DarkWallet. Experimenteller Bitcoin-Client - BitcoinWiki

Cody Wilson of Defense Distributed and Dark Wallet will be speaking at Bitcoin in the Beltway this weekend.

Cody Wilson of Defense Distributed and Dark Wallet will be speaking at Bitcoin in the Beltway this weekend. submitted by hardleft121 to Bitcoin [link] [comments]

Cody Wilson revives the anarchist spirit of bitcoin with Dark Wallet

Cody Wilson revives the anarchist spirit of bitcoin with Dark Wallet submitted by platypii to Bitcoin [link] [comments]

Live with Cody Wilson (creator of Dark Wallet) now! Talking about the reopening of his website /r/Bitcoin

Live with Cody Wilson (creator of Dark Wallet) now! Talking about the reopening of his website /Bitcoin submitted by ABitcoinAllBot to BitcoinAll [link] [comments]

Cody Wilson, the Creator of Controversial 3D Printed Guns to Come Up With Bitcoin Wallet

Cody Wilson, the Creator of Controversial 3D Printed Guns to Come Up With Bitcoin Wallet submitted by jameseast to Bitcoin [link] [comments]

Cody Wilson revives the anarchist spirit of bitcoin with Dark Wallet

Cody Wilson revives the anarchist spirit of bitcoin with Dark Wallet submitted by bearjewpacabra to Anarcho_Capitalism [link] [comments]

Dark Wallet: A Radical Way to Bitcoin -- Many users of the alternative currency want to integrate it into the wider economy, but Cody Wilson wants to build an economy outside government’s reach

Dark Wallet: A Radical Way to Bitcoin -- Many users of the alternative currency want to integrate it into the wider economy, but Cody Wilson wants to build an economy outside government’s reach submitted by davidreiss666 to Bitcoin [link] [comments]

Cody Wilson: Bitcoin Is Political, Deal With It. Welcome to Dark Wallet [video]

Cody Wilson: Bitcoin Is Political, Deal With It. Welcome to Dark Wallet [video] submitted by satoshi_pollen to Bitcoin [link] [comments]

3D-printed gun maker Cody Wilson is raising $50,000 for an anarchist Bitcoin wallet

3D-printed gun maker Cody Wilson is raising $50,000 for an anarchist Bitcoin wallet submitted by LDL2 to LibertarianNews [link] [comments]

Diversify The Ecosystem – Dark Wallet. Cody Wilson [video] London, Bitcoin Expo, Nov 2013

Diversify The Ecosystem – Dark Wallet. Cody Wilson [video] London, Bitcoin Expo, Nov 2013 submitted by satoshi_pollen to Bitcoin [link] [comments]

Cody Wilson interview at Max Keiser Show on Dark Wallet: the bitcoin payment anonymizer

submitted by platypusmusic to snowden [link] [comments]

How Dark Wallet's Cody Wilson hopes to use democracy to undo the Bitcoin Foundation

How Dark Wallet's Cody Wilson hopes to use democracy to undo the Bitcoin Foundation submitted by ModerationLog to ModerationLog [link] [comments]

Cody Wilson explains how his Dark Wallet project will carry on the ideals of Bitcoin, and how the Foundation sells us out

Cody Wilson explains how his Dark Wallet project will carry on the ideals of Bitcoin, and how the Foundation sells us out submitted by OnlineDegen to Bitcoin [link] [comments]

An analysis on Penguin Magic user reviews

Hello,
To practise some programming, I made an analysis of the user reviews left on penguin magic. I thought you could be interested in some of the results. It made me check a lot of products that I did not know about.
I excluded the reviews for expos and gift cards to analyse only physical items and tricks. I investigated only the items with at least one review. I combined items as Penguin did. This left me with 87761 reviews for 11318 items.
50 Most Reviewed Items
Item Rating Review Count
Born to Perform Card Magic by Oz Pearlman 4.87 556
Invisible Deck 4.70 506
Self Tying Shoelace by Jay Noblezada 4.74 373
Melt 2.0 by Matthew Johnson 4.65 348
Marked Cards 4.67 344
The Stealth Pen presented by Rick Lax 4.73 327
Coffee Break by Gregory Wilson David Gripenwaldt 4.65 320
Torched and Restored by Brent Braun 4.83 252
All Seeing Eye by Dan Harlan 4.75 244
The Poker Test 2.0 by Erik Casey 4.44 236
Binary Code by Rick Lax 4.78 236
The End by Rick Lax 4.64 225
Starcle by Dan Harlan 4.85 220
OneTrix by Mario Lopez 4.50 214
Close-Up Illusion by Larry Jennings presented by Michael Ammar 4.70 206
Hummes Whirling Card 4.36 195
Two Dollar Window by Jay Noblezada 4.80 191
GREED Starring Daniel Garcia 4.54 190
Modern Transportation by David Regal 4.88 187
Vuja De by Rick Lax 4.78 181
DRESSCODE by Calen Morelli 4.75 181
Predixion by Max Maven 4.89 178
Color Monte 4.87 173
The Secrets of Magic by Rick Lax 4.67 173
In the Beginning There Were Coins Starring Jay Noblezada 4.76 170
Panic by Aaron Fisher 4.77 168
Or Not by Dani DaOrtiz 4.74 165
Bicycle Elite Edition Playing Cards 4.72 165
Super Soft Deluxe Nest of Wallets 2.0 by Nick Einhorn and Alan Wong 4.66 162
Tornado by Justin Flom and Rick Lax 4.82 161
BWave DELUXE by Max Maven 4.84 160
Bently by Chris Hanowell 3.60 159
Binary Code 2 by Rick Lax 4.88 159
Copycat by David Parr 4.88 157
BITCOIN by Rick Lax 4.57 157
Muldoon Match by Paul Gordon 4.77 156
ID7 by Rick Lax 4.37 155
Monkey in the Middle by Bill Goldman presented by Magick Balay 4.76 154
Little Door by Roddy McGhie 4.61 153
SPONGE Starring Jay Noblezada 4.80 152
Eclipse by Dave Loosley 4.60 152
Peter Turner LIVE 4.52 152
Position Impossible by Brent Braun 4.83 150
Clutch by Oz Pearlman 4.67 144
Zoltar by Shaun Dunn presented by Lewis Le Val 4.38 144
BANDIT by Darryl Davis & Daryl Williams (a.k.a. The Other Brothers) 4.80 144
The Known by Thom Peterson 4.47 143
The Ultimate Three Domino Monte 4.14 143
Psypher PRO by Robert Smith 4.73 142
Mnemonica Trainer by Rick Lax 4.81 141
25 5 Star (5*) Items
There are a lot of (3245 to be precise) items that received only perfect 5* reviews. But of course, that could be only one reviewer giving 5* and that would not mean a lot. The following table shows most reviewed yet still rated 5* items.
Item Rating Review Count
Diamond Jim Tyler LIVE 5.00 73
Carisa Hendrix LIVE ACTS 5.00 52
David Corsaro LIVE 5.00 30
Halloween by Natalia Silva 5.00 29
Howard Hamburg LIVE 5.00 25
Daniel Chard LIVE ACT 5.00 22
Sibyl by Phedon Bilek 5.00 21
Ian Rowland LIVE ACT 5.00 16
John (Fast Jack) Farrell LIVE 5.00 16
Morgan and West LIVE 5.00 16
Red Pill by Chris Ramsay 5.00 16
Jay Noblezada presents HTG LIVE: Hypnosis Training Group 5.00 16
NX11 :: The Noblezada Experience 5.00 16
QA Masterclass by Bob Cassidy 5.00 16
Takamiz Usui LIVE 5.00 15
Venom Cube by Henry Harrius 5.00 15
Move Zero (Vol 1) by John Bannon and Big Blind Media 5.00 15
Tom Wright LIVE 5.00 15
TC Tahoe LIVE 5.00 15
Jonathan Pendragon LIVE 5.00 15
Jan Forster LIVE ACT 5.00 14
13 Steps To Mentalism (6 DVDs) by Richard Osterlind 5.00 14
Jermays Mind (DVD Set) by Luke Jermay 5.00 14
Phoenix Deck 5.00 14
Tarbell 77: X-Ray Eyes and Blindfold Effects 5.00 14
50 Top Rated Items
I'll list the top-rated items. I'll include only the items that have at least 20 reviews. (This leaves us with 995 items to order).
Item Rating Review Count
Diamond Jim Tyler LIVE 5.00 73
Carisa Hendrix LIVE ACTS 5.00 52
David Corsaro LIVE 5.00 30
Halloween by Natalia Silva 5.00 29
Howard Hamburg LIVE 5.00 25
Daniel Chard LIVE ACT 5.00 22
Sibyl by Phedon Bilek 5.00 21
Diamond Jim Tyler LIVE 2 4.98 56
David Williamson LIVE 4.98 109
Drew Backenstoss LIVE ACT 4.98 83
Jay Scott Berry LIVE 4.97 37
David Hira LIVE 4.97 67
Toibox Card To Box System by Jonathan Kamm 4.97 133
Jason England LIVE 4.97 33
Dyno by Joe Rindfleisch 4.96 27
Paul Gordon LIVE 4.96 27
Roberto Giobbi LIVE 4.96 25
SvenPad® Minis Black Cover Pair 4.96 24
Mark Mason LIVE 4.96 23
Marc Paul LIVE ACT 4.96 23
Joshua Jay LIVE 4.96 23
Brent Braun LIVE 4.95 22
Seth Kramer LIVE ACT 4.95 21
Robert Temple LIVE 4.95 20
Bandwidth by Greg Wilson 4.95 37
Stegosaurus by Phill Smith 4.94 49
TRIUMPH Starring Oz Pearlman 4.94 31
Banachek LIVE 4.93 59
Fiber Optics Extended by Richard Sanders 4.93 29
Name and Place by Bob Cassidy 4.93 71
The Special Assortment Deck 4.93 28
Cody Fisher LIVE ACT 4.92 26
Blank Face Bicycle Deck 4.92 26
Richard Osterlind LIVE 2: Pocket Mentalism 4.92 38
Scratch by Chad Long 4.92 24
Caught Red-Handed by Michael Mode & Arthur Ottney 4.92 24
Modern Coin Magic by J.B. Bobo 4.91 46
Dave Loosley LIVE 4.91 23
Mark James LIVE 4.91 22
Strong Magic by Darwin Ortiz 4.91 22
Acrobatic Knot (with DVD) by Daryl 4.91 22
DMC ELITES : ROUGE marked deck 4.91 22
Shin Lim LIVE: Visual Magic. 4.90 21
Tornado REFILL 4.90 31
CLEAR CHOICE by Thinking Paradox 4.90 81
Choose Five for 99 4.90 79
True Triumph by Paul Cummins 4.90 29
Eugene Burger LIVE 4.89 57
Predixion by Max Maven 4.89 178
Bill Malone LIVE 4.89 36
25 Least Liked Items
Following table shows the 25 items that have the worst ratings and at least 10 reviews.
Item Rating Review Count
Phantom by Peter Eggink 1.44 16
RETRIEVE (Gimmick and Online Instructions) by Smagic Productions 1.56 16
Penciltration by Jesse Feinberg 1.70 10
Force of Will by Dave Hooper - DVD 1.71 17
Phone Phreak by Jeff Prace & Paul Harris 1.81 16
PK Coin by Nathan Kranzo 2.11 28
POST_NOTE By Antonio Smith-Plata 2.24 17
Never There by Morgan Strebler - DVD 2.29 14
Spirit by Arnel Renegado 2.33 12
The Gecko by Jim Rosenbaum 2.39 36
The Incredible Shrinking Finger by Dan Hauss (Additional handling by Paul Harris) 2.40 10
The Wizards Flip Book 2.41 17
Phone-omenon by Doug McKenzie 2.44 16
Elevator by Peter Loughran 2.47 15
BLAZE by Thinking Paradox 2.53 19
Ambitious Finger by Mario Lopez 2.53 53
Absolute Zero (Gimmick and Online Instructions) by SansMinds 2.53 15
Cheese Smile by Smagic Productions 2.55 11
Liquid Metal 2 by Morgan Strebler 2.57 14
Sealed by Menny Lindenfeld 2.57 61
GREEN FACES by Dalton Wayne 2.58 12
Ice Cold: Propless Mentalism (2 DVD Set) Limited Edition by Morgan Strebler and SansMinds - DVD 2.58 12
Nathan Kranzo LIVE 3 2.60 10
Jay Sankeys ORIGINAL Wrap It Up! (Trick Only) 2.62 21
Sharp This by Vanishing Inc 2.64 11
30 Most Controversial Items
I tried to measure controversiality with a ranking system. If all the reviewers gave the same rating for an item, then the controversiality is calculated as 0%. And the most divided option, where half of the reviewers rate an item 1* while the other half reviews it 5*, is rated as 100% controversiality. Here are the most controversial items with at least 10 reviews:

Item Rating Review Count Controversiality %
HACAAN 3.07 27 92.46
Chris Mayhew LIVE 2.94 16 90.63
Sharp This by Vanishing Inc 2.64 11 89.26
Justin Miller LIVE 3.05 22 88.64
CARD IN THE KEYCHAIN by Stefano Curci 3.20 10 88.00
Cut 2.0 LIMITED by Ran Pink 2.88 16 86.72
P'INK by Ran Pink 2.88 82 84.62
Ice Cold: Propless Mentalism (2 DVD Set) Limited Edition by Morgan Strebler and SansMinds - DVD 2.58 12 84.03
Winner's Dice (Gimmicks and Online Instructions) by Secret Factory 3.38 13 84.02
Stained Glass by Adam Grace 3.10 10 84.00
Joe Monti LIVE 3.36 14 82.14
Elevator by Peter Loughran 2.47 15 81.33
Strongman by Jimmy Strange 2.88 16 81.25
GREEN FACES by Dalton Wayne 2.58 12 80.56
iMove by Oliver Smith 2.67 12 80.56
Jay Sankey's GEMINI POUCH (Trick Only) 3.45 11 80.17
Nathan Kranzo LIVE 3 2.60 10 80.00
Titan's Finger by Titanas 3.63 16 79.69
vACAANt by Area52 3.42 24 78.13
Triple C (Red Gimmicks and Online Instructions) by Christian Engblom 3.70 10 78.00
The Switch by Shin Lim 3.67 18 77.78
Memoria by Luke Jermay (Instant Download) 3.64 11 77.69
Rudy Hunter's Total Control with Cards 3.77 13 77.51
Phone-omenon by Doug McKenzie 2.44 16 77.34
SansMinds Sharpie (DVD and Gimmick) by Will Tsai 3.00 13 76.92
Derren Brown LIVE 2.74 105 76.87
Hidden Hand by Sean Fields 2.84 51 76.62
Harlan's No Tape, No Glue, No Scissors, 20-second Setup Torn & Restored Newspaper 2.76 17 75.78
Darryl Vanamburg's "Black Widow" 3.77 13 75.74
Absolute Zero (Gimmick and Online Instructions) by SansMinds 2.53 15 75.56
submitted by VolkanOzcan to Magic [link] [comments]

"Well looks like #DarkWallet is back in action. Pablo's merging code."

submitted by jackabon to Bitcoin [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to C_S_T [link] [comments]

Famous Bitcoiners who left crypto

I was thinking of a compilation of people who left crypto for various reasons.
Who else?
submitted by nopara73 to Bitcoin [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracy [link] [comments]

Let’s confront the Crypto influencers

Hey guys I want to use our new @MoneroTalk YouTube show https://www.youtube.com/channel/UC3Hx81QYLoEQkm3vyl4N4eQ
to interview the Monero haters and ignorers. I don’t see how you can be a Bitcoin Maximalist and not have some love for Monero. If you are a Bitcoin Maxamalist I have to assume you understand the true value proposition of Crypto well , which should lead one to realize that Monero is currently the coin most aligned with said Value Prop.
I’m starting by hitting up this guy JW Weatherman https://twitter.com/chowbungaman/status/1021761574304980992?s=21 Like and comment on the tweet so we can put some Pressure on him to do the interview. He is an extreme Maximalist. He thinks Monero is a scam. He bought his first Bitcoin a few months ago and somehow has grown into an influencer. It makes no sense. Fluffy went on his show and Weatherman just bashed Monero. Let’s start with him.
I’d like to eventually talk to: Tone Vays Andreas Antonopoulos Cody Wilson Snowden Amir Taaki Adam Meister ...others
Not in that order and obviously won’t be easy to get them. But let’s start questioning these “thought leaders” who supposedly are in this for the reasons Satoshi was/is. Digital Cash. Sound Money. Censorship resistant value transfer.
We are planning on having knifeofpi on the show on Thursday to chat about mimblewimble / Grin. He seems to understand the tech well and we will be picking his brain on it. He is a Cake Wallet team member. He is very active in the community. Thank You Knifeofpi!
submitted by chowbungaman to Monero [link] [comments]

Chainalasys VS Mycelium - The full story

Mycelium Wallets use our own custom nodes to process the bitcoin blockchain and scan for address balances. These nodes were written by Jan Møller while he was the Lead Developer, along with our other devs. The job of these nodes is to parse the 30 gig Blockchain database into our own custom database, which is much larger, being over 100 gigs in size, but which allows for very quick and easy lookup of address balances, allowing for instant balance lookups and to do things like Cold Storage spending from paper wallets and Trezor. Note that this custom database doesn't actually contain anything that's not in the original blockchain database itself.
Mycelium's owner and developers believe in total financial privacy and personal freedom, and our company has a goal to make Mycelium Wallet the most anonymous wallet possible. For this reason, we have kept our wallet code completely open since the beginning, and have been public and open about what goes on internally in our company (I hope you have noticed my frequent updates, especially with the unfortunate Entropy delays). And even while Jan was still the lead dev, we have created LocalTrader to work completely anonymously, using only bitcoin signed messages for user authentication and encrypting all user chat P2P using their respective private keys so our servers receive no usable data. We have also added HD wallet support, and disabled all IP and transaction logging on our nodes. However, we also realize that just us claiming that we do that isn't good enough, and that's why we added full Tor support, and are in the process of implementing CoinJoin, which we hope to have enabled by default, so that even those who don't care about staying anonymous will help contribute. Our goal was to have Mycelium Wallet be as anonymous as Dark Wallet, and that has not changed.
Jan Møller, our lead developer who did most of the work on the nodes, realized that the node-parsed blockchain database can be used to analyze bitcoin transaction activity, and help track transactions in the same way that our current financial institutions do (although with much less certainty). So he decided to have his own project that does just that, and has split off from Mycelium company last October. We still kept him on as our chief technical consultant, since he did write most of the node and original wallet code, so he is technically still employed by Mycelium, but he has had no access to our nodes since he left. Our current full time lead developer is Andreas Petersson, who is working on implementing Coinapult Locks right now, and the other two developers are Jan Dreske (trasla here) and Daniel Weigl, who have been adding support for Trezor, fixing bugs, adding minor requested features, etc.
We at Mycelium are not fans of what Chainalysis does, but we can't really object too much, because if something like this is even possible to do, then someone will do it, whether it's Jan's company or someone else. It's also preferable that this is done by a public company in the open, instead of in secret by a government agency. And secondly, since the developer behind this is someone who worked with us and continues to stay in touch and advise us, we can at least get inside knowledge of what may be tracked and how by such systems, so we can be aware of what to watch out for and what to fix. Obviously it's not a guarantee that we will get an honest answer, but it's still better than nothing.
With regards to why our website's About section still lists Jan Møller as a Lead Developer, it's because our website dev has been working full time on another (secret) Mycelium project, and has not had the chance to change anything. I guess the site is too low of a priority to update. Note that both of our current top wallet developers who have been doing most of the work these past few months, Jan Dreske and Daniel Weigl, are completely missing from there too. I am sorry that I have not publicly stated anything about this either, but since Chainalysis is a completely separate company, Jan Møller has not had access to our internal systems since he became a consultant, and our internal goals are still total anonymity, there was no risk whatsoever to Mycelium or the privacy of our users from the Mycelium side. I have been fairly open about being an AnarchoCapitalist myself, supporting people like Cody Wilson and Ross Ulbricht, and supporting the idea of The four pillars of a decentralized society as explained by Johann Gevers to help decentralize government functions. So if there ever is a risk of Mycelium becoming a snooping agency, or if Mycelium changes its goals with regards to expanding personal freedom, I still promise to let the community know, since there would be no way I would be willing to continue to work there if that happens.
P.S. Yes, we have those Chainalysis nodes blocked on our Mycelium nodes, too, but that's not really a fix, since Chainalysis can just change their IP address.
EDIT: Also, please note that if Mycelium wanted to be involved in this, we would have done this internally ourselves, likely making a ton of money from bankers and regulators in the process. But we didn't, not even allowing Jan to work on this internally, and wouldn't even consider implementing anything like that.
submitted by Rassah to Bitcoin [link] [comments]

Encryption is No Longer an Option - Ways to Restore Your Natural Right to Privacy

Encryption is No Longer an Option
“If the State’s going to move against you, it’s going to move against you. Now, that doesn’t mean you need to be reckless of course. I’m awful careful you guys, and even my degree of care and control ultimately won’t be enough if they get mad enough. There will always be something…I’ve done what I hope is the best any man can do. So…I hope when they finally do get me, it’s obvious that they just made it up. I don’t go out of my way to make it easy.” – Cody Wilson
For all Anarchists our love for freedom unites us and guides us. I recently had a conversation with a mutual friend that Cody and I have in common and he stated something very insightful:
CryptoAnarchy is like the Lord of the Rings. You have to cooperate with people that you don’t know where they are or what they’re up to. That is, you just know that we are all figuring out at the same time on how to take down Sauron.
Anarchy is guided by the natural instinct for self-preservation. You can trust that others are also actively working in keeping us all free.
For us all to move into more synergistic cooperation we need more motivation. Nothing is more motivating than our movement away from an impending harmful evil. The persecution that Cody Wilson has gone through since he started his activism is testament to the evil that awaits the entire world if we do not fight against the impending digital global prison. Just note how easy it was to find Cody. Government indoctrinated brownshirts and surveillance are everywhere.
As Jeff recently said in London, “CryptoAnarchy is about the cryptography.” Cryptocurrency is only possible due to the privacy offered by cryptography. A true cryptocurrency is completely fungible, anonymous, and private. Blockchains without on-chain privacy set by default, are dangerous and offer nothing other than accurate surveillance.
That is, the moment you destroy a coin’s fungibility you corrupt its incentive structure. This is because you would then have two classes of the same coin within a transparent blockchain; these are coins that are “tainted” or “untainted” according to government. This differentiation created by blockchain surveillance leads “tainted” coins to be priced differently from “untainted” coins. Once this happens you destroy the functionality of a currency as a medium of exchange.
Imagine the headache of retailers in having to tell clients that they only accept “untainted” bitcoins. The result of not having a fungible medium of exchange is that you destroy the incentive structure of the network effect of a coin. You simply end up with a useless and unwanted network where value is supposed to be exchanged. If the units within the medium of exchange do not themselves contain the same value in the market, the utility of the network effect is destroyed.
The economic ramifications of non-fungible SurveillanceCoins are so bad that they make fiat currencies of central banks look good. In spite of their centralized proof of government violence, fiat currencies are more fungible and private than a coin based on a transparent blockchain.
For much time within crypto we would call the majority of blockchains as “pseudo-anonymous” because we knew the importance of fungibility. At that time blockchain analysis had not caught up to our technology. Now companies like Elliptic and Chainalysis have made the vast majority of blockchains in the market transparent.
Sadly, most blockchain communities have not upgraded their privacy to be on chain by default- making them transparent. However, some more intelligent communities- like Monero- are at the same time growing because they understand the importance of fungibility.
Please understand that we at TDV are ahead of the pack in understanding where all of this is going. The vast majority of people won’t tell you these harsh truths about the Blockchain space, but it is our moral imperative to inform you as best as possible.
As time goes on, we will continue to champion actual fungible CryptoCurrencies and we will continue to make clear distinctions between a SurveillanceCoin and an actual CryptoCurrency.
It is important that we take a step back from CryptoCurrencies and focus on just cryptography. You can never be too careful. Throughout our groups we have had various requests as to how to better use different wallets.
Yes, we will cover all of that in our upcoming surprise for our community, but what is most important is that you protect yourself at the network layer, your identity, and your communication.
CryptoAnarchy began way before Bitcoin. If you want to know what will be happening to CryptoCurrencies and CryptoAnarchy in the near future, you need to read Timothy C. May’s 1992 prophetic Crypto Anarchist Manifesto.
On reading this, you cannot afford to be idle regarding your privacy. This is not the time for you to easily give up what is most personal about you; your thoughts and identity. Your privacy is sacred. You need to protect your privacy as much as possible at all times. Don’t give into the defeatist notions of future technology being capable of deanonymizing any cryptography you currently use. Your goal is to be private right now in the present moment.
You are up against a global digital tyranny- that is already here!
...Cazes was not a US citizen and the Alphabay servers and Cazes were not caught on US soil. Just because crimes involving narcotic deals took place in America, weirdly enough, the US seemingly has the right above anyone to seize Cazes’ property, and charge him and his accomplices in US trials...
Use Secure Hardware That Protects You
Be paranoid. Stay paranoid. The more paranoid you are the better. Currently the five eyes are moving to strip away all of your privacy. They are on the direct path to force all companies to hand over back doors to software and hardware encryption.
This is a new breach on individual rights. The backdoors in hardware have existed since the 90’s via Trusted Computing and Digital Rights Management (DRM). The difference is that now companies will be fined and forced by governments (all governments) to open up backdoors for the surveillance of all- in both software and hardware. Australia is leading the charge since they are the only ones within the five eyes without a Bill of Rights.
If you really want to be secure, then you need to start with your hardware. Almost all laptops and hardware chips are engineered with unsafe software. These chips can transmit voice, your networking, pictures, and even video signals. Many of these chips are used to install spyware, malware and viruses.
The market has provided us with two easy plug-and-play hardware solutions.
Purism is a CryptoAnarchist company dedicated in offering us the safest computers in the market. Purism’s line of Librem Laptops is manufactured with software and hardware built from the ground up, where you can be at ease knowing there are no back doors built within it. They work with hardware component suppliers and the Free software community in making hardware that respects and protects your security. Every chip is individually selected with emphasis on respecting freedom. (Purism Librem laptops have built in Kill-Switches for your microphone/camera and wireless/Bluetooth)
All of the necessary components that you would have to bundle up together- by yourself- from a community vetted place like Prism-Break are already installed and ready to go within Librem laptops. Even if you were to install all of the necessary open-source encrypted alternatives, you still would not be able to 100% trust your current computer’s hardware.
Purism Librem laptops come with their own PureOS (operating system). Purism also offers compatibility with Qubes OS in a flash-drive (similar to Tails) to give you even another layer of protection on top of PureOS. Qubes OS is what Edward Snowden uses. PureOs is a derivative of Debian GNU/Linux. Qubes is free and open-source software (FOSS).
Purism is currently having a pre-sale for their first phone the Librem 5.
Another popular safe hardware computer market alternative is ORWL. ORWL is a desktop PC. ORWL comes with a physical encryption key that looks like a keychain. If anyone ever tries to physically tamper with the ORWL computer, sensors will automatically detect the intrusion and erase everything. ORWL comes with the operating system options of Qubes OS, Ubuntu, or Windows.
ORWL does not receive payment for their products in Crypto. Purism on the other hand accepts payment in BitcoinCore, BitcoinCash, Litecoin, Ethereum, Decred, Dogecoin, and Monero.
ORWL is a good alternative for more computer savvy people. If you are not the most competent person with computers, Purism is the way to go. With Purism everything is ready to go.
Once you get good hardware don’t use this new computer for anything other than crypto stuff. That is, don’t use it with anything that requires your slave identity. Don’t access social media with your name, don’t access bank accounts, don’t access crypto exchanges, don’t access old email accounts, definitely don’t access anything that requires KYC and AML, and don’t access any identifying log-in that is related to any of your previous internet identities. Create new identities from scratch for this new computer.
Watch this video and learn about the basics on operational security (OPSEC). Take everything written here, and spoken at the conference in the video above, as barely the preliminary basic requirements of OPSEC. You should definitely continue your own research upon getting your new secure hardware computer.
(It would be best if you purchased this computer using crypto- Monero preferably- and have it mailed to a mailing address not associated with any of your addresses; think along the lines of JJ Luna).
Encrypt Your Communication
“This generation being born now... is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.” – Julian Assange
The vast majority of our community uses Facebook. Unfortunately its network effect is something we all rely on to some degree. Fortunately for us a friend of our community created FaceMask. Through FaceMask we can still use Facebook in complete privacy- away from Zuckerberg's prying eyes. In the near future we will implement FaceMask into our TDV groups as optional privacy for our posts. We will provide our subscribers with the keys necessary to encrypt and decrypt the messages and posts. Again, this is optional. For now please go to the link above and familiarize yourself with Facemask and its technology.
Don’t use Google. If you are using Google start transitioning out of it. If you are using Gmail, start moving towards encrypted services like ProtonMail or TutaNota. They both offer a free option, try them both out and choose your favorite. Use two factor authentication on everything that requires you to log-in that allows for the use of two factor authentication. Most people use Google Authenticator and Authy. I personally prefer the open source options of FreeOTP & andOTP. Use the one that you find best suited for you. Using one is paramount for security nowadays.
If you are one that uses Google Docs with your team, move instead to CryptPad. The more you use CryptPad the more addicting it becomes; your collaborated work is encrypted and private. You no longer will have to worry about knowing that Google is capturing all of your collaborated work. You can also start using CryptPad for free.
If you are using Skype for conference calls, switch to Jitsi. Jitsi is even easier to use than Skype. If you use their MeetJitsi feature you can just access the encrypted conferencing via any browser by agreeing with your other party on the same predetermined passphrase.
Don’t use regular text messaging. Rather, use Signal, Wickr, Keybase, or Telegram.
Use a VPN
A VPN (virtual private network) encrypts all of your traffic via a private network of servers scattered throughout the world. This process anonymizes your IP address. Make sure you don’t use your identity when using a VPN- that would just give away your identity as being connected with the VPN servers you are using.
Many VPN providers register your activity and can hand it over to government if they so demand it. They break their promises to their clients all the time. Let’s minimize risk by staying away from the most draconian of jurisdictions.
To lessen this issue, do not ever use a VPN that is based out of any of the 5 eyes:
-United Kingdom
-United States
-Australia
-Canada
-New Zealand
Furthermore, avoid VPNs based out of the following nine countries, that combined with the first 5 make up the 14 eyes:
-Denmark
-France
-The Netherlands
-Norway
-Germany
-Belgium
-Italy
-Spain
-Sweden
No VPN is a complete safeguard. In spite of this, it is still best to use one. We recommend you ONLY use it (turn it on) when doing crypto-related things and only crypto-related things on your regular computer. For your new encrypted hardware computer have it on at all times. If you use it to access an actual bank account, or another personal account (including crypto accounts that require your personal information; read coinbase, or any other exchange) — then, again, the use of the VPN use becomes trite.
Here are six VPN options outside of the 14 eyes that we recommend you research further and use at your own discretion:
NordVPN (Panama)
CyberGhost (Romania)
HideMe (Malaysia)
Astrill (Seychelles)
TrustZone (Seychelles)
iVPN (Gibralter)
Like all things in the market now, some VPNs take Crypto as payment—others do not. It is best if you bought your VPN with crypto not not your credit card, debit card, or paypal.
TOR (The Onion Router)
The Onion Router is software that you use as a browser. It protects you by bouncing your communications around a distributed network- throughout the world- of relays runned by volunteers. This prevents evesdroppers from learning your IP address, spying on you, and disclosing your physical location. TOR also allows you to access sites that are blocked.
You can use TOR and a VPN simultaneously. If you are new to all of this, it is best that you just learn how to use the features of your new computer coupled with your preferred VPN. The use of TOR is a little more complicated and you will have to configure it according the specifications of your preferred VPN. As you begin this process, as long as you are using your VPN correctly you should be fine.
Fincen and crypto-exchanges
ShapeShift is now stuck having to require its users to deanonymize their transactions in order to meet KYC and AML requirements; it pretty clear that they got ShapeShift under the Bank Secrecy Act. Stay away from Shapeshift (sorry @erikvorhees).
“Very disappointed that @ShapeShift_io is implementing KYC. Just goes to show that any centralized entity will be pushed in that direction, which is why LN, atomic swaps and Decentralized Exchanges are the only way to resist a surveillance economics.” - Andreas Antonopoulos
As the news of ShapeShift broke out, the market was quick to answer with alternatives. Among the private centric alternatives to ShapeShift we find Godex, ChangeHero, XMR.TO, and Bisq.
ChangeHero and Godex are pretty much the same business concept as ShapeShift. The only difference is that they do not require you to become transparent. XMR.TO allows you to make BTC payments by using Monero.
That is, by using Monero together with XMR.TO you can pay any BTC address in the world while protecting your privacy.
Bisq is the Best Option
The most important to focus on is Bisq. Bisq is a complete decentralized exchange. Bisq is instantly accessible- there is no need for registration or approval from a central authority. The system is decentralized peer-to-peer and trading cannot be stopped or censored.
Bisq is safe. Unlike MtGox and the rest of centralized exchanges, Bisq never holds your funds. Bisq provides a system of decentralized arbitration with security deposits that protect traders. The privacy is set where no one except trading partners exchange personal identifying information. All personal data is stored locally.
All communication on Bisq is end-to-end encrypted routed over Tor. Upon downloading and running Bisq TOR runs on Bisq automatically. Every aspect of the development of Bisq is open source.
Bisq is easy to use. If you are accustomed to centralized exchanges, you might find Bisq a little different. If you want anonymity and privacy, this is the best crypto exchange we have. Tell your friends about Bisq. Just download Bisq and take it for a test drive, you will feel fresh freedom of entering into peaceful voluntary exchange with your fellow man. Do it, it’s good for the soul.
On Cody
I would like to personally thank all of our subscribers for generously donating to Defense Distributed on our last issue. At the moment of us putting out our last newsletter, DefDist had raised less than 100k USD. After our Newsletter got out, his donations went past 300k USD.
Thank you very much for helping out our friends in their continual fight for freedom!
Please pray for Cody, his friends, and his family.
I once asked Cody what his background was- because idk his mannerisms have always been interesting to me. He answered; “I am Romani- I am a Gypsy.”
Thank you for helping out our Gypsy friend and his band of rebels! They will very much be using your generous donations now that things got much more serious.
If you haven’t donated, please consider donating. Blessings!
By Rafael LaVerde
Excerpt taken from The Dollar Vigilante September 2018 Issue
https://dollarvigilante.com/wp-content/uploads/2018/09/TDV-September-2018-Issue.pdf
submitted by 2012ronpaul2012 to conspiracyundone [link] [comments]

The more I look at this, the more convinced I am that Ross Ulbricht may be acquitted on all charges.

Thank you for taking the time to click this. Allow me to briefly introduce myself and then I'll get straight to the meat and potatoes of the matter:
I work for a small AnCap bookstore in Austin Texas, and am host to a radio broadcast which focuses on currency, technology and anarchy. As a result, I've had the pleasure of personally getting to know some of the biggest players in the spheres. I've been invited to sit down in interviews alongside guys like Jeffrey Tucker and Kristov Atlas (they cancelled last minute in favor of putting a female face in the mix).
I've persoanlly sat down and interviewed Amir Taaki, and Cody Wilson (not to mention chased down the guy who stole his wallet while in our store... yeah, we caught him. And Cody gave the dude some cash since he was hard up enough to be stealing wallets).
In short, I've been at the center of one of the bigger activity hubs for Libertarianism, Anarcho Capitalism, Bitcoin, etc.
And, I've sat down with Lyn Ulbricht who is Ross Ulbricht's mother, and just a terribly sweet woman overall. If you're not familiar, Ross Ulbricht is being acused by "government" of being the man known as Dread Pirate Roberts, the man behind the popular online free market known as The Silk Road.
We've covered his case at length. And the more I've looked at this thing, the more I realize how increasingly likely it is that he could be acquitted of all charges against him. I've also come to realize that this could be a HUGE precident setting case, and the implications if he's found guilty could be really bad for everyone.
We're talking future of the internet. Future of freedom of speech. Future of how money laundering charges are handled in the courts. This is a pretty big deal when you examine this more closely.
So....
Last night we launched an Indiegogo campaign to raise $20k for his legal defense fund. WIth the assistance of the Alliance of Austin Agorists we were able to get Ross' parents to join us live via Skype to discuss the situation. We also had our friend Cody Wilson join us live via Skype as well to talk about the importance of the case. (There should be YouTube video up shortly of the event, and I'll circle back and post it in an edit when that happens). We also had a mail to jail campaign where we filled a good sized box with letters for Ross to help keep his spirits alive and well while he's in a cage.
We're going to have a variety of perks for this campaign, including but not limited to:
Free Ross T-shirts
Buttons
Necklaces
Raspberry Pi privacy browsing bundle known as Onion Pi
And last but not least: A Replicator 2.0 Makerbot 3d printer, signed by Cody Wilson himself!
We managed to raise almost $2k last night! For some reason we're having a little technical troubles getting the website to accept the next donation we have to put towards it but we'll get that worked out soon enough.
But now we NEED your help!
With your support we plan to not only raise the funds neccessary to prove his innocenece on all charges, and set him free. But to go the one further and make him a hero and symbol of free markets everywhere!
Please check out the Free Ross website at:
www.FreeRoss.org
and make whatever size contribution (and score some cool stuff in the process) that you can by going here:
https://www.indiegogo.com/projects/free-ross-free-the-market-a-legal-defense-fundraiser-for-ross-ulbricht
Also... one final personal little thing. The guy that put this together is one of my best friends. He has selflessly put this project together and is pouring himself into it. This is in spite of his fathers battle with cancer, and a laundry list of other shit that's on his plate... a list so long if you saw it, you'd feel compelled to put together an Indiegogo campaing for him. He truely is one of the most unsung heros of freedom that I can think of.
He is all chips in on this and so as you can imagine there's some emotional stock riding on it for him.
But he's not just one of my best friends. He's also my boss. And Co-host. And Landlord. And soon to be roommate.
So... as you can imagine. If he's not happy, then pretty much everyone of relevance in my life is pissed off. And that shit just sucks.
So if for whatever reason you don't do it for Ross and his family. If you don't do it for the markets and to give a huge finger to government. If you don't do it because your conscious compells you. Do it for him, and fucks sake do it for me!
In all seriousness though...
Thank you in advance for your contribution. Thank you for spreading the word everywhere you can think of about this campaign. Thank you for sacraficing some small part of yourself for this cause. Thank you. Thank you. Thank you. Thank you.
Edit: A number of people have asked for detailed reasons we think he'll be acquitted on various charges. We went into at length on our 5-28 epsiode of our show which you can listen to hear. (at present it's just a lot of shit to hash out via the keyboard and a hell of a lot easier to just post a link to the dialog)
Check out the 5-28 episode in the archives links on the right. There's also an episode where we intrerview Lyn Ulbricht somewhere down on the front page as well if you want to check that out as well. www.TheCryptoShow.com
submitted by DrMustache to Anarcho_Capitalism [link] [comments]

DarkWallet Dev & 3D-Printed Gun Pioneer Cody Wilson Arrested on S... #bitcoin #ethereum #altcoins wilson https://t.co/uYZDER72CM - Crypto Insider Info - Whales's

Posted at: September 22, 2018 at 12:47PM
By:
DarkWallet Dev & 3D-Printed Gun Pioneer Cody Wilson Arrested on S... #bitcoin #ethereum #altcoins wilson https://t.co/uYZDER72CM
Automate your Trading via Crypto Bot : https://ift.tt/2EU8PEX
Join Telegram Channel for FREE Crypto Bot: Crypto Signal
submitted by cryptotradingbot to cryptobots [link] [comments]

Cody Wilson, Defense Distributed, Cody Wilson & MK Lords: FreedomSummit 2014 Cody Wilson - Liberator @NHLF14 Dark Wallet -- Get Rich Quick with Bitcoin -- Boost.vc's Stellar Startups Cody Wilson Wants to Dismantle the Bitcoin Foundation

27 votes, 97 comments. 1.6m members in the Bitcoin community. A community dedicated to Bitcoin, the currency of the Internet. Bitcoin is a … Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts. Log in sign up. User account menu. 27. Cody Wilson, co-creator of Dark Wallet and a 3D-printing gun company accused of sexually assaulting girl before leaving ... Bitcoin Dark Wallet. Cody Wilson’s most recent project is the Bitcoin Dark Wallet, a web-based Bitcoin wallet with security at the forefront. Wilson and his partner Amir Taaki, an experience Bitcoin wallet developer who has created Libbitcoin, believe that new technology is needed to protect and empower individual commerce. “Dark Wallet is a project of unSYSTEM and Defense Distributed that ... Cody Rutledge Wilson (born January 31, 1988) is an American crypto-anarchist, free-market anarchist, and gun-rights activist, best known as a founder/director of Defense Distributed, a non-profit organization that develops and publishes open source gun designs, so-called "wiki weapons", suitable for 3D printing.He is a co-founder of the Dark Wallet bitcoin storage technology. Anarchist Cody Wilson has launched his candidacy for the Bitcoin Foundation board elections, and reaffirmed his aim to disband the organisation. DarkWallet ist ein experimenteller Bitcoin-Client für den Datenschutz, der ursprünglich von Amir Taaki, Cody Wilson und anderen entwickelt wurde.

[index] [45784] [19789] [32281] [42536] [46374] [31506] [17685] [24905] [14530] [299]

Cody Wilson, Defense Distributed, "The Bitcoin Community Has Sold Out"

On Saturday October 25 Derrick Broze caught up with Cody Wilson of Defense Distributed. Cody produced the controversial 3D printed gun, The Liberator. Cody discusses the failures of the bitcoin ... Max Keiser Talks to Cody Wilson about Darkwallet & Bitcoin - Duration: 13:12. ... Guide to install Bitcoin Dark Wallet in google chrome browser - Duration: 2:45. Aditi Prashar 4,252 views. 2:45 ... Cody Wilson, the creator of the world's first 3-D printed gun stopped by and had his wallet stolen. You won't believe how a man who was declared "one of the 15 most dangerous people in the world ... In this interview M.K. Lords and Cody Wilson discuss philosophy, Dark Wallet, Defense Distributed, and how blockchain technology is one of the most disruptive forces to the power structure. Cody ... In this video I talk about Cody Wilson, co-founder and developer of Dark wallet, an altcoin rival to bitcoin whose goal is to provide anonymous transactions by default. I discuss how Cody wants to ...

#