Title: Krypto konsult Post by: Bitmessage on May 21, 2024, 07:43:27 PM Hej,
Tänkte dra igång ett Aktiebolag (AB) som konsulterar inom krypto och privatekonomi. Var nyfiken på om det fanns efterfrågan på detta. Har en kandidatexamen i nationalekonomi (Bachelor of Science in Business and Economics) från Lunds universitet. Har erfarenhet inom krypto sedan 2012. Kan svenska regelverket. Sålt mycket bitcoin och haft att göra med Skatteverket osv. Känner mycket gammalt folk. Jag tar en standard taxa för en konsult (2000kr/h). Skicka mig gärna requests här eller på Skype på vad ni vill ha hjälp med. Är känd som "BM" eller "Bitmessage", och nås enklast på Skype: BM-2cSqi89Xdei7nmW1x7VbwBuPD5W8duCy5V@bitmessage.ch heter jag där. Har gjort affärer med bl.a. Bitfinex. Är en cypherpunk i grunden. Rätt nöjd över att bitcoin blivit så stort! Men de va roligare förr när man kunde dribbla svenska myndigheter. Nu är det industri av de hela. Om inget intresse finns så centrerar jag verksamheten på vanlig ekonomi. Satt och mixtrade med verksamhetsbeskrivningen, längesen jag var inne i krypto. Mitt stora intresse i livet är ekonomi. Exempel på affär nedan; -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The agreement is made November 17th, 2016 between Giancarlo Devasini (“GD”), CFO of iFinex Inc. with full power of attorney on behalf of iFinex Inc. communicating through recovery@bitfinex.com and with the PGP pub key fingerprint E7ED 6B5B 0172 2ECD 7F9D FCBC 6F19 A931 3DDF 4814 and the entity owner (“BM”) of the email address BM-2cSqi89Xdei7nmW1x7VbwBuPD5W8duCy5V@bitmessage.ch and with the PGP pub key fingerprint F136 8394 018A DFF7 0AF3 7550 C1DC A5C7 8321 5A72. Whereas iFinex Inc. was the victim a security breach on the 2nd of August 2016 that resulted in the theft of ~119,756 bitcoin and BM claims to know the identity of the hacker, can provide evidence of that claim, and can provide details on the attack vector(s) employed in the security breach. GD takes formal obligation on behalf of iFinex Inc. to move the amount of 5,988 BTC under the direct control of Adam Back (PGP pub key fingerprint 80 7B 4E FE D8 6F EF 86 81 E4 EA 27 78 E3 FA 1B with email adam@cypherspace.org) and Gregory Maxwell (PGP pub key fingerprint 0xAC859362B0413BFA with email gmaxwell@gmail.com) who are trusted persons by BM. Adam Back and Gregory Maxwell, together with an additional trusted third party (Daniel Folkinshteyn a/k/a nanotube) will hold these bitcoin in escrow in a “2 of 3” multi-signature wallet with the public key hash: 36XN5b82ZYVs5nCUBz3PE8LEhaCHEMkxmB Once the bitcoin has been transferred into escrow, BM will then provide to GD the identity of the hacker, the evidence linking the hacker to the security breach, and details on the attack vector(s) employed in the security breach. A bounty of five percent (5%) on any recovered bitcoin will be paid by iFinex Inc. from the multi-signature wallet in control of Adam Back, Gregory Maxwell, and Daniel Folkinshteyn with the public key hash: 36XN5b82ZYVs5nCUBz3PE8LEhaCHEMkxmB within a month of the bitcoin recovery to BM’s wallet with the public key hash of 1FW4G4W9s89rKiB3VU7PZcNBPPn2btFYzP. If no bitcoin is recovered, no bounty is due to BM. GD and iFinex Inc. have no right to claim any total or partial withdrawal from this agreement under the assumption that the hacker identity was previously known by GD or hinted at by anybody else. The full amount of 5% of any recovered amount will be paid by iFinex Inc. to BM. GD and iFinex Inc. have no right to claim any total or partial withdrawal from this agreement without adequately informing Adam Back and Greg Maxwell why the individual revealed by BM is no longer a person of interest or why the bitcoin may be irrecoverable. Neither Adam Back nor Gregory Maxwell are liable to GD or iFinex Inc. for any of their actions or inactions under this agreement. This agreement is considered to be in effect when BM is in receipt of PGP signed copies of this agreement from GD, Adam Back, and Gregory Maxwell. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQEVAwUBWC4/BBQ8n0HY8FbdAQJaIgf+OC2qFsFIGsynS2apYxVAaAACr+HfOrhZ sAMedySXB5b/7c06f8M5tDJGMLYxMeAaaUQdfUgSWd5dcl021KiOmdwzZx8lDeb7 KKg2/UJKntKoR2kZI+4M78M/Fx1VHrzZ1erKF4WoLUAFIBJduAUoKEtLnpoOFUpZ OE3k6c+o2V386rACqsx2no+OQi+CH3UTZef597V38CN4n74QnehLewSPQL4/VC5P G/Vjvp2383+ML9ACt/c4Y08+mVE6Yvbt2WV6lBWgyjdE9ZxzRBXOVVoxgUNoIX/g lAqxb1kAU2Xilstw29GFPHcbKxWAh0J17KJtDl2nYL4wzN1fvGwM0Q== =9j8E -----END PGP SIGNATURE----- Källa: https://pastebin.com/6tD8mfZY |