients and you need to run the Ethereum clients manually. It's built on top of Ubuntu mate (and we need to keep things light). Besides, I was looking something more Flash & Play :-).
So, I compiled Parity from source on my raspberry Pi 3 (which is the most efficient Ethereum client out there [2]) and gave it a try. I was really surprised with the overall performance and thought that it would be great to get an Ethereum node up and running easiest way possible.
So, I built a custom Raspbian image which runs Parity as a boot up service and starts syncing the blockchain with no user interaction. This is what I got so far:
A custom [3] Raspbian [4] image with Ethcore Parity 1.3 [5] integrated. The image is generated using pi-gen [6] (plus a couple of files for Parity installation)
Some remarks:
Final thoughts:
I think there are several reasons to try to increase Ethereum ARM nodes in the coming months:
You can download the Custom Raspbian Image here:
http://www.ethraspbian.com/downloads/2016-09-09-ethraspbian.img.zip
For further installation instructions please visit:
https://github.com/diglos/pi-gen
Let me know your comments.
Let's do this. Mine is up and running :-)
TL;DR: If you want to contribute to the Ethereum network, get a Raspberry pi 3, install the OS image into your microSD card, connect the ethernet cable and power on your device. This is it, flash and play :-), you are already running an Ethereum node!
submitted by diglos76 to ethereum [link] [comments]

Welcome to /r/ProtonVPN, the official ProtonVPN subreddit! Please read to get started.

Please read for support requests!

If you need help with the service, it is always the best to contact the ProtonVPN Support via the Support Form.
If you want to open a thread here on reddit regardless, please add the following information:
You can copy and paste the following template to your post:
(Copy everything to include formatting)
* **Operating System:** * **Client:** * **Protocol:** * **Server:** * **Tier:** * **Error message:** 
Disclaimer: Reddit is not the official way for support. Do not expect official responses or that your problem will be solved here. Most of the time only the community will respond and will try to help you.

ProtonVPN in the blink of an eye:

Everything you should know.

We believe that the only thing worse than no security, is a false sense of security.
Therefore, please take the time and read the ProtonVPN Threat Model to see from what ProtonVPN can protect you. Please also take the time and read the Terms & Conditions and the Privacy Policy.
ProtonVPN has a feature called Secure Core. You can read about what it is and does here. Secure Core is available for Plus and Visionary accounts.
ProtonVPN is based in Switzerland.
ProtonVPN has servers in 40 countries.
ProtonVPN is a logless VPN. You can read more here.
There are free servers available in the United States, the Netherlands and Japan.
ProtonVPN supports IKEv2 and OpenVPN. OpenVPN is usable over TCP port 443 and UDP port 1194. IKEv2 uses UDP port 500 and 1500.
Every VPN server acts as their own DNS server. ProtonVPN does not use third-party DNS servers.
ProtonVPN also accepts Bitcoin as payment method, besides creditcards and PayPal.

How to get and use ProtonVPN?

You can sign up for a ProtonVPN account here. If you have a ProtonMail account already, you can set up VPN access here.

Setup Guides

iOS
Set up on iOS via OpenVPN Connect (uses OpenVPN)
Set up on iOS via native iOS App (uses IKEv2)
Android
Set up on Android via native Android App (uses IKEv2)
Participate in the Android App beta
Set up on Android via OpenVPN for Android (uses OpenVPN)
Linux
Set up on Linux via official CLI-Tool (uses OpenVPN)
Set up on Linux manually (Debian derivatives | uses OpenVPN)
macOS
Set up on macOS via Tunnelblick (uses OpenVPN)
Set up on macOS via native macOS App (uses IKEv2)
Windows
Set up on Windows via native Windows App (uses OpenVPN)
Set up on Windows via built-in VPN feature (uses IKEv2)
Router
Set up on a Tomato Router (uses OpenVPN)
Set up on a DD-WRT Router (uses OpenVPN)
Set up on pfSense (uses OpenVPN)

Useful Information

There are different community created guides (e.g. How to set up a killswitch on macOS, How to set up on-demand VPN for iOS, ...) listed here:
/protonvpn/wiki/communityguides
We have an unofficial, community-made, open-source Linux GUI. Please use at your own risk.
You can find all servers and their load listed here: https://protonvpn.com/vpn-servers
If you experience DNS leaks on linux, check the following guide: https://www.reddit.com/ProtonVPN/comments/7t5gsa/i_always_got_dns_leaks_on_linux_with_openvpn_cli/dtek7gi/
/ProtonVPN has user flairs! You can set them in the sidebar. If they don't fit your setup, you can message the moderators. More info in this post.
If you have any suggestions regarding this thread, please don't hesitate to write a comment or contact us via mod mail!
submitted by R3v0xz to ProtonVPN [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracyundone [link] [comments]

How to install Bitcoin Armory in Ubuntu 14.04 4. Installing Bitcoin Core on Linux iWritingPad Debian desktop installation How to install PPTP Client Debian 10 Install OpenLDAP on Debian 10

There are many events in which you have to run your Bitcoin node. Last time we were developing an application where the client had to accept Bitcoin payments without relying on a third-party API provider, so in that case, usage of Bitcoin Core was essential. While it’s not totally necessary to use Bitcoin Core, there … Continue reading Compiling and Installing Bitcoin Core on Debian/Ubuntu This tutorial explains how to install and use Bitcoin Core on Debian Linux. Bitcoin Core is the official Bitcoin Wallet from bitcoin.org. I will use the latest version from the GIT repository at bitcoin.org. In order to compile and run, Bitcoin Core depends on some other tools which must be installed prior to compiling : Install some dependencies: For bitcoin-core sudo apt-get install build ... This tutorial explains how to install and use Bitcoin Core on Debian Linux. Bitcoin Core is the official Bitcoin Wallet from bitcoin.org. I will use the latest version from the GIT repository at bitcoin.org. In order to compile and run, Bitcoin Core depends on some other tools which must be installed prior to compiling : Install some dependencies: This guide shows how to install and run Bitcoin Core on a clean Ubuntu 18.04 system. Prerequisites. Although Ubuntu carries Bitcoin Core in the Software Center, the release tends to be out-of-date. For this reason, this tutorial won’t use the Software Center. Compilation from source offers one alternative, but involves many steps. A more direct route is to install a precompiled binary from ... This tutorial explains how to install and use Bitcoin Core on Debian Linux. Bitcoin Core is the official Bitcoin Wallet from bitcoin.org. I will use the latest version from the GIT repository at bitcoin.org. In order to compile and run, Bitcoin Core depends on some other tools which must be installed prior to compiling : Install some dependencies: For bitcoin-core. sudo apt-get install build ...

[index] [2749] [38237] [41751] [28825] [427] [30197] [3609] [24422] [13223] [32359]

How to install Bitcoin Armory in Ubuntu 14.04

The Crypto Dad shows you how to set up the Electrum Bitcoin wallet in the Debian 9 (Stretch) Linux distribution. We go through downloading (with verification) and installing the Electrum bitcoin ... Java Project Tutorial - Make Login and Register Form Step by Step Using NetBeans And MySQL Database - Duration: 3:43:32. 1BestCsharp blog 7,662,402 views Hi guys, In this video about Linux, I will show you how to install PPTP VPN Client on Debian 10 in the easiest way. Thanks for watching! My website: https://... To Build Run: https://github.com/corrados/jamulus/blob/master/distributions/build-debian-package.sh to install the server service copy the jamulus-server.ser... Bitcoin-QT is a Bitcoin wallet and does some other functions. Running this software is the backbone to the entire Bitcoin system. You may need to open port 8333 in your firewall. For more info see

#