Both links are broken because of the single quotes, FYI. [CENTER][SIZE=6]BUY NOW - [URL=http://'http://www.ThunderProxies.com']www.ThunderProxies.com[/URL]
DISCORD SERVER (SUPPORT) - [URL=http://'http://www.discord.gg/cuDrwQAVY9']www.discord.gg/cuDrwQAVY9[/URL]
|
|
|
Uma vez eu ganhei uma da ledger e veio com o valor 0 na nota fiscal. Não houve como a receita cobrar. Se a betnomi ou a empresa que vai te passar realmente tiver a autonomia para te dar de presente direto do fabricante, deve vir como zero também.
Não é assim que funciona. Podem botar o valor que for (inclusive zero), mas se o auditor suspeitar e pesquisar, ele pode aplicar o valor que quiser... tanto que até o nikolaspaolo relatou alguns posts acima que a receita ignorou o valor de uma compra dele e fez um freestyle botando o preço de uma loja brasileira. O seu passou pois você teve sorte. Já vi relatos de hardware wallets passando, como também sendo taxadas. É uma verdadeira roleta.
|
|
|
Aí eles vão lá, fecham um mixer que é considerado ilegal pois alguns criminosos o utilizavam, e roubam todo o dinheiro (inclusive dos usuários internacionais que só queriam privacidade onchain) para manter os bancos deles. Só não entendo como o banco vai usar os Bitcoins aí. O que seria "legal para lavar Bitcoins e outras criptomoedas"?
|
|
|
His "collateral" is a bunch of KYC pictures of people that he wanted to sell since day one. How do I know? That's because he has been spamming me everywhere since I made the mistake of letting him talk with me.
|
|
|
Será que pega taxação em Curitiba? Aguardemos.....
A última atualização da minha é que ela está a caminho da fiscalização aduaneira. Agora é esperar os homens trabalharem rápido e eu logo retorno o resultado. Detalhe que não sei como o pessoal lá do awards declarou ela... podem ter colocado o valor cheio da Nano X.
|
|
|
Chipmixer probably didnt keep its promises regarding of destroying the session after 7 days with a full private key wipe.
What if they were generating private keys from a single seed stored on their server, not necessarily keeping them one by one on purpose? Maybe they actually did delete the sessions but weren't smart enough to not generate them from a single (kept) key? The police could then just generate as many keys as they can with that one seed on the server...? Last time when the police seized a DNM, they actually spent some time as a MITM collecting information and they announced that publicly. Maybe if CM kept logs they would also tell the public about it?
|
|
|
I just can't figure out why on earth people are paying a 22% premium to swap FIAT to a stablecoin, it seems to make no sense whatsoever!
This is why...: The problem now appears to be that I can't withdraw GBP back to my account from KuCoin and I can only buy USDT/BTC/ETH with GBP
No one can withdraw GBP from Kucoin, so the only way out is by buying crypto with it. No one wants GBP + everyone wants to get out -> price inflation. https://twitter.com/KuCoinUpdates/status/1637148938007633920
|
|
|
O problema é a falta de adoção da moeda. Comprar qualquer um compra, mas depois faz o que se a tendencia é que nenhum serviço centralizado e KYC-based aceite ela? Talvez só arranjando um jeito de trocar XMR > BTC, uma moeda que é aceita e sem ter que linkar o seu on-ramp com o seu endereço.
|
|
|
Understood in principle, but I have no idea on how to implement this. Is there any guide on how to do that? Maybe @babo can help on this?
My script was made in bash, so you could run it if you're on linux, macOS, or if you have something like wsl2 on windows. 1. Save the script as supernotifierDM.sh or whatever you want and fill in the credentials at the top. 2. Make it executable with: chmod +x supernotifierDM.sh3. Run at any time with ./supernotifierDM.shOr add it to a cronjob so it runs every X hours: 1. Run: crontab -e2. Choose an editor (e.g nano) 2. Add the crontab rule at the bottom of the text file, for example, every hour: 0 * * * * /root/supernotifierDM.shhttps://www.geeksforgeeks.org/how-to-run-bash-script-in-linux/https://phoenixnap.com/kb/set-up-cron-job-linux
Might be a bit too much for some people so a python or nodejs script should be easier to use (I can probably make one later if anyone is interested).
|
|
|
Sorry, I am dumb. Does this mean I can activate a warning for my incoming PM? That would be great, as I often miss those. If not, this is because that requires the bot to know my forum password, thus being too risky?
You can do anything you want on your own machine/server and trigger notifications with a simple POST request. The script in question runs locally on your device, logins to your account, checks for any unread DM (if there's a number next to "My Messages" on the navbar), and triggers a notification through the bot. All the bot sees is that you triggered a notification, no forum credentials leave your device. I made it very quickly only for showcasing, though, so it's missing a bunch of things (i.e every time you run it, it will let notify you of the same DM if you didn't read it in the meanwhile). But anyone can run it every few hours through a cronjob, for example. Or make their own.
|
|
|
New UpdateYou can now make your own scripts/plugins and programmatically trigger custom notifications through an API endpoint. 1. Run /api and grab your API token. 2. Trigger notifications with the endpoint: POST https://api.ninjastic.space/notification { "api_key": "XXXXXXXXXXXXXX", "message: "You have <b>1</b> new message from <b>satoshi</b>\n\nCheck now!" } Style the message with HTML tags supported by telegram: https://core.telegram.org/api/entities#allowed-entitiesAs an example, I made a very simple bash script that triggers a notification if you have any unread personal messages: #!/bin/bash
forumUsername="" forumPassword="" forumCaptchaCode="" supernotifierApiKey=""
login=$(curl -s -c cookies.txt -X POST -L \ -H "Content-Type: application/x-www-form-urlencoded" \ -d "user=${forumUsername}&passwrd=${forumPassword}&cookieneverexp=on&hash_passwrd" \ --url "https://bitcointalk.org/index.php?action=login2;ccode=${forumCaptchaCode}" )
page=$(curl -s -b cookies.txt --url https://bitcointalk.org)
messages=$(echo "$page" | grep -oP 'My Messages \[<strong>\K\d+(?=<\/strong>\])')
if [ -z $messages ]; then messages=0 fi
if [ $messages -gt 0 ]; then curl -s -X POST \ -H "Content-Type: application/json" \ -d "{ \ \"api_key\": \"${supernotifierApiKey}\", \"message\": \"You have <b>${messages}</b> new personal message(s)!\n\nhttps://bitcointalk.org/index.php?action=pm\" }" --url https://api.ninjastic.space/notification fi Could be useful for custom self-hosted solutions (e.g that require authentication, like the example above) or maybe some kind of subscription newsletter? For example, a signature manager or company could take API keys from interested users and send announcements en mass. Let me know if you have ideas for a plugin you would like to use!
Thanks everyone for the kind words.
|
|
|
Use monero, é impossível de ser rastreado, você só vai precisar de duas carteiras, uma para seu ataque e outra na corretora, sendo impossível de localizar a transação, apenas envie a quantia à corretora e saque em dinheiro governamental.
O problema é que poucas corretoras aceitam Monero exatamente por conta dessa natureza dela. Também já vi muitos casos de exchanges perguntando a origem das moedinhas por que eles são muito mais paranoicos com a XMR.
|
|
|
o amigo do sobrinho da ex-noiva do meu primo abriu uma em Portugal usando só um endereço (ele é Brasileiro) e na hora de tentar usar a conta pediram um número de identificação tipo CPF europeu, então não funcionava
Aqui não pediu nenhum documento europeu. vocês sabem se a N26 disponibiliza investimento com rendimento em conta estilo nubank, algo como um tesouro direto europeu? um outro amigo que mora em Portugal estava curioso sobre isso
Não achei nada disso no app, então acho que a resposta é não.
|
|
|
I remember when people were making the case that search engines and websites (especially Google/Youtube) that were allowing copyright material to be uploaded and linked should be shut down on the lines of pirate video websites therefore using the same analogy I understand why you said that. Google and other search engines allow any nonsense to be indexed and then shared without any fear yet the people who have probably become victims after finding scams and siphoning website directly from hyperlinks have no way to accuse them.
If only... I don't blame them for the indexing. The thing is that anyone can literally pay money to have a scam website linked at the top of the results. I can literally create bitcointalk100realnotscam.com and pay google so my website shows up at the top when someone googles for "bitcointalk".
|
|
|
It does make you think about such a high level on anonymity on part of Chipmixer yet they decided to use Cloudflare. Why would they do that if they were serious about anonymity?
I'm pretty sure ChipMixer never used Cloudflare. Actually, it's in the DoJ's case document that they were very much against CF. While ChipMixer was experiencing DDoS attacks in September and October 2017, NGUYEN posted to BitcoinTalk explaining why he did not use Cloudflare, a popular counter-DDoS platform, stating, “In our case, if we would use Cloudflare, Cloudflare would know input addresses and private keys. Cloudflare is US company so it is reasonable to think that any three letter institution could get an access by court order.” In the context of the chain of quotes, they were talking about Sinbad, another competitor, which appears to use Cloudflare.
|
|
|
então o erro do cara foi simplesmente fazer um pagamento de servidor por sua conta paypal oficial em algum momento e aí foi encontrado na investigação?
De acordo com o documento do caso, foi o ponto de virada, sim. O pior é que ele sabia disso e usou uma rede de contas falsas de forma bem eficiente. Tipo assim: Compra BTC p2p -> compra um servidor do digitalocean com BTC -> usa esse servidor como proxy para criar contas falsas no paypal -> compra os domínios no namecheap + compra os servidores.
|
|
|
Tanto o Fundo Monetário Internacional (FMI) como o Grupo dos 20 (G20) afirmaram que as moedas criptográficas foram as culpados pelo que aconteceu ao sistema financeiro. Para defender o seu argumento, trouxeram um documento de fevereiro que fala sobre os efeitos negativos das criptoações no sistema financeiro. De acordo com este documento, a utilização generalizada de criptoativos traz consigo riscos para a taxa de câmbio e o fluxo de capital.
Aí é brincadeira, né? Díficil saber se somos todos governados por inuteis ou só pessoas mal intencionadas mesmo. Aqui o verdadeiro motivo: Emails internos do SVB debatando se deveriam diminuir o risco com titulos do tesouro, já que as taxas baíxissimas estavam para acabar. https://twitter.com/tracyalloway/status/1635243203350892544O motivo de decidirem seguir andando rumo ao abismo? Iam deixar de ganhar $18 milhões + $36 milhões futuros. Também estava lendo um tweet que afirmava que o Silverbank foi desligado não pois estava com problemas, mas sim por que era o "banco das criptomoedas" e o governo queria acabar com isso: https://www.cnbc.com/2023/03/13/signature-bank-third-biggest-bank-failure-in-us-history.htmlCada vez menos uma conspiração que o governo está em uma guerra firme contra nós...
|
|
|
Not a good idea to go through Cloudflare, which decrypt and cache the whole traffic, if we want to really improve our privacy.. I'm neither in favor of Cloudflare, but I'm not quite sure what's the problem if you're behind Tor-- besides of course the fact that it's a pain in the ass to complete the captcha (if any). I'm not an expert on this field, but isn't there a problem with DDoS-ing non-protected websites? I remember ChipMixer getting down for maintenance quite frequently in the past. I think the problem is that everything you see they can also see. Basically, Cloudflare knows every step of your mixing process, and we all know that Cloudflare is a single email from handling all the data to a 3 letters agency (as we learned through ChipMixer, evidenced by the DoJ paper - P.S I'm just explaining what I read, don't sue me Mr DoJ, tyvm)
|
|
|
According to news outlets, German authorities seized servers and crypto worth $46 million. US authorities have accused Chipmixer of laundering over $3 billion since 2017. If international authorities will try to seize all funds related to Chipmixer as they are deemed to be illicit, then it is possible that an attempt could be made by authorities to retrieve all the funds that have been paid out as signature campaign fees as they have effectively promoted/advertised the service.
They should first go after Google for receiving money for scam advertising (which happens on a large scale, every single day). This could end up being very messy for a lot of members in the forum that participated in their signature campaigns if the FBI and US justice department decide to force forum members to repay all the money they received from Chipmixer as signature campaign income.
Eh... seems like a waste of time. Not everyone is from the US, and I don't think mixers by themselves are illegal. The paper on ChipMixer by the DoJ implies that their crimes were: 1. money laundering; 2. operating an unlicensed money-transmitting business; 3. identity theft. Would CM be hunted if they specifically analyzed the coins received before mixing them? Like, imagine them contacting Chain analysis and asking if the coins a user sent came from a DNM, and if so, prompting the user for his KYC documents... (crime 1) Would they be hunted if they disallowed US customers and enforced that by also taking KYC documents (thus not being an "unlicensed money-transmitting business" in the US?) (crime 2) And last, if ChipMixer didn't register his PayPal accounts with bought/stolen documents? (crime 3) https://www.justice.gov/opa/press-release/file/1574581/download
|
|
|
|